Skip page header and navigation

Skip sidebar content

Jobs

Category:Cyber Security× Clear filters

4 jobs

Penetration Tester

  • Flexible Working
  • England, United Kingdom
  • Contract
  • £650 - 750 per day + INSIDE IR35
  • IT and Digital
  • Cyber Security

Cyber Security Project Manager (750)

  • Cranfield, Bedfordshire, England
  • Contract
  • £30.78 - 30.78 per hour
  • Automotive and Motorsport
  • Cyber Security

Cyber Security Engineer

  • Leeds, West Yorkshire, England
  • Permanent
  • £0 per year + Excellent Salary plus benefits
  • IT and Digital
  • Cyber Security

Cyber Security Consultant - Cloud Technologies

  • West Yorkshire, England
  • Permanent
  • £0 per year + Excellent Salary plus benefits
  • IT and Digital
  • Cyber Security
Posted 20 May 2024
Job ref: 231977ALX

Penetration Tester

|
England, United Kingdom
  • Location:
    England, United Kingdom
  • Salary: £650 - 750 per day + INSIDE IR35
  • Category
  • Sector:
  • Contract type Contract

PENETRATION TESTER - CONTRACT OPPORTUNITY

  • REMOTE (OCCASIONAL TRIP TO LONDON)
  • INSIDE IR35
  • £650.00 - £750.00 PER DAY
  • ASAP START, ASAP INTERVIEWS

Gain in depth understanding of the product set and cloud (AWS) estate to be able to identify the threat landscape for which attackers may be able to exploit the post office network Throughout the engagement. Full review completed.

Introduction of penetration testing tooling that can be leveraged to conduct agile and iterative security testing across our product sets. Throughout the engagement. Tooling implemented and embedded.

Identify security weaknesses and vulnerabilities within our internal network, system and applications including the AWS estate. Throughout the engagement. Security weaknesses identified included misconfigurations, outdated software, weak authentication mechanisms, and other security flaws that could be exploited by malicious actors.

Evaluate the effectiveness of existing security controls deployed including testing the resilience of firewalls, IDS/IPS, access controls, and other defensive measures to determine whether they adequately protect against unauthorised access and exploitation Throughout the engagement. Evaluations completed in line with security team requirements.

Demonstrate the potential impact of successful attacks and quantify the associated risk to the business. Throughout the engagement. Simulating realistic attack scenarios, to show how an attacker could exploit identified vulnerabilities to gain unauthorised access, steal sensitive data, disrupt operations or escalate privileges within the internal network.