Senior Penetration Tester | 12 Month Initial Contract | £750 - £850 per day (Inside IR35) | Cheltenham or London | 1 day per week on-site | SC Clearance Eligibility Required MERITUS Talent are working with a boutique Defence consultancy supporting a UK Central Government department in their Cyber Security function. We're looking for an experienced Senior Penetration Tester with a strong … leads, particularly those working independently without peer support. Advising the wider project team on best practices in red teaming and adversary simulation. Skills Required: Solid hands-on experience in penetrationtesting and red teaming, particularly in operational environments. A background in technical QA - reviewing, validating, and improving the output of other testers. Experience as an assessor or contributor More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Meritus Talent
Senior Penetration Tester | 12 Month Initial Contract | £750 - £850 per day (Inside IR35) | Cheltenham or London | 1 day per week on-site | SC Clearance Eligibility Required MERITUS Talent are working with a boutique Defence consultancy supporting a UK Central Government department in their Cyber Security function. We're looking for an experienced Senior Penetration Tester with a strong … leads, particularly those working independently without peer support. Advising the wider project team on best practices in red teaming and adversary simulation. Skills Required: Solid hands-on experience in penetrationtesting and red teaming, particularly in operational environments. A background in technical QA - reviewing, validating, and improving the output of other testers. Experience as an assessor or contributor More ❯
Cheltenham, Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Yolk Recruitment
Senior Penetration Tester | 12 Month Initial Contract | £750 - £850 per day (Inside IR35) | Cheltenham or London | 1 day per week on-site | SC Clearance Eligibility Required MERITUS Talent are working with a boutique Defence consultancy supporting a UK Central Government department in their Cyber Security function. We're looking for an experienced Senior Penetration Tester with a strong … leads, particularly those working independently without peer support. Advising the wider project team on best practices in red teaming and adversary simulation. Skills Required: Solid hands-on experience in penetrationtesting and red teaming, particularly in operational environments. A background in technical QA - reviewing, validating, and improving the output of other testers. Experience as an assessor or contributor More ❯
Role: Offensive Security Specialist Type: Permanent Location: Remote (UK) Clearance: Eligible for SC Interested in getting away from the grind of endless similar penetration tests? Keen to stretch yourself into a more managerial role over time, building up a capability around you? We are working with a leading security services provider who are in the process of standing up … their Offensive Security capability. The work will be focused on providing services such as Web App testing, Infrastructure testing and Code Review services to clients whilst also looking at how to develop that side of the company further. This role has a unique blend of hands on, technical work that would suit someone looking for something a bit … into a market leading function •Customer engagement, through the scoping process, tool selection and overall delivery •Run and take ownership of services such as Vulnerability Assessments, Code Review and PenetrationTesting •Potential to work overseas to provide training services or working with clients to develop their own security posture •Engage in a cross departmental way in order to More ❯
What You'll Be Working On: ️ Implementing secure development practices and conducting threat modeling for software applications ️ Performing static and dynamic application security testing (SAST/DAST) to identify vulnerabilities in code ️ Collaborating with DevOps and development teams to integrate security into the CI/CD pipeline ️ Conducting regular application security assessments, including penetrationtesting and vulnerability … Proven experience as an Application Security Specialist or in a similar application security role ️ Strong knowledge of secure coding practices, common vulnerabilities (e.g., OWASP Top 10), and application security testing tools ️ Experience with SAST, DAST, and security code review tools (e.g., Fortify, Veracode, Checkmarx) ️ Familiarity with secure software development frameworks (e.g., OWASP, NIST) ️ Relevant certifications such as CSSLP, CEH More ❯
Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetrationtesting, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and guidelines for usage Analyze design specifications … that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetrationtesting, and provide a comprehensive verification and validation report (certification report) for the information system Facilitate penetrationtesting Provide a comprehensive verification and validation report (certification … JASINT provides equal employment opportunities to all employees and applicants without regard to race, color, ancestry, national origin, gender, sexual orientation, marital status, religion, age, disability, gender identity, genetic testing results, or service in the military. Equal employment opportunity applies to all terms and conditions of employment, including hiring, placement, promotion, termination, layoff, recall, transfer, leave of absence, compensation More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
General Dynamics Information Technology
based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetrationtesting, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or … WHAT YOU'LL NEED TO SUCCEED: Required Experience: 5+ years of related experience Required Technical Skills: Offensive Security Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM) Security Clearance Level: TS/SCI US Citizenship Required Location: Hybrid-Ft. Belvoir, VA Required Skills and Abilities: Must be proficient in offensive … based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetrationtesting, security operations center analysis, defensive cyber operations, or offensive cyber operations. GDIT IS YOUR PLACE: Full-flex work week to own your priorities at work and at More ❯
that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetrationtesting, and provide a comprehensive verification and validation report (certification report) for the information system Facilitate penetrationtesting Provide a comprehensive verification and validation report (certification More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom
The Bridge (IT Recruitment) Limited
security initiatives across their development teams. You'll be at the heart of ensuring their platforms remain secure by leading the execution of vital security initiatives, managing tooling, coordinating testing efforts, and embedding security best practices into the fabric of our development processes. What you'll be doing: Leading cybersecurity initiative delivery across game and platform development teams. Managing … third-party penetrationtesting, red teaming, and security assessments. Driving the integration of secure development practices and automation within CI/CD workflows. Supporting compliance and audit activities through structured documentation and reporting. Coordinating vulnerability management and helping teams meet security SLAs. Collaborating with cross-functional stakeholders to embed security into engineering culture and processes. Owning and improving … . Strong examples of cross-functional stakeholder management, being a knowledgeable bridge between technical cyber security teams and non-cyber security colleagues. Proven track record of leading third-party testing efforts, red teaming and security tool implementations. Strong knowledge and experience of integrating security into agile development environments and workflows. Experience with tools like Jira, Confluence, SharePoint or similar More ❯
