firm are looking to bring on an experienced Application Security Tester to join their team. They are running a Vulnerability Management and Application Security Testing program in which they are looking to identify, and prioritise for remediation, security vulnerabilities in their IT infrastructure and applications. Key responsibilities: - Web Application … PenetrationTesting - Bespoke Thick Client PenetrationTesting - Documentation - Automation - Secure Code Review - Security Tooling in CI/CD PLEASE REACH OUT IF THIS IS A ROLE THAT YOU MIGHT BE INTERESTED IN Application Security Tester - Leading Equity Trading Firm (Contract more »
Internally we use tools like Snyk (one of several tools available) to find issues in the software development lifecycle. Externally, SecOps work with a penetrationtesting company to define the scope of pentests and manage the process with engineering. Once issues are identified SecOps work closely with operations … working with the Engineering and Operations teams to resolve issues Managing vetting applications, supplier onboarding and security awareness programmes Plan and manage 3rd party penetrationtesting Support customer requests for information (RFI) on security related questions Manage supply chain security Identify and contribute to our continuous improvement plan more »
high calibre individual with a solid background in Security Engineering preferably with a degree in a security related field (ie. network engineering, computer science, penetrationtesting, digital forensics) and strong technical knowledge across various security pillars (network/cloud/infrastructure/email/endpoint). To be … Optimisation platforms also accepted). Data Classification and Labelling, Microsoft Purview. Bachelor's degree in a security related field is preferred (i.e., Security Analysis, PenetrationTesting, Malware Analysis, Digital Forensics, Network Engineering, Computer Science). Strong technical knowledge across various Security Engineering pillars (Network Security, Cloud Security, Infrastructure more »
custom scans for emerging critical weaknesses and providing rapid responses Creating technical content for our website to educate users about the latest vulnerabilities. Automating penetrationtesting processes to scale across multiple customers Contributing to research projects aimed at improving the platform. Providing technical support during client calls and … cyber security One or more industry qualifications such as OSCP, OSWE, OSEP, CRT, CCT APP, or CCT INF Experience in network and web application penetrationtesting, automation using Python, Ruby, or Golang, and familiarity with vulnerability scanning tools Strong communication skills and comfort with client-facing interactions If more »
Implement and manage cloud security tools and services like Azure Security Center, SIEM solutions (Splunk, ELK, Azure Sentinel), and conduct regular security assessments and penetration testing. - Develop and enforce cloud security policies, procedures, such as NIST, ISO 27001, and SOC 2. - Automate security workflows using Terraform, Azure DevOps CI … experience with Azure cloud security architectures and best practices. - Deep understanding of cloud security controls, tools (Azure Security Center), and services. - Familiarity with security testing methodologies like penetrationtesting and vulnerability assessments. - Experience with SIEM tools (Splunk, ELK, Azure Sentinel) and incident response/forensics. - Knowledge of more »
application security risks. They partner with Product, Engineering, and R&D teams to offer security guidance, build secure patterns, increase awareness, and conduct security testing and penetration testing. 🔐 Responsibilities: Build and maintain partnerships with Product, Engineering, and R&D teams. Lead threat modeling for high-priority engineering projects. … and address ad-hoc application security questions. Implement secure-by-default patterns and pave the way for secure development practices. Coordinate and participate in penetrationtesting and bug bounty programs. Contribute to scaling our secure software development program. Participate in product security incident response. Support compliance management efforts more »
Lead investigations into any cyber incidents. Understanding the current risk profile of the organisation by executing a programme of awareness and detection initiatives including PenetrationTesting, Vulnerability Analysis, reviewing as-built documentation, security assessments and improvement programmes. Monitoring and managing a 3rd party Security Operations Centre (SOC), reviewing … knowledge of NIST 800-53/ISO27001/GDPR. Experience of managing Cyber Security in a fast-paced manufacturing organisation. Experience in designing, building, testing, and implementing security systems, and monitoring their effectiveness. Have an excellent understanding of technology infrastructures including Next-Gen Firewalls, VPN, Cloud (Public and Private more »
