Security Tester and evaluator

London
10 months ago
Applications closed

Related Jobs

View all jobs

Trainee Medical Scientist

SOC SME

Penetration Tester

Penetration Tester

Penetration Tester

Penetration Tester

We are looking for a skilled Security Tester and Evaluator to evaluate and conduct security testing for applications and systems. In this role, you will support threat modelling and security assurance activities in collaboration with the security team. As a security tester and evaluator, you will be responsible for designing and creating appropriate test strategies and test plans for systems and applications of our customers based on the security assurance profiles. Additionally, you will conduct and execute test plans using various security testing and assessments methods and techniques to identify vulnerabilities and ensure full coverage. Finally, you will propose a mitigation plans to mitigate identified vulnerabilities and strengthen the level of security of the target system.

About SeCORE:

SeCore Information Security Limited is an innovative cybersecurity company specializing in AI-driven, quantitative security assessment solutions. Our cutting-edge platform empowers businesses to enhance their security posture, achieve multi-standard compliance, and mitigate cyber risks efficiently. Join our dynamic team and be part of a groundbreaking journey in revolutionizing digital security.

Key Responsibility:

  1. Design and create testing plans and evaluation strategies that are connected to the identified security threats and assurance requirements. These include evaluation objectives, the testing scope, testing approaches and techniques, testing environment etc.
  2. Design and create a list of test cases and test scenarios that based on the identified testing plan and strategy.
  3. Conduct manual and automated security tests in order to evaluate and assess the security of applications and systems in different domain, e.g., web applications, mobile applications, APIs, networks, IoT application and cloud environments, and various sectors, like healthcare, insurance, finance, etc.
  4. Design and suggest a mitigation plan that consists of different measures and controls to mitigate and overcome the identified risks and vulnerabilities.

    Requirements:
  5. Proven experience in security testing, penetration testing, or ethical hacking.
  6. Strong knowledge of network security, web security, cryptography, operating systems and secure coding practices.
  7. Hands-on experience with security testing tools and scripting (Python, Bash, PowerShell, etc.).
  8. Familiarity with SOC 2, ISO 27001, NIST, OWASP, MITRE ATT&CK, SDLC frameworks.
  9. Ability to write detailed, professional security assessment reports.
  10. Strong problem-solving skills, analytical mindset, excellent communication skills and the ability to work in teams and to explain complex security concepts to non-technical stakeholders.

    Preferred Certifications (Not Mandatory but a Plus):
    GWAPT (GIAC Web Application Penetration Tester)
    CPT (Certified Penetration Tester)
    CEH (Certified Ethical Hacker)
    GPEN (GIAC Penetration Tester)
    CPT (Certified Penetration Tester)

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.

Cyber Security Jobs for Career Switchers in Their 30s, 40s & 50s (UK Reality Check)

If you’re thinking about switching into cyber security in your 30s, 40s or 50s, you’re in good company. Across the UK, organisations of all sizes are hiring people from diverse backgrounds to protect systems, data & customers. But with hype around “hackers” & quick-win courses, it’s hard to separate reality from fiction. This guide gives you a UK reality check: which roles genuinely exist, what employers actually want, how training really works, what to expect on salary & progression & whether age matters. Whether you come from finance, project management, operations, law, HR or customer service, there is a credible route into cyber security if you approach it strategically.