City of London, Greater London, UK Hybrid / WFH Options
Cititec
in real-world technical understanding. Key Requirements: Proven experience in information security risk management, particularly in GRC. Solid technical security background in at least one of the following areas: VulnerabilityAssessment & Penetration Testing (VAPT) Threat Intelligence Incident Response Or other relevant technical security domains. Ability to assess, communicate, and manage risk in alignment with security policies and business More ❯
broad spectrum of threats including accidents, natural disasters, technological failure, information system attacks, terrorists, radio frequency weapons (RFW), sabotage, and weapons of mass destruction (WMD). You will conduct vulnerability assessments of the emergency readiness of critical defense facilities, including assessments of continuity of operations programs (COOP), supply chain analysis, emergency management plans, chemical, biological, radiological, and nuclear readiness … and survivability (CBRN), and incident response. You will provide recommendations for eliminating or mitigating vulnerabilities for continuous facility operations. Duties: Conduct vulnerability assessments of defense facility readiness and emergency survivability. Provide expert advice on mitigating and eliminating emergency management vulnerabilities, improving continuity of operations, and mitigating CBRN threats. Collaborate with Team members on assessment activities. Document and communicate More ❯
requirements that are not in compliance - Conducts on-site evaluations - Validates the security requirements of the information system - Verifies and validates that the system meets the security requirements - Provides vulnerabilityassessment of the system - Coordinates penetration testing - Provides a comprehensive verification and validation report (certification report) for the information system - Provides process improvement recommendations - Assists the Government to More ❯
performing within a team of Systems Engineers, Software Engineers, and Intel Analysts supporting DCO (Defensive Cyber Operations) activities and providing technical writing expertise. Teams are performing end to end vulnerability assessments of weapons systems and providing mitigation strategies and technical recommendations to protect systems from cyber threats! Job Duties: • Bachelor in STEM field and 4 years Technical Writing experience … metadata, and data into relational databases. • Ability to upload content onto websites using COTS web authoring tools; Ability to integrate existing graphics into documents using various COTS tools. Desired: • VulnerabilityAssessment reporting • Cyber background; or experience with handling documentation dealing with major weapons/space systems Clearance Requirements: An Active Top Secret clearance/SCI with Polygraph Join More ❯
system Community of Interest Network Enclave (COINE). - Responsible for creating and maintaining a complete and accurate inventory FRCS and components. - Assist CES personnel with security control implementation and assessment of FRCS. - Register systems in Enterprise Mission Assurance Support Service (eMASS) with all necessary artifacts to attain Authority to Operate (ATO). - Recognize potential, successful, and unsuccessful intrusion attempts … Assist with implementation of counter-measures or mitigating controls. - Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. - Perform periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. - Ensure More ❯
system Community of Interest Network Enclave (COINE). - Responsible for creating and maintaining a complete and accurate inventory FRCS and components. - Assist CES personnel with security control implementation and assessment of FRCS. - Register systems in Enterprise Mission Assurance Support Service (eMASS) with all necessary artifacts to attain Authority to Operate (ATO). - Recognize potential, successful, and unsuccessful intrusion attempts … Assist with implementation of counter-measures or mitigating controls. - Ensure the integrity and protection of networks, systems, and applications by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. - Perform periodic and on-demand system audits and vulnerability assessments, including user accounts, application access, file system and external Web integrity scans to determine compliance. - Ensure More ❯
SaaS Collaborate with development and operations teams to design, implement, and maintain secure and automated infrastructure Implement security best practices throughout the software development lifecycle (SDLC), including code scanning, vulnerabilityassessment, and threat modeling Develop and maintain CI/CD pipelines, enabling continuous integration, continuous delivery, and continuous deployment of applications Develop and maintain containerization and micro-services … Integrate security controls, such as automated vulnerability scanning, static and dynamic analysis, and security testing, into the CI/CD process Collaborate with cross-functional teams to ensure compliance with security standards and regulatory requirements Automate and orchestrate security processes, including incident response and threat detection, using technologies like Splunk, Chef Automate, and others Stay updated with emerging DevSecOps More ❯
