London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
Experience 3-5+ years' professional penetration testing/offensive security experience Strong understanding of enterprise infrastructure, AD security, networking, and protocols Proficiency with tools such as Nmap, Nessus, Metasploit, BloodHound, Burp Suite, Kali/Linux toolsets Solid track record of delivering infrastructure pentests end-to-end Excellent communication skills, including producing business-focused reporting Preferred Qualifications CHECK Team More ❯
in the above-mentioned areas of responsibility Advanced knowledge and experience in application, network, and cloud security testing Proven knowledge and experience with penetration testing tools (e.g., Burp Suite, Metasploit, Nmap, Kali Linux, Wireshark, etc.) and scripting experience for automation (Python, PowerShell, Bash, etc.) Strong knowledge and experience with the OWASP Top 10, the MITRE ATT&CK framework, and More ❯
one or more of the following certifications: GPEN, GWAPT, GISF, GXPN, OSCP, OSCE, OSWP, OSEE, CISSP, or CEH - Experience with at least 3 of the following tools: •Kali Linux •Metasploit •Burp Suite •Nmap •Cobalt Strike •Tenable Nessus •WebInspect •Scuba •AppDetective Education Bachelor's or Master's degree in a related discipline Pay & Benefits Summary •Pay rate up to More ❯
one or more of the following certifications: GPEN, GWAPT, GISF, GXPN, OSCP, OSCE, OSWP, OSEE, CISSP, or CEH - Experience with at least 3 of the following tools: •Kali Linux •Metasploit •Burp Suite •Nmap •Cobalt Strike •Tenable Nessus •WebInspect •Scuba •AppDetective Education Bachelor's or Master's degree in a related discipline Pay & Benefits Summary •Pay rate up to More ❯
one or more of the following certifications: GPEN, GWAPT, GISF, GXPN, OSCP, OSCE, OSWP, OSEE, CISSP, or CEH - Experience with at least 3 of the following tools: •Kali Linux •Metasploit •Burp Suite •Nmap •Cobalt Strike •Tenable Nessus •WebInspect •Scuba •AppDetective Education Bachelor's or Master's degree in a related discipline Pay & Benefits Summary •Pay rate up to More ❯
and deliverables Extensive experience with common automated VAPT tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave Expert in common attack tools and frameworks such as Wireshark, Kali, Metasploit, etc. Expert in mobile platform security technology, including vulnerability identification and exploitation tools, as well as mobile platform security best practices, frameworks, etc. Understand VAPT in the context of More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
penetration testing Strong knowledge of attacker frameworks (e.g., MITRE ATT&CK, NIST adversary simulation guidelines) Highly proficient with red team tools and techniques (e.g., Cobalt Strike, Mimikatz, Sliver, BloodHound, Metasploit etc.) Hands-on experience with Active Directory attacks , privilege escalation , lateral movement , and stealth operations Ability to conduct social engineering and phishing campaigns Strong understanding of networking, Windows/ More ❯
london (city of london), south east england, united kingdom
Bonhill Partners
experience in offensive security, including red teaming and penetration testing Strong understanding of the MITRE ATT&CK framework and threat emulation methodologies Proficiency in offensive tools (Cobalt Strike, Sliver, Metasploit, etc.) and custom payload development Experience with evasion techniques (e.g., AV/EDR bypass, obfuscation, DLL sideloading) Good knowledge of Windows and Linux internals, AD exploitation, and cloud environments More ❯
Familiarity with customer satisfaction and retention initiatives. Knowledge of Lean and Agile tools (e.g., Microsoft Planner, JIRA, Confluence). Involvement in offensive cybersecurity (red teaming, use of tools like Metasploit, Nmap, etc.). Experience with physical security assessments aligned with NIS and NPSA standards. Expertise in Digital Forensics and Incident Response (DFIR) in industrial environments (e.g., VxWorks, RTOS, Embedded More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Vanquish Technologies Limited
and validate threat scenarios. Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8+ years of experience in threat intelligence, cybersecurity More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitmen
Hands-on experience in penetration testing or IT Health Check delivery Eligibility to obtain and maintain UK security clearances. Familiarity with common tools such as Burp Suite, Nmap, Nessus, Metasploit, etc. Understanding of network protocols (TCP/IP, OSI model) and common web application Current penetration testing qualification such as Crest Practitioner Security Analyst (CPSA), Crest Registered Tester (CRT More ❯
Breach & Attack Simulation (BAS) tools for threat scenario development Strong knowledge of adversary TTPs, MITRE ATT&CK, and modern threat modelling techniques Technical proficiency with pentesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing actionable threat intelligence reports and clear technical briefings I?????f you are ready to drive the next wave of cyber More ❯
of the following certifications: Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and … full-time professional experience conducting penetration testing and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Performing exploit development Identifying gaps in tools More ❯