betting industries. Our commitment to service excellence, quality, and reliability makes us a leader in our field. Job Description The Role: As a Senior Penetration Tester at Sportradar, you will play a pivotal role in enhancing our security posture. Collaborating closely with our architecture, development, and system administration teams … the ability to lead and mentor a team. The Challenge: Lead and contribute to the protection and security of our intellectual property. Conduct advanced penetrationtesting across various platforms and environments. Perform detailed risk analysis to identify and mitigate security issues leading to data loss or theft. Identify … for in-depth security reviews and threat modeling. Work in an international team and environment. Automate application and infrastructure scanning and reporting. Mentor junior penetration testers and provide guidance on best practices and methodologies. Stay updated with the latest security trends, vulnerabilities, and technology advancements. Qualifications Professional Requirements: Minimum more »
do this whilst learning about new technologies and approaches, with room to learn, develop and grow. Essential Requirements: Java experience Microservices Architecture Automated acceptance testing/BDD/Cucumber Performance and scalability testing, e.g. JMeter Penetrationtesting knowledge/OWASP Kubernetes/Container orchestration platform experience more »
Key Responsibilities: Monitor and analyze network traffic for unusual or suspicious activity. Investigate security breaches and other cyber security incidents. Conduct vulnerability assessments and penetration testing. Develop and implement security measures to protect information systems. Maintain and update security systems and tools. Collaborate with IT and other departments to more »
proactive, confident, credible, and persuasive team player. Collaborate and support developers, analysts, and data scientists to continually improve and innovate. Conduct SAST and DAST testing as well as penetrationtesting and threat simulations to identify potential risks. Have a practical understanding of firewall networking, ingress, VPNs, and more »
vulnerabilities. Compliance with the patching process. Monitoring security systems (IDS, Firewall, Anti-Virus) and event logs. Reporting IT KRIs/KPIs. Conduct periodic internal penetrationtesting and vulnerability assessments. Report status and exceptions to the Information Security Officer. Standard and Procedure Management: Ensure security procedures are met and … knowledge of Firewall (Cisco), IDS, and log monitoring software. Understanding of ITIL practices, ISO 27001 standards. (Preferred) Knowledge of EDR software, privileged access management, penetration and vulnerability tools, Change Auditor, ServiceNow. Ability to understand business processes and work effectively in cross-functional teams. Degree in Technology. 3-5 years … Support. Experience in developing and monitoring IT infrastructure system standards. Experience in firewall/IDS monitoring. (Preferred) Certifications: CISM, CISSP, CEH. (Preferred) Experience in penetration and vulnerability testing. (Optional) Experience in patch monitoring. more »
both achieve the desired security outcome and are operationally viable; Supporting change initiatives in navigating and utilising our central security services, including security monitoring, penetrationtesting and access management; Assuring that security control requirements are met, in conjunction with our Application Security Testing team, through the project more »
Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in-depth security assessments, penetrationtesting, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for more »
Base Web Security Gateway Email Security Data Loss Prevention Anti-Virus Preferred Qualifications Experience in network/host vulnerability analysis, intrusion analysis, digital forensics, penetrationtesting, or related areas 2-3 years of hands-on SOC/TOC/NOC experience GCIA required. GCIH, GCFE, CISSP, Security + more »
vulnerabilities Fix detected vulnerabilities to maintain a high-security standard Support in the development of company-wide best practices for IT security Perform internal penetrationtesting if required Help colleagues install security software and understand information security management Be an escalation point for the service desk, resolving security more »
