the above-mentioned areas of responsibility Advanced knowledge and experience in application, network, and cloud security testing Proven knowledge and experience with penetration testing tools (e.g., Burp Suite, Metasploit, Nmap, Kali Linux, Wireshark, etc.) and scripting experience for automation (Python, PowerShell, Bash, etc.) Strong knowledge and experience with the OWASP Top 10, the MITRE ATT&CK framework, and common attack More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
Required Skills & Experience 3-5+ years' professional penetration testing/offensive security experience Strong understanding of enterprise infrastructure, AD security, networking, and protocols Proficiency with tools such as Nmap, Nessus, Metasploit, BloodHound, Burp Suite, Kali/Linux toolsets Solid track record of delivering infrastructure pentests end-to-end Excellent communication skills, including producing business-focused reporting Preferred Qualifications CHECK More ❯
of the following certifications: GPEN, GWAPT, GISF, GXPN, OSCP, OSCE, OSWP, OSEE, CISSP, or CEH - Experience with at least 3 of the following tools: •Kali Linux •Metasploit •Burp Suite •Nmap •Cobalt Strike •Tenable Nessus •WebInspect •Scuba •AppDetective Education Bachelor's or Master's degree in a related discipline Pay & Benefits Summary •Pay rate up to 115/h W2 Cybersecurity More ❯
of the following certifications: GPEN, GWAPT, GISF, GXPN, OSCP, OSCE, OSWP, OSEE, CISSP, or CEH - Experience with at least 3 of the following tools: •Kali Linux •Metasploit •Burp Suite •Nmap •Cobalt Strike •Tenable Nessus •WebInspect •Scuba •AppDetective Education Bachelor's or Master's degree in a related discipline Pay & Benefits Summary •Pay rate up to 74/h W2 Cybersecurity More ❯
of the following certifications: GPEN, GWAPT, GISF, GXPN, OSCP, OSCE, OSWP, OSEE, CISSP, or CEH - Experience with at least 3 of the following tools: •Kali Linux •Metasploit •Burp Suite •Nmap •Cobalt Strike •Tenable Nessus •WebInspect •Scuba •AppDetective Education Bachelor's or Master's degree in a related discipline Pay & Benefits Summary •Pay rate up to 93/h W2 Cybersecurity More ❯
with customer satisfaction and retention initiatives. Knowledge of Lean and Agile tools (e.g., Microsoft Planner, JIRA, Confluence). Involvement in offensive cybersecurity (red teaming, use of tools like Metasploit, Nmap, etc.). Experience with physical security assessments aligned with NIS and NPSA standards. Expertise in Digital Forensics and Incident Response (DFIR) in industrial environments (e.g., VxWorks, RTOS, Embedded Linux, WinCC More ❯
Details: Hands-on pentesting experience - 3-7+ years in penetration testing, red teaming, or offensive security across networks, cloud, AD, and web apps. Offensive security tooling - expertise with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITRE ATT&CK mapping for both More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitmen
Key Skills Hands-on experience in penetration testing or IT Health Check delivery Eligibility to obtain and maintain UK security clearances. Familiarity with common tools such as Burp Suite, Nmap, Nessus, Metasploit, etc. Understanding of network protocols (TCP/IP, OSI model) and common web application Current penetration testing qualification such as Crest Practitioner Security Analyst (CPSA), Crest Registered Tester More ❯
STM32, ESP32), RTOS, and wireless protocols (Zigbee, Bluetooth, Wi-Fi, Cellular, LoRa WAN). Skilled in interfaces like UART, JTAG, SPI, I2C for debugging. Proficiency with tools such as Nmap, Burp Suite, Wireshark, Nessus. Strong programming foundation (Python, C/C++, Java, etc.). Bachelor's degree in Cybersecurity, Computer/Electrical/Electronic Engineering, Telecommunications or IT. Preferred: Previous More ❯
met affiniteit of ervaring in technische security testing. De volgende domeinen ken je goed: 3LoD-model en relevante normenkaders zoals ISO 27001, NIS2 en GDPR, tooling zoals Burp Suite, Nmap en Metasploit. Certificeringen zoals OSCP, CPTS of CISSP zijn een pluspunt. Je kan ervaring aantonen met het uitvoeren van penetratietesten (web applications, mobiele apps, infrastructuur), met technische rapportering en het … Interprétariat, Uitvoering, Burp suite, Néerlandais, Inspection, Frans, Politique, Infrastructure, Metasploit, Ressources humaines, Penetratietest, Gestion des risques, ISO Standards, Rédaction, Burp suite, Rapport, Business, Informatique, Infrastructuur, Overtuigingskracht, Consulting, Risicobeheer, Management, Nmap, Metasploit, Surveillance, Service de sécurité, Application web, Audits, Nmap, Application mobile, Esprit critique, Stressbestendigheid, Cyber Security, Consulting, Audit, Webapplicatie, Engelse taal, Rapport, Beveiligingsdienst, Analyse, Suivi des problèmes, Mobile app, Service More ❯
met affiniteit of ervaring in technische security testing. De volgende domeinen ken je goed: 3LoD-model en relevante normenkaders zoals ISO 27001, NIS2 en GDPR, tooling zoals Burp Suite, Nmap en Metasploit. Certificeringen zoals OSCP, CPTS of CISSP zijn een pluspunt. Je kan ervaring aantonen met het uitvoeren van penetratietesten (web applications, mobiele apps, infrastructuur), met technische rapportering en het … Interprétariat, Uitvoering, Burp suite, Néerlandais, Inspection, Frans, Politique, Infrastructure, Metasploit, Ressources humaines, Penetratietest, Gestion des risques, ISO Standards, Rédaction, Burp suite, Rapport, Business, Informatique, Infrastructuur, Overtuigingskracht, Consulting, Risicobeheer, Management, Nmap, Metasploit, Surveillance, Service de sécurité, Application web, Audits, Nmap, Application mobile, Esprit critique, Stressbestendigheid, Cyber Security, Consulting, Audit, Webapplicatie, Engelse taal, Rapport, Beveiligingsdienst, Analyse, Suivi des problèmes, Mobile app, Service More ❯
environments, perform testing, and generate technical reports for Common Criteria and FIPS evaluations. Perform vulnerability analysis on product/system designs against applicable security criteria using tools like Nessus, NMAP, and Wireshark. Develop mitigation strategies for vulnerabilities identified during security testing. Act as the primary project point of contact (POC) for internal and external stakeholders. Required Skillset: 5+ years of … validation. Expertise in cryptographic encryption algorithms, key exchange protocols, PKI, random number generators, and hashing/message authentication algorithms. Proficiency in vulnerability analysis tools such as Nessus, NMAP, and Wireshark. Proficiency in FIPS 186-4/5, SP 800-186, SP 800-90B, and FIPS 140-3 requirements. Knowledge of security protocols (e.g., SSH, IPsec, TLS). Strong technical More ❯