London, England, United Kingdom Hybrid / WFH Options
Client Server
a Red Brick/Russel Group, top tier university - Computer Science, Engineering, Physics or Mathematics; MSc or PhD advantageous You have commercial experience with Penetrationtesting, Offensive Security, Red Team testing You have a good understanding (and interest in) low level concepts including operating systems and networking more »
security and privacy of our customers.Enhance Bumble Inc.’s mobile and web application defences using the latest techniques in software composition, static and dynamic testing and threat modelling for systems written in Kotlin, Swift, PHP, Go and C.Conduct sophisticated security assessments and penetrationtesting to preemptively identify more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, Vulnerability Scanning, PenetrationTesting,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards relevant to the SaaS industry, such as more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, Vulnerability Scanning, PenetrationTesting,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards relevant to the SaaS industry, such as more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, Vulnerability Scanning, PenetrationTesting,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards relevant to the SaaS industry, such as more »
them clearly to all levels of hierarchy, including senior leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetrationtesting, incident response, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail more »
Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security standards and regulations Maintain and more »
Penetration Test Sales Manager - UK remote to £130k OTE, no cap! Excellent pentest service offering! Are you an experienced and proven Sales/Business Development Executive with a proven track record in driving new business revenue? We are an established Cybersecrity recruitment agency, searching for a high-performing individual … of business and achievement of targets. You don't need to be a technical genius, but you do need to have basic understanding on PenetrationTesting and how to build the value proposition with long lasting relationships. You will be able to keep and manage any accounts you … and your commission high, and the team is supported by a very skilled presales consultant to help build the proposals, bids, and scope the testing to a high technical level, delivering best possible outcomes. There's also a relatively short lead time for services which is closely monitored. The more »
is required Proven business acumen and commercial awareness Experience with the '3 Lines of Defense' Governance Model Working knowledge of IT security best practices, penetrationtesting, vulnerability management, Incident, Problem & Change Management, and Business Continuity Robust experience in project management, analytical skills, and continuous improvement methodologies Strategic thinking more »
development life cycle (SDLC) processes and methodologies.Knowledge of authentication mechanisms, encryption technologies, and security protocols such as IPSec, SSL, and SSH.Experience in developing and testing software using Python, C++, and Java.Excellent problem-solving skills and the ability to work well under pressure.Ability to communicate technical ideas and issues to … both technical and non-technical audiences.ResponsibilitiesCreating and implementing security protocols to ensure the security of IoT devices and applications.Developing and testing software to detect and prevent security breaches.Reviewing code and conducting risk assessments to identify vulnerabilities.Collaborating with cross-functional teams to ensure security and compliance are implemented throughout the … awareness programs to increase security awareness among employees.Leadership skills, ability to manage and develop a team.Identifying and managing threats and breaches to security infrastructure.Conducting penetrationtesting of IoT devices and applications to test security measures.Experience in developing and driving capability growth.Automotive cyber expertise would be desirable.Experience in securing more »
to ensure they are engaged for any integrations to existing Tech managed products for example Single Sign on.Lead on and with facilitating and coordinating penetrationtesting for business owned products. Ensure tests are scoped and vulnerabilities are remediated in line with SLA. Work with business and external suppliers.Track more »
Responsibilities: Manage the Security Operations and Engineering team Oversee security products, solutions, and services Ensure security controls meet regulatory standards and operate effectively Manage penetrationtesting activities Monitor infrastructure, including Cloud, for potential weaknesses and breaches Work with external partners to maintain an excellent level of service Assess more »
a focus on exceptional customer service and operational excellence. ------------------------------------------------------------------------------------- Skills and experience Minimum of 5 years’ experience in endpoint security, malware analysis, threat hunting, penetrationtesting, incident response, reverse engineering, or digital forensics. Must have strong experience in the operational side. Comprehensive knowledge of AWS cloud infrastructure, including more »
have a solid development experience with various languages, e.g. Java, Python and Go;You have worked with or experienced various security exercises for example, penetrationtesting, security researching, red teaming or bug bounty programs;You have experience with security tooling such as SAST, DAST and SCA;Great communication more »
environmentYou have previous software development experience and a good understanding of modern programming approachesYou have worked with or lead various security exercises for example, penetrationtesting, security researching, red teaming or bug bounty programs;You have experience in architectural design of complex engineering solutions, in particular to security more »
to the team’s ways of workingYou’ll be part of a broader Enterprise Vulnerability Management team, working among people skilled in scanning, pen testing, data analytics and driving security improvements with other teams. You’ll be part of defining and implementing on the strategic direction of the function more »
lead a growing vulnerability management team. A successful candidate will work with the team to analyse emerging vulnerabilities provided by threat intelligence sources and penetration testing. The vulnerability manager will collaborate with various technology and engineering teams to share vulnerability findings, provide guidance, and assist through the remediation process. more »
the assessment and remediation of security vulnerabilities. These activities will include leading on auditing patch and general system services compliance status, privileged account use, penetrationtesting and remediating cybersecurity vulnerabilities. You will develop and execute security policies and procedures within Digital Services and attend and present at relevant more »
Security Engineer will join a highly skilled team of engineers to ensure the security of software systems by reviewing designs, auditing code, and performing penetration tests. The role involves developing and implementing vulnerability mitigation strategies, conducting risk assessments and threat modelling, and managing vulnerabilities using industry standards. You will … scheme What’s required of the Software Security Engineer? Extensive software security experience, covering applications, networks and system security Experience with security protocols and penetrationtesting, if this has been with tools such as Burp Suite then even better! Ideally a relevant certification such as CISSP, CEH, OSCP more »
Security Engineer will join a highly skilled team of engineers to ensure the security of software systems by reviewing designs, auditing code, and performing penetration tests. The role involves developing and implementing vulnerability mitigation strategies, conducting risk assessments and threat modelling, and managing vulnerabilities using industry standards. You will … scheme What's required of the Software Security Engineer? Extensive software security experience, covering applications, networks and system security Experience with security protocols and penetrationtesting, if this has been with tools such as Burp Suite then even better! Ideally a relevant certification such as CISSP, CEH, OSCP more »
Familiarity with vulnerability scanning and detection technologies. - Familiarity with MITRE ATT&CK framework - Excellent ability to present information and results to the business - Pen testing experience Key responsibilities in this role will include: - This role will involve working closely with the Enterprise Security team - Great understanding of Threat and more »
occur with our touchpoints with other business systems such as the broadcast management system. As necessary work closely with the Infosec team on PEN testing and security priorities. Think cloud-native and serverless for all solutions and consider scalability in everything we do using services like ALBs, DynamoDB and more »
some experience in real time & Near Real time business events integration from FIS PaaS Solution for Reporting & Dashboards Some Networking & Security experience along with PenetrationTesting We’re a leading provider of products and consulting services to the capital markets industry, with over 3000 staff globally. First Derivative more »
the key enabler between security, product, and engineering teams. You will need to understand security requirements from a variety of outputs (vulnerability scanners, pen testing, code scans, regulatory requirements), triage and prioritize the findings, and then work with Product Managers to implement changes to improve the security of our … review processes whenever application security expertise is required Manage application framework and perimeter security improvement projects Assist with the planning and execution of application penetration tests Support the creation and maintenance of product security information within our knowledge base to assist clients, RFPs and the bid process Serve as more »
You’ll work on complex, Cloud and DevOps centric data and digital services, providing knowledge across Public Cloud (Azure, AWS, GCP) security architectures, external testing (Pen Testing etc) and DevOps tools such as Docker and Kubernetes etc. You’ll be key in growing the Information Security team, driving more »