. Demonstrable experience leading cloud migration and hybrid architecture projects. Excellent communication skills, able to engage both technical and non-technical stakeholders. Desirable Skills Experience with Azure Site Recovery, penetrationtesting, or vulnerability scanning. Exposure to DevOps principles and automation. Qualifications Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Azure Solutions Architect Expert (AZ-305) Set2Recruit are More ❯
swindon, wiltshire, south west england, united kingdom
Set2Recruit
. Demonstrable experience leading cloud migration and hybrid architecture projects. Excellent communication skills, able to engage both technical and non-technical stakeholders. Desirable Skills Experience with Azure Site Recovery, penetrationtesting, or vulnerability scanning. Exposure to DevOps principles and automation. Qualifications Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Azure Solutions Architect Expert (AZ-305) Set2Recruit are More ❯
As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & PenetrationTesting, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning with leading Tools Scheduling of Scanning across Business, ensuring Reporting Requirements are More ❯
As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & PenetrationTesting, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning with leading Tools Scheduling of Scanning across Business, ensuring Reporting Requirements are More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
AWS security controls, policies, and automation - Role-based and attribute-based access controls - Cryptographic protocols and secure key lifecycle management - Securing microservices, APIs, and DevSecOps best practices Skilled in penetrationtesting and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerability scanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering More ❯
AWS security controls, policies, and automation- Role-based and attribute-based access controls- Cryptographic protocols and secure key lifecycle management- Securing microservices, APIs, and DevSecOps best practices Skilled in penetrationtesting and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerability scanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering More ❯
Employment Type: Full-Time
Salary: £100,000 - £120,000 per annum, Negotiable, Inc benefits
experience with security frameworks (NIST, ISO 27001) and a proven track record of securing large-scale, high-availability systems. You are adept at threat modelling, security architecture review, and penetrationtesting concepts. Prior experience in the O&G (Oil & Gas) sector, government projects, or other critical infrastructure is a significant advantage. You are entrepreneurial, thrive in a start More ❯
operations, and advanced threat detection. Key Responsibilities Develop, assess, and maintain cybersecurity controls across cloud systems Ensure RMF, STIG, NIST SP 800-53, and FISMA compliance Manage vulnerability scans, penetrationtesting, and incident response Advise on integration of AI/ML-based cyber defense tools Support ATO processes and continuous monitoring Requirements Qualifications Bachelor's in Computer Science More ❯
topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
a related field and a certified cybersecurity professional (CISSP) are required as well as a minimum of 8+ years: Experience: Knowledge of information security or related fields, computer network penetrationtesting, and techniques. Understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts. Security & Access Management OKTA, Enterprise IDM, Enterprise Portal OAuth 2.0, OIDC, SAML 2.0 (for SSO) SMTP More ❯
Do: Conduct sophisticated exploitation activities against complex targets, leveraging zero-day vulnerabilities, reverse engineering, and custom payload development. Support and execute offensive cyber operations, including but not limited to, penetrationtesting, red teaming, and advanced cyber threat emulation. Exploit common vulnerabilities and misconfigurations associated with common operating systems. (Windows, Linux, etc.), protocols (HTTP, FTP, etc.), and network security More ❯
Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Russell Taylor Group Ltd
You'll conduct comprehensive attack path analysis and threat modelling, mapping adversary tactics and techniques to industrial environments and developing tailored mitigation strategies. You'll lead and execute advanced penetrationtesting, red teaming, and adversary simulation exercises within OT/ICS environments, leveraging frameworks such as MITRE ATT&CK for ICS and modelling using Bow-Tie Analysis to More ❯
experience with network exploitation Nice If You Have: Experience with dataflow and signals intelligence architecture Experience with programming languages for scripting and automation, including Python or C++ Experience with penetrationtesting tools Knowledge of encryption, ports, protocols, and common network configurations Network+, Security+, CEH, CCNA, or SANS Certification Clearance: Applicants selected will be subject to a security investigation More ❯
topology, protocols, and components; network security architecture, including the application of Defense-In-Depth principles; network traffic analysis methods; OSI model and underlying networking protocols (e.g. TCP/IP); penetrationtesting tools and techniques (e.g. metasploit, neosploit, etc.); programming language structures and logic; relevant laws, legal authorities, restrictions, and regulations pertaining to CND activities; system administration concepts for More ❯
hodologies and tool usage Nice If You Have: Experience with dataflow and signals intelligence architecture Experience with programming languages for scripting and automation, including Python or C++ Experience with penetrationtesting tools Knowledge of encryption, ports, protocols, and common network configurations Bachelor's degree Network+, Security+, CEH, CCNA, or SANS Certification Clearance: Applicants selected will be subject to More ❯
topics is equivalent to an Associate degree. Experience : Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
clients in Columbia, MD. Responsibilities Conduct sophisticated exploitation activities against complex targets, leveraging zero-day vulnerabilities, reverse engineering, and custom payload development. Support and execute offensive cyber operations, including penetrationtesting, red teaming, and advanced cyber threat emulation. Exploit common vulnerabilities and misconfigurations associated with common operating systems. (Windows, Linux, etc.), protocols (HTTP, FTP, etc.), and network security More ❯
requirements, and crew progression. Instruct students on identifying, analyzing, and mitigating cyber threats, including strategies for protecting networks, data, and critical infrastructure. Offer training in offensive cyber operations, including penetrationtesting, ethical hacking, and vulnerability assessment techniques. Prepare students for effective incident response by providing hands-on training in detecting, analyzing, and mitigating cyber incidents Qualifications Minimum Bachelors More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
cyber related work with small dynamic technical teams • You will open-source tools such Metasploit, BurpSuite, nmap and Wireshark as well as proprietary tools to perform red teaming and penetrationtesting of the client's global network • You will develop technical requirements for new tools or enhancements to existing tools and become the tools "champion" throughout the tool More ❯
related work with small dynamic technical teams You will use open source tools such Metasploit, BurpSuite, nmap and Wireshark as well as proprietary tools to perform red teaming and penetrationtesting of the client's global network You will reverse engineer network layouts using data collected from the network itself to identify misconfigurations and to map out where More ❯
on current platform(s). Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. Develop and maintain security incident response plans and procedures. Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. Deploy and manage machines More ❯
security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they cause. - Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. - Fix detected vulnerabilities to maintain a high-security standard. - Recommend best practices for IT security. - Installing security measures and operating software to protect systems and information infrastructure, including More ❯
security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they cause. - Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. - Fix detected vulnerabilities to maintain a high-security standard. - Recommend best practices for IT security. - Installing security measures and operating software to protect systems and information infrastructure, including More ❯