Reading, England, United Kingdom Hybrid / WFH Options
Oracle
a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help teams identify security-related weaknesses Collaborate with teams to help them triage and fix security issues What You’ll Bring Bachelor … Science or related field (e.g. Electrical Engineering) 2+ years industry experience in one or more of the following areas: software/product security assessments, penetrationtesting, red teaming, web application assessments Aptitude for self-study, setting and achieving long term goals (for example, learning an unfamiliar programming language … e.g. IDA Pro/Ghidra/Radare2), Fuzzing (e.g. Jazzer/AFL/Peach), Web Application assessment (e.g. Burp Suite Proxy, ZAP, REST API testing) Proficiency in manual penetrationtesting in at least TWO or more of the following areas - Mobile, API, Infrastructure, OS, Web Application Knowledge more »
security analyses, and implementing effective resolutions. The successful candidate will have a deep understanding of security principles and practices, with a strong background in penetrationtesting, vulnerability scanning, and issue resolution. This role requires over five years of experience and holding both Certified Ethical Hacker (CEH) and Certified … Information Systems Security Professional (CISSP) certifications. Key Responsibilities: PenetrationTesting: Conduct regular penetration tests to identify security weaknesses in systems, networks, and applications. Develop and execute test plans to simulate real-world cyber attacks. Document findings and provide actionable recommendations to mitigate identified risks. Vulnerability Scanning: Perform … for employees. Qualifications: Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field. Over 5 years of experience in security engineering, penetrationtesting, and vulnerability management. Certified Ethical Hacker (CEH) certification. Certified Information Systems Security Professional (CISSP) certification. Proficiency in security tools and technologies (e.g. more »
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses Keep yourself abreast of new TTPs (Tactics, Techniques & Procedures) of the attackers, mimic them in … Bring 12+ years industry experience with 7+ years in IT security in one or more of the following areas: software/product security assessments, penetrationtesting, red teaming, web application assessments Interest in vulnerability research and exploit development Demonstrable experience in designing and evaluating complex systems for security … e.g. IDA Pro/Ghidra/Radare2), Fuzzing (e.g. Jazzer/AFL/Peach), Web Application assessment (e.g. Burp Suite Proxy, ZAP, REST API testing) Proficiency in manual penetrationtesting in at least TWO or more of the following areas - Mobile, API, Infrastructure, OS, Web Application Knowledge more »
this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also looking for experience working with cloud hosting providers, managing application testing and working with system owners/developers to … technology environments. Work to defined SLAs & KPIs. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetrationtesting to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security training, reviewing the market for effective more »
Security Analyst - SC - IT Health Check - Milton Keynes - £400-450/Day Outside Security Analyst - IT Health Check - penetrationtesting - vulnerability scanning The successful Security Analyst will need to demonstrate commercial experience in the following areas: Vulnerability scanning and manual analysis of internal network Desktop and server build more »
learning and development opportunities you need to help you progress, both from internal courses as well as external. This is not an IT pen testing role – this is about taking the gloves off to achieve objectives. Because that’s what our opposition can, and will, do to compromise our … your application, it would be beneficial if you have one or more of the following (but these are not essential), Experience of design, implementation, testing or maintenance of at least one of the following, Information Technology Systems Control Systems Communications Systems Experience of hardware-in-the-loop testing. Your more »
learning and development opportunities you need to help you progress, both from internal courses as well as external. This is not an IT pen testing role this is about taking the gloves off to achieve objectives. Because that s what our opposition can, and will, do to compromise our … your application, it would be beneficial if you have one or more of the following (but these are not essential), Experience of design, implementation, testing or maintenance of at least one of the following Information Technology Systems Control Systems Communications Systems Experience of hardware-in-the-loop testing. Your more »