Experience must be in the design/development of computer or information systems, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, and/or systems engineering. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Pardoe Wray
Join a leading Cyber Security provider, established in early 2018 and rapidly growing in the UK. They specialize in a wide array of security services including PenetrationTesting, Cloud Security, Continuous Security Testing, Adversarial Emulation, End Point Detection and Response, Backup & Restore solutions, and more. Role: Graduate Sales Development Representative Location: Newcastle or Leeds Responsibilities: Learn and More ❯
Maidstone, Kent, United Kingdom Hybrid / WFH Options
Rocketsourcers B.V
solutions. You'll write, test, and maintain high-quality software in collaboration with your colleagues. You'll help improve test processes, identify and resolve issues, and create tools for testing performance, security, and system integration. Promoting a strong testing culture across the team will also be part of your role. What makes this job unique? This is your … of integration. At Payter, you'll find an open and dynamic environment where your work has real impact. Job requirements Technical skills: Programming Languages : Golang (training provided if needed) Testing Types : Unit, integration, regression, end-to-end, performance, load, and security testingTesting Methodologies : Test-Driven Development (TDD), Behaviour-Driven Development (BDD) Test Techniques : Black-box, white … box testing, mocking, stubbing, and test data management Software Practices : Git workflows, Object-Oriented Programming (OOP), SOLID principles, use of design patterns DevOps & Infrastructure : Infrastructure as Code (IaC) Configuration management tools Containerisation (e.g., Docker) Security : Secure coding, vulnerability scanning, penetrationtesting, and general software security principles Debugging : Working with logs, databases, and root cause analysis Soft skills More ❯
in-depth architecture against known vulnerabilities. TASKS: Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives. Conduct and/or support authorized penetrationtesting on enterprise network assets. Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions. Maintain knowledge of applicable … security systems and designs. Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort). Skill in mimicking threat behaviors. Skill in the use of penetrationtesting tools and techniques. Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.). Skill in using network analysis tools to identify vulnerabilities. (e.g. More ❯
risk and usability. Knowledge of security standards and regulations (e.g. NCSC, ISO, SoC, NIST, PCI, GDPR). Experience in application architecture, software development and/or infrastructure architecture. Experience testing the security of software and infrastructure using appropriate security tools. Experience with Continuous Security, Continuous Integration and Continuous Delivery techniques. Experience of network security (e.g. OSI, TCP/IP … of Identity management and authentication/authorisation products and patterns. End-to-end security involvement, including governance, risk and compliance, operational security, supply chain security and secure user management. Penetrationtesting qualifications (e.g. OSCP, CREST, TIGER or equivalent) Experience leading security engineers and other junior members of staff More ❯
West London, London, England, United Kingdom Hybrid / WFH Options
Ashdown Group
you will need the following skills and experience: - Experience in either a Cyber Analyst or Cyber Engineer role - Knowledge on SIEM and EDR tools - Experience in network audits and penetrationtesting - Infrastructure support experience - Knowledge on security frameworks More ❯
and potential attacks against the systems or missions being studied. The principal level System Vulnerability Analyst shall possess the following capabilities: Candidate must have relevant experience in vulnerability analysis, penetrationtesting, and/or computer forensics. Requirements Active TS/SCI w/Polygraph security clearance is required. Information Assurance Certification may be required A Bachelor's Degree More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
recovery plans Establish and improve vulnerability management processes Requirements Experience in a Cyber Analyst or Cyber Engineer role Knowledge of SIEM and EDR tools Experience with network audits and penetrationtesting Infrastructure support experience Understanding of security frameworks Create a job alert and receive personalized job recommendations directly to your inbox. More ❯
deployment and upkeep of various platforms that support multiple applications. Responsibilities of the Linux Platform Engineer: Monitor and enhance platform performance, applying corrective measures as needed Conduct vulnerability assessments, penetrationtesting, and develop security-based incident response plans Configure and manage host-based security systems and utilize monitoring tools such as Prometheus, Grafana, ELK, IBM NetCool, and Solarwinds More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC will be More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC will be More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
risk and usability. Knowledge of security standards and regulations (e.g. NCSC, ISO, SoC, NIST, PCI, GDPR). Experience in application architecture, software development and/or infrastructure architecture. Experience testing the security of software and infrastructure using appropriate security tools. Experience with Continuous Security, Continuous Integration and Continuous Delivery techniques. Experience of network security (e.g. OSI, TCP/IP … of Identity management and authentication/authorisation products and patterns. End-to-end security involvement, including governance, risk and compliance, operational security, supply chain security and secure user management. Penetrationtesting qualifications (e.g. OSCP, CREST, TIGER or equivalent). Experience leading security engineers and other junior members of staff. So what are you waiting for? Let's write More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetrationtesting - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. The Work: The Test Engineer (TE) Skill Level 3, within the … assessment, and developing and applying modeling and simulation for T&E. Additionally, the Test Engineer analyzes performance data and estimates confidence and performance, plans and executes data collection and testing, and coordinates with systems engineering and program management to inform evaluation planning. The Test Engineer must also assess operational environments and prioritize T&E objectives, as well as design … Engineering, Statistics, Engineering Management, or related discipline. May substitute four years' experience in lieu of a Bachelor's Degree. • 8+ years in conducting both component and system integration level testing on complex software products • Experience to develop and deliver briefings, technical presentations, and program documentation to senior program management Desired Skills: • Experience testing CNO tools and capabilities • Experience More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