those risks. Audits may include areas such as access management, IT operations, job scheduling/monitoring, data transfer (ensuring completeness and accuracy), network security, cybersecurity, system development and testing, vulnerability assessments, penetration testing, and operational resilience. This is a contract-to-hire position under Inside IR35, onsite in Birmingham 5 days a week. MUST HAVES: Experience as a technology … application development, information security, technology consulting, or relevant industry experience Basic understanding of software development concepts, system architecture, databases, operating systems, and messaging Proven experience in risk identification and assessment Ability to prepare and present audit conclusions and findings to senior management and stakeholders Knowledge of data analysis using Excel A strong interest in building a long-term career More ❯
threats and advising the Head of IT on mitigations and remediations. Guide, inform and support the submission of compliance-based assessments mandated by the Government such as the Cyber Assessment Framework. Attend and engage as an advocate for the HTA in forums and conferences to help gauge knowledge and experiences across other ALB organisations. Proactively analyse and report against … accordingly. Work closely with our Third-Party support on all aspects of IT in collaboration with the IT Business Systems and Operations Manager. Lead on the annual Penetration and VulnerabilityAssessment, working with potential stakeholders and suppliers to ratify any potential threats. In conjunction with the IT Business Systems and Operations Manager provide support, guidance and cover as … managed and transmitted in line with GDPR and HTA policies. Gather and maintain working evidence of good security management to align with the requirements and assurances within the Cyber Assessment Framework. Lead on the development of a programme to perform regular recovery validation exercises to analyse the validity of our backups and ensure that these are fit for purpose. More ❯
London, England, United Kingdom Hybrid / WFH Options
Care Quality Commission
threats and advising the Head of IT on mitigations and remediations. Guide, inform and support the submission of compliance-based assessments mandated by the Government such as the Cyber Assessment Framework. Attend and engage as an advocate for the HTA in forums and conferences to help gauge knowledge and experiences across other ALB organisations. Proactively analyse and report against … accordingly. Work closely with our Third-Party support on all aspects of IT in collaboration with the IT Business Systems and Operations Manager. Lead on the annual Penetration and VulnerabilityAssessment, working with potential stakeholders and suppliers to ratify any potential threats. In conjunction with the IT Business Systems and Operations Manager provide support, guidance and cover as … managed and transmitted in line with GDPR and HTA policies. Gather and maintain working evidence of good security management to align with the requirements and assurances within the Cyber Assessment Framework. Lead on the development of a programme to perform regular recovery validation exercises to analyse the validity of our backups and ensure that these are fit for purpose. More ❯
requirements that are not in compliance Conduct on-site evaluations Validate the security requirements of the information system Verify and validates that the system meets the security requirements Provide vulnerabilityassessment of the system Coordinate penetration testing Provide a comprehensive verification and validation report (certification report) for the information system Provide process improvement recommendations Assist the Government to More ❯
Rancher, Azure Arc, etc. Workflow Orchestration Tools: Knowledge of Argo Workflow, Airflow, Nextflow or similar. Continuous Integration Tools: Use of Jenkins or similar. Security and Risk Management: Skills in vulnerabilityassessment and risk management; ideally including automated testing for vulnerabilities. Documentation: Ability to produce clear internal, and ideally customer-facing documentation. Details: Participation in Options Scheme £70k-£90k More ❯
Maidstone, Kent, United Kingdom Hybrid / WFH Options
Payter B.V
reporting Experience working with CI/CD pipelines, DevOps practices and methodologies, including infrastructure as code (IaC) and configuration management tools Knowledge of software security principles and practices, including vulnerabilityassessment, infrastructure, and penetration testing Technical skills: Automation Framework: Playwright Languages: Golang required. However, we'll train candidates proficient in other languages who are committed to learning Golang. More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
RSM
Cyber Security Consultant to join our team at RSM UK. You will work alongside our specialists to deliver offensive security services including digital footprint reconnaissance, social engineering, penetration testing, vulnerability assessments, and more to high-profile clients across various industries. The role involves delivering cyber risk and control assessments, developing cyber programs, and conducting offensive security services such as … vulnerability assessments and cyber incident response exercises. You will receive ongoing coaching, career mentoring, and support through our career pathway, with opportunities to develop market-leading skills and professional growth. Key Responsibilities: Supporting technical scoping activities for client assignments. Delivering fieldwork and preparing reports. Managing tasks effectively to completion. Staying updated on the latest cyber threats and technology trends. More ❯
