Reading, England, United Kingdom Hybrid / WFH Options
Searchability NS&D
experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Skilled in tools such as Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating systems, and cloud security principles Relevant certifications (OSCP, CEH, GPEN, CRTP) highly desirable Excellent analytical More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Searchability NS&D
experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Skilled in tools such as Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating systems, and cloud security principles Relevant certifications (OSCP, CEH, GPEN, CRTP) highly desirable Excellent analytical More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Investigo
in penetration testing, ethical hacking, or red teaming Deep knowledge of OWASP Top 10, MITRE ATT&CK, and CVSS scoring systems Proficiency with tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux Scripting experience with Python, Bash, or PowerShell Understanding of network protocols, operating systems, and cloud platforms Certifications such as OSCP , CEH , GPEN , or CRTP (highly desirable More ❯
exfiltration techniques. • Proactive interest in emerging technologies and techniques related to penetration testing. • Proven ability to perform computer network vulnerability assessment and penetration testing. • Proficient in tools such as Nmap, Wireshark, Metasploit, Canvas, Kismet, Burp Suite, Kali Linuxetc. • Understanding of operating systems (MaxOS, Windows, Linux) and how clients/servers are built and secured. • Ability to research, prioritize, problem solve More ❯
Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating systems, and cloud environments Relevant certifications (e.g., OSCP, CEH, GPEN, CRTP) are highly desirable Excellent More ❯
Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating systems, and cloud environments Relevant certifications (e.g., OSCP, CEH, GPEN, CRTP) are highly desirable Excellent More ❯
red teaming engagements Strong knowledge of frameworks such as OWASP Top 10 , MITRE ATT&CK , and risk-scoring methods like CVSS Practical use of tools such as Burp Suite, Nmap, Metasploit, Wireshark, Kali Linux Proficiency with scripting languages (e.g., Python, Bash, PowerShell ) Broad understanding of operating systems, networking, and cloud-based environments Professional certifications such as OSCP, GPEN, CEH, CRTP More ❯
based technologies (AWS Platform, Azure Platform, Google Cloud) • Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerability assessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetration testing, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must meet ALL of the below criteria. The candidate must: • Have More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
with clients. Confident with OWASP Top 10 and SANS Top 25 vulnerabilities and ability to effectively communicate methodologies and techniques with development teams Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux, and Nessus for effective vulnerability assessment and penetration testing. Your Profile Essential skills/knowledge/experience: (Up to 10, Avoid repetition) Proficient Pen Testing Tools - Cobalt Strike More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
concepts to both technical and non-technical audiences, including executive stakeholders. Perform technical quality reviews and engage in direct technical conversations with clients. Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux for effective vulnerability assessment and penetration testing. Apply knowledge of OWASP Top 10 and SANS Top 25 vulnerabilities and communicate methodologies with development teams. Skills, Experience, and Abilities More ❯
the above-mentioned areas of responsibility Advanced knowledge and experience in application, network, and cloud security testing Proven knowledge and experience with penetration testing tools (e.g., Burp Suite, Metasploit, Nmap, Kali Linux, Wireshark, etc.) and scripting experience for automation (Python, PowerShell, Bash, etc.) Strong knowledge and experience with the OWASP Top 10, the MITRE ATT&CK framework, and common attack More ❯
years of relevant work experience. • Experience in penetration testing and/or red teaming. • Knowledge of tools used for offensive security testing such as Kali Linux, Cobalt Strike, NMAP, Wireshark, Metasploit, Burp suite, Bloodhound, PowerShell Empire, Sqlmap, etc. • Experience in shell scripting or automation of simple tasks using Perl, Python, or Ruby. • Experience developing, extending, or modifying exploits, shellcode, or More ❯
secure configuration practices. Experience identifying and exploiting vulnerabilities across various platforms (e.g., Windows, Linux, macOS, network devices, web APIs). Proficient with open-source and commercial security tools (e.g., Nmap, Kali Linux, Cobalt Strike, Burp Suite, etc.). Proficiency with scripting languages such as Python, Ruby, Lua, NSE, or PowerShell. Experience developing or integrating AI/ML solutions into cybersecurity More ❯
GWAPT, OSWA, or equivalent. Strong understanding of network protocols, security controls, and common vulnerabilities. Experience with web application testing, API testing, and infrastructure assessments. Familiarity with tools such as Nmap, Burp Suite, Metasploit, Cobalt Strike, or Kali Linux. Programming or scripting proficiency in Python, Ruby, and/or C/C++ . Understanding of attack frameworks such as MITRE ATT More ❯
GWAPT, OSWA, or equivalent. Strong understanding of network protocols, security controls, and common vulnerabilities. Experience with web application testing, API testing, and infrastructure assessments. Familiarity with tools such as Nmap, Burp Suite, Metasploit, Cobalt Strike, or Kali Linux. Basic scripting skills in Python, PowerShell, Ruby, or similar. Understