Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetrationtesting and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools More ❯
Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetrationtesting and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools More ❯
Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetrationtesting and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools More ❯
support the business and technology teams delivery of the security change programme. Provide support to the business and technology teams to understand and address vulnerabilities within SLA, identified through penetrationtesting, vulnerability scanning and red team exercises Foster relationships with internal business units to enhance cyber security communication, including knowledge of threats, vulnerabilities, and mitigation strategies. Provide strategic … to changes. Lead the information security updates at business and technology governance forums. The Requirements Technical skills: A comprehensive understanding of information security services (security operations and offensive security testing) Experience of strategic planning and oversight of cyber incident response and crisis management Strong understanding of cybersecurity standards and frameworks (e.g. ISO27001, NIST, CIS) and their application in strategic More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetrationtesting , and remediation strategy delivery Lead and coordinate incident response , forensic analysis, and post-incident reporting Use and optimise security tooling (e.g. firewalls, IDS/IPS , endpoint protection More ❯
POA&Ms, deviation lists, and ensure systems maintain Authority to Operate (ATO). Provide FRCS cybersecurity engineering support and continuous monitoring in accordance with DoD and Army standards. Perform penetrationtesting, threat analysis, and security risk assessments in lab/test environments. Collaborate with stakeholders to improve system hardening, respond to ICS-CERT alerts, and mitigate CAT More ❯
Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex security incidents. Support More ❯
Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex security incidents. Support More ❯
Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex security incidents. Support More ❯
Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex security incidents. Support More ❯
demonstrating expertise across various areas (e.g., CISM, CISA, OSCP, GPEN). Experience Industry Experience: Minimum of 3-5 years of professional experience in cybersecurity roles such as security analyst, penetration tester, security consultant, or security architect. Teaching Experience: Prior teaching experience in higher education or corporate training environments preferred. Experience with online course platforms and virtual learning environments is … IDS/IPS, network monitoring tools, threat intelligence platforms, and security protocols. Skills and Expectations: Technical Expertise In-depth knowledge of cybersecurity frameworks, tools, and protocols. Practical experience with penetrationtesting, vulnerability assessments, and security operations. Familiarity with incident response procedures, risk management, and security compliance. Instructional Skills Ability to convey complex technical information clearly and effectively to More ❯
Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerability assessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetrationtesting, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must meet ALL of the below criteria. The candidate must: • Have one of the following o A More ❯
detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetrationtesting, and ensure compliance with standards such as ISO 27001, GDPR, and NIS2. Drive organisation-wide security awareness and training programmes. Maintain and test business continuity and disaster More ❯
engineering, and compliance, while leading the charge on modern, cloud-first security strategy. Responsibilties: Designing and implementing robust security policies, controls, and infrastructure protection strategies. Leading vulnerability management efforts, penetrationtesting, and remediation plans. Monitoring and investigating security events, managing incident response processes end-to-end. Ensuring compliance with security standards such as ISO 27001 and supporting audits More ❯
detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetrationtesting, and ensure compliance with standards such as ISO 27001, GDPR, and NIS2. Drive organisation-wide security awareness and training programmes. Maintain and test business continuity and disaster More ❯
london (city of london), south east england, united kingdom
AirSearch
detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetrationtesting, and ensure compliance with standards such as ISO 27001, GDPR, and NIS2. Drive organisation-wide security awareness and training programmes. Maintain and test business continuity and disaster More ❯
practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to conduct risk assessments, vulnerability assessments, and penetration testing. • Proficiency in scripting languages like Python, PowerShell, or Bash for automation and orchestration tasks. Certifications: (Nice to have, not required: ) • Relevant certifications can be advantageous, such as Certified More ❯
Responsibilities Partner with development, operations, and security teams to integrate security protocols seamlessly into the software development lifecycle. Design, build, and maintain CI/CD pipelines incorporating automated security testing, vulnerability assessments, and compliance checks. Develop and manage infrastructure as code (IaC) configurations, ensuring secure and scalable cloud resources and infrastructure. Conduct security assessments, code reviews, and penetrationtesting to identify and resolve application, code, and infrastructure vulnerabilities. Monitor system and application logs to detect and address potential security incidents. Implement and oversee identity and access management (IAM) systems to ensure secure authentication and authorization. Provide secure coding guidance to software engineers and assist in remediating security issues. Lead incident response efforts, investigating and mitigating security … code tools, including Terraform, CloudFormation, or Ansible. Strong scripting skills in languages such as Python and Bash for automation and integration. Proficiency with static code analysis, dynamic application security testing (DAST), and vulnerability scanning tools like Fortify and Acunetix. Knowledge: In-depth understanding of security frameworks (e.g., OWASP, NIST) and best practices for mitigating vulnerabilities. Familiarity with common threat More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerability scanning, penetrationtesting, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with the ability to mentor and lead from a technical perspective. Desirable More ❯
with Splunk Enterprise Security (accreditation preferred) - Experience with other Splunk premium security tools or products (UBA, RBA, Phantom) is a plus. • Extensive experience in threat hunting, red teaming, or penetrationtesting, with a deep understanding of common attack vectors and methodologies. • Strong analytical and problem-solving skills, with the ability to analyze large datasets and identify actionable insights. More ❯
critical systems. RESPONSIBILITIES & DUTIES: Design, deploy and manage cloud security architectures in AWS, Azure and/or other commercial or private cloud environments. Conduct risk assessments, vulnerability scans, and penetrationtesting to identify and mitigate security weaknesses. Implement and monitor cloud-native security controls, such as firewall, encryption, IAM policies, and logging/monitoring solutions/Develop and More ❯
Degree in a cyber security-related field. Professional certification (e.g. CISSP, Azure Security Engineer, or equivalent). Skilled in risk/vulnerability assessments, compliance checks, and audits. Experienced in penetrationtesting and remediation. Knowledge of business continuity, disaster recovery, and incident response. Hands-on with hybrid cloud security tools (e.g. M365, IAM, threat protection). Able to assess More ❯
Horsham, West Sussex, South East, United Kingdom Hybrid / WFH Options
Platform Recruitment Limited
platforms (Office 365, Azure, AWS) Experience working with or managing a SOC Practical 3rd line operational security background Familiarity with audits, compliance frameworks, and risk management Knowledge of pen testing, vulnerability scanning, and networking best practices Confident project management skills and ability to lead from the front This is an opportunity to be the go-to security expert in More ❯
of areas such as access management, IT operations, job scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerability assessment and penetrationtesting, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology More ❯
expectations. Responsibilities Collaborate with cross-functional teams to integrate robust security measures throughout the software development lifecycle. Design, implement, and manage CI/CD pipelines that include automated security testing, vulnerability scanning, and compliance validation. Develop and maintain infrastructure as code (IaC) configurations to ensure secure, scalable cloud and infrastructure deployments. Conduct comprehensive security assessments, code reviews, and penetrationtesting to identify and mitigate vulnerabilities. Monitor system and application logs for potential security threats and respond to incidents promptly. Implement and oversee identity and access management (IAM) solutions, maintaining secure authentication and authorization processes. Advise software engineers on secure coding practices and assist in addressing security vulnerabilities. Contribute to incident response activities by investigating and mitigating breaches More ❯