development life cycle (SDLC) processes and methodologies.Knowledge of authentication mechanisms, encryption technologies, and security protocols such as IPSec, SSL, and SSH.Experience in developing and testing software using Python, C++, and Java.Excellent problem-solving skills and the ability to work well under pressure.Ability to communicate technical ideas and issues to … both technical and non-technical audiences.ResponsibilitiesCreating and implementing security protocols to ensure the security of IoT devices and applications.Developing and testing software to detect and prevent security breaches.Reviewing code and conducting risk assessments to identify vulnerabilities.Collaborating with cross-functional teams to ensure security and compliance are implemented throughout the … awareness programs to increase security awareness among employees.Leadership skills, ability to manage and develop a team.Identifying and managing threats and breaches to security infrastructure.Conducting penetrationtesting of IoT devices and applications to test security measures.Experience in developing and driving capability growth.Automotive cyber expertise would be desirable.Experience in securing more »
we help to protect our customers from current and emerging security threats. We provide a full spectrum of cyber security services including CREST-certified penetrationtesting, 24/7 threat monitoring, compliance support and security training to help organisations protect against today’s evolving threat landscape. Interested? If more »
Manchester, England, United Kingdom Hybrid / WFH Options
Henderson Scott
design and approach achieve the desired security outcomes and are operationally viable. Supporting change initiatives in utilising central security services, such as security monitoring, penetrationtesting, and access management. Ensuring security control requirements are met throughout the project life cycle, in collaboration with our Application Security Testingmore »
a focus on exceptional customer service and operational excellence. ------------------------------------------------------------------------------------- Skills and experience Minimum of 5 years’ experience in endpoint security, malware analysis, threat hunting, penetrationtesting, incident response, reverse engineering, or digital forensics. Must have strong experience in the operational side. Comprehensive knowledge of AWS cloud infrastructure, including more »
and maximise process efficiencies to drive exciting product launches. ⚙️💡🔧✅ Responsibilities: Build, retain, and motivate a growing engineering team with diverse skillsets (software development, SRE, testing, project management). Own the product roadmap, ensuring timely delivery of high-quality, innovative medical devices. Oversee the entire product lifecycle, from strategy and … Implement a robust software development process compliant with medical device regulations (ISO 13485, ISO-IEC 62304). Champion information security (ISO 27001) through design, penetrationtesting, and secure coding practices. Lead product management, managing backlog prioritization and stakeholder inputs for frequent releases. Drive the adoption of best practices … scalable and robust engineering processes to support company expansion. Communicate engineering strategy to stakeholders and the board. Oversee the AWS cloud infrastructure for development, testing, production, and continuous integration/deployment. Experience Requirements: Over 7 years experience in Leadership in Medical Imaging Deep understanding of one medical imaging modality more »
protection and management Knowledge of security protection and disaster recovery Understanding of vulnerability assessment and patch management Familiarity with device as a service and penetrationtesting If you are interested in this role, please email your resume to Jai.kumar@teceze.com or visit our website at www.teceze.com to learn more »
with cross-functional teams to identify security risks, and developing mitigation strategies. Implementing security controls and protocols across the organisation. Conducting vulnerability assessments and penetrationtesting to identify potential security weaknesses. Managing relationships with third-party vendors to ensure they meet our security requirements. Collaborating with the IT more »
Security Engineer will join a highly skilled team of engineers to ensure the security of software systems by reviewing designs, auditing code, and performing penetration tests. The role involves developing and implementing vulnerability mitigation strategies, conducting risk assessments and threat modelling, and managing vulnerabilities using industry standards. You will … scheme What’s required of the Software Security Engineer? Extensive software security experience, covering applications, networks and system security Experience with security protocols and penetrationtesting, if this has been with tools such as Burp Suite then even better! Ideally a relevant certification such as CISSP, CEH, OSCP more »
Supported by Google with marketing investment. 📍Managed Security Services company mainly but also covers: IT Security Managed Services, IT Security Consulting, IT Security Management, PenetrationTesting, and Cloud based Authentication The Role: 📍Will consist of 100% new business but all via channel partners and end users. 📍You will more »