In the capacity, plays a key role in developing and implementing security architectures for applications and IT systems, focusing on protecting data and preventing security breaches. • Conduct risk and vulnerability assessments to identify security weaknesses, conduct risk analyses • Create and deploy incident response plans, and lead efforts to respond to security breaches and attacks. • Interact with technical leads, developers … technology, etc., and demonstrate forward thinking around how this technology can support the operational needs of the Program and the future technical strategy of the organization • Conduct and analyze vulnerability assessments to validate system compliance with RMF controls and DISA Security Technical Information Guidelines (STIG) • Oversee patch management and compliance Required experience and educations • Bachelor of Science degree in More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions Ltd
advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethical hacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce executive reporting on cyber threats, risks, and remediation progress Collaborate … security, penetration testing, and ethical hacking at enterprise scale.This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Ethical Hacker, Security Tester, Vulnerability Analyst, Offensive Security Specialist, Threat Intelligence Analyst. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate More ❯
advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethical hacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce executive reporting on cyber threats, risks, and remediation progress Collaborate … scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead, Ethical Hacker, Security Tester, Vulnerability Analyst, Offensive Security Specialist, Threat Intelligence Analyst. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions
advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethical hacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce executive reporting on cyber threats, risks, and remediation progress Collaborate … scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead, Ethical Hacker, Security Tester, Vulnerability Analyst, Offensive Security Specialist, Threat Intelligence Analyst. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate More ❯
London, Coleman Street, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions Limited
advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethical hacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce executive reporting on cyber threats, risks, and remediation progress Collaborate … scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead, Ethical Hacker, Security Tester, Vulnerability Analyst, Offensive Security Specialist, Threat Intelligence Analyst. Deerfoot Recruitment Solutions Ltd is a leading independent tech recruitment consultancy in the UK. For every CV sent to clients, we donate More ❯
in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's Degree in Computer Science or IT Engineering is desired and More ❯
in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's Degree in Computer Science or IT Engineering is desired and More ❯
years of experience in Android development, including proficiency in Java, Kotlin, and Android SDK. Solid understanding of mobile security concepts, including secure coding practices, encryption algorithms, authentication protocols, and vulnerability assessment. Familiarity with Android security frameworks, libraries, and APIs. Experience with threat modeling, risk assessment, and security architecture design. Knowledge of secure coding practices and common vulnerabilities such … as OWASP Top 10. Proficiency in using security tools for vulnerability scanning and code analysis. Excellent problem-solving skills and attention to detail. Strong communication and collaboration abilities, with a passion for teamwork. Ability to adapt quickly to changing priorities and work effectively in a fast-paced environment. TS/SCI security clearance required. Join our team and contribute More ❯
The Red Cell Analyst is responsible for the overall conduct and management of specific vulnerability assessments, to include gathering information based on program objectives, identifying gaps in information gathering, and prioritizing courses of action pertaining to the assessment. The Red Cell Analyst provides assessment data to the White Cell Lead ensuring all statutory and regulatory requirements and other … national security. Responsibilities/Tasks - The Red Cell Analyst shall: Research the structure, ideology, intentions, tactics, and capabilities of adversarial organizations to develop threat characterization. Identify information requirements, develop assessment strategies and collection plans, identify information sources, and develop and conduct Open Source research, analysis, and fusion of relevant information to emulate adversarial planning capabilities. Characterize systems and conduct … nodal analysis, identify essential functions/tasks and critical assets necessary to perform them as determined by the assessment program plan. Facilitate timely information management flow from DoD Red Team partners and other entities supporting DoD Red Team operations. Develop courses of action an adversary may employ against customer personnel, equipment, facilities, networks, information and information systems, infrastructure, and More ❯
Clearance Requirements: None Aquila is seeking a Systems Engineer to join a team responsible for the execution of compliance and assistance with vulnerability remediation activities primarily associated with enterprise information systems. This new position has been added to an existing team to support department expansion. The person hired will not only become familiar with the utilization of vulnerability … required Excellent communication (both oral and writing) and organizational skills Proficiency and hands-on experience with Tenable's Security Center and IBM BigFix Proficiency and hands-on experience with vulnerability remediation across multiple Operating System (OS) platforms include Linux, Mac, and Windows Strong proficiency and hands-on experience with maintaining Red Hat Satellite, building Linux installation packages in support … other duties as assigned. Required Experience: 5 years of experience Systems Engineering OS platforms (Linux, Mac, Windows) Linux for Unix Redhat Enterprise Linux 7 & 8 2 years of experience Vulnerability Assessments IBM Bix Fix Tenable's Security Center Other Requirements Pass a comprehensive background investigation. Maintain an Active security clearance BS in a related field or equivalent experience Covid More ❯
Oracle applications Design DMZ zoning: reverse proxy, firewalls, and application gateways Deploy and configure DMZ components Define access policies, attribute mappings, and claim rules Perform functional, security (penetration/vulnerability), and performance testing Conduct user acceptance testing with internal and external stakeholder groups Produce end-to-end security architecture diagrams and DMZ access patterns Document configuration steps, policy definitions … OCI IAM, Microsoft Entra ID, Azure B2C, and SAML/OIDC protocols. Strong expertise in DMZ design, firewall configurations, and application gateway setup. Proficient in conducting penetration testing and vulnerability assessments. Skilled in technical writing and training, with the ability to document and transfer knowledge effectively. Acceptance Criteria: Successful SSO login for all defined user personas without manual intervention. More ❯
This is a contingent opportunity Conducts technical cyber and communications vulnerability assessments of computer networks, other technology (OT) systems telecommunications and other communications systems. Duties: Perform oversight of the development, implementation and evaluation of IS security program policy; special emphasis placed upon integration of existing network infrastructure Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security … Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues Evaluate Authorization packages and make recommendation to the AO and/or DAO for authorization Evaluate IS threats and vulnerabilities to determine whether additional safeguards are required Advise the Government concerning the impact levels for Confidentiality, Integrity, and Availability for … the information on a system Ensure security assessments are completed and results documented and prepare the Security Assessment Report (SAR) for the Authorization boundary Initiate a Plan of Action and Milestones (POA&M) with identified weaknesses for each Authorization Boundaries assessed, based on findings and recommendations from the SAR Evaluate security assessment documentation and provide written recommendations for More ❯
Description • The ideal candidate will perform Software Engineering and vulnerability research with a focus on OCO (Offensive Cyber Operations) and DCO (Defensive Cyber Operations) activities. • Work with customers directly performing full cycle system engineering, gathering requirements and source code, to technical documentation and specifications. • Performing long term, in depth vulnerability assessments using reverse engineering, kernel debugging, and exploitation More ❯
City of London, London, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
london, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯
slough, south east england, united kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
major UK clients — from security gap assessments to crisis simulations, risk frameworks, and technical reviews. Support the development and delivery of both technical (e.g. M365/cloud config reviews, vulnerability assessments) and GRC engagements. Help shape and evolve our cyber propositions , working closely with delivery leads across managed services, threat intel, and MDR. Scope and define client engagements with … of cyber engagements — both GRC and technical. Strong understanding of frameworks like NIST, ISO 27001, CIS, and a pragmatic view on applying them. Familiarity with technical tooling for assessments, vulnerability analysis, and cloud reviews (you don’t need to be an engineer — but you know your way around the tech). Experience working directly with clients to define risk More ❯