is an experienced career opportunity to contribute to a cutting-edge cybersecurity project that significantly impacts the DOD/Intel community. You will engage in traditional systems engineering and vulnerability research, with a focus on Offensive Cyber Operations (OCO) and Defensive Cyber Operations (DCO), supporting assessments of large-scale weapons systems and critical national security operations. Responsibilities of the … Systems Engineer IV: Conduct cybersecurity assessments of large-scale DOD systems, utilizing an OCO mindset to execute DCO activities. Perform in-depth, long-term vulnerability assessments, applying systems engineering principles and analyzing available information, including architecture diagrams, build specifications, design documentation, and systems architecture. Execute independent verification and validation of security requirements and capabilities, integrating systems resiliency and security More ❯
an enthusiastic Cyber Security Consultantto join our team. Working alongside ourexperienced team of specialists, you'll be delivering offensive securityservices including digital footprint reconnaissance, social engineering,penetration testing and vulnerability assessments and more to high profileclients across all industries. The purpose of this role is to deliver our offensivesecurity services including digital footprint reconnaissance, socialengineering, vulnerability assessments, penetration … Consultantto join our team. Working alongside ourexperienced team of specialists, you'll be delivering cyber risk and control assessments,developing cyber programmes as well as delivering offensive security servicesincluding vulnerability assessments and cyber incident response exercises. You'll benefit from ongoing coaching, careermentoring, and be supported by our career pathway. You will have an opportunityto continue to develop market More ❯
Castleford, England, United Kingdom Hybrid / WFH Options
Northern Powergrid
managing risk to the network, drawing on asset data and climate related research and projections and deriving models to facilitate the development of asset, network and system risk assessments, vulnerability assessments and adaptation analyses Utilise fault data and forecasts to establish vulnerability thresholds and trigger levels for our adaptative pathways to assist in our climate change adaptation planning More ❯
security controls across low-latency systems and multi-cloud platforms (AWS, Azure, Alibaba Cloud) Collaborate with engineering teams to integrate secure coding practices into the SDLC Conduct threat modeling, vulnerability assessments, and code reviews Automate security processes through CI/CD integration using SAST, DAST, and related tools Assess third-party vendors and enforce security standards Mentor teams on More ❯
security controls across low-latency systems and multi-cloud platforms (AWS, Azure, Alibaba Cloud) Collaborate with engineering teams to integrate secure coding practices into the SDLC Conduct threat modeling, vulnerability assessments, and code reviews Automate security processes through CI/CD integration using SAST, DAST, and related tools Assess third-party vendors and enforce security standards Mentor teams on More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Vector Recruitment Ltd
from varied industries. Due to an unprecedented increase in workload, we are looking for a reliable Penetration Tester to work on overflow projects, delivering infrastructure penetration testing, including broader vulnerability assessments and security audits as needed. You will also produce clear, professional reports and deliver testing debriefs. This opportunity would suit someone who is already in a permanent position More ❯
from varied industries. Due to an unprecedented increase in workload, we are looking for a reliable Penetration Tester to work on overflow projects, delivering infrastructure penetration testing, including broader vulnerability assessments and security audits as needed. You will also produce clear, professional reports and deliver testing debriefs. This opportunity would suit someone who is already in a permanent position More ❯
London, King's Cross, United Kingdom Hybrid / WFH Options
Vector Recruitment
from varied industries. Due to an unprecedented increase in workload, we are looking for a reliable Penetration Tester to work on overflow projects, delivering infrastructure penetration testing, including broader vulnerability assessments and security audits as needed. You will also produce clear, professional reports and deliver testing debriefs. This opportunity would suit someone who is already in a permanent position More ❯
King's Cross, Isle Of Arran, United Kingdom Hybrid / WFH Options
Vector Recruitment
from varied industries. Due to an unprecedented increase in workload, we are looking for a reliable Penetration Tester to work on overflow projects, delivering infrastructure penetration testing, including broader vulnerability assessments and security audits as needed. You will also produce clear, professional reports and deliver testing debriefs. This opportunity would suit someone who is already in a permanent position More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
policies, and procedures to ensure clear understanding across the organisation. * Stay up-to-date with the latest security trends, technologies, and regulations to continuously improve our security practices. * Conduct vulnerability assessments and risk analysis. * Conduct Security Audits and Assessments: Perform regular security assessments to ensure compliance with industry standards. * Create and maintain security policies to ensure data confidentiality, integrity More ❯
hands-on approach to deliver transformation deliverables, including reports, frameworks, and action plans. Skills and Experience Required Security Assurance Expertise: Deep understanding of security assurance principles, risk management, and vulnerability assessment. Communication Skills: Exceptional ability to communicate technical cybersecurity concepts in business terms to diverse audiences. Business Acumen: Proven capability to understand and articulate the business implications of cyber More ❯