Security Tester and evaluator

London
10 months ago
Applications closed

Related Jobs

View all jobs

SOC SME

Penetration Tester | CHECK Team Member

Penetration Tester - Nato Cleared

Penetration Tester

Trainee Cyber Security Assistant - Training Course

Senior Penetration (PEN) Tester

We are looking for a skilled Security Tester and Evaluator to evaluate and conduct security testing for applications and systems. In this role, you will support threat modelling and security assurance activities in collaboration with the security team. As a security tester and evaluator, you will be responsible for designing and creating appropriate test strategies and test plans for systems and applications of our customers based on the security assurance profiles. Additionally, you will conduct and execute test plans using various security testing and assessments methods and techniques to identify vulnerabilities and ensure full coverage. Finally, you will propose a mitigation plans to mitigate identified vulnerabilities and strengthen the level of security of the target system.

About SeCORE:

SeCore Information Security Limited is an innovative cybersecurity company specializing in AI-driven, quantitative security assessment solutions. Our cutting-edge platform empowers businesses to enhance their security posture, achieve multi-standard compliance, and mitigate cyber risks efficiently. Join our dynamic team and be part of a groundbreaking journey in revolutionizing digital security.

Key Responsibility:

  1. Design and create testing plans and evaluation strategies that are connected to the identified security threats and assurance requirements. These include evaluation objectives, the testing scope, testing approaches and techniques, testing environment etc.
  2. Design and create a list of test cases and test scenarios that based on the identified testing plan and strategy.
  3. Conduct manual and automated security tests in order to evaluate and assess the security of applications and systems in different domain, e.g., web applications, mobile applications, APIs, networks, IoT application and cloud environments, and various sectors, like healthcare, insurance, finance, etc.
  4. Design and suggest a mitigation plan that consists of different measures and controls to mitigate and overcome the identified risks and vulnerabilities.

    Requirements:
  5. Proven experience in security testing, penetration testing, or ethical hacking.
  6. Strong knowledge of network security, web security, cryptography, operating systems and secure coding practices.
  7. Hands-on experience with security testing tools and scripting (Python, Bash, PowerShell, etc.).
  8. Familiarity with SOC 2, ISO 27001, NIST, OWASP, MITRE ATT&CK, SDLC frameworks.
  9. Ability to write detailed, professional security assessment reports.
  10. Strong problem-solving skills, analytical mindset, excellent communication skills and the ability to work in teams and to explain complex security concepts to non-technical stakeholders.

    Preferred Certifications (Not Mandatory but a Plus):
    GWAPT (GIAC Web Application Penetration Tester)
    CPT (Certified Penetration Tester)
    CEH (Certified Ethical Hacker)
    GPEN (GIAC Penetration Tester)
    CPT (Certified Penetration Tester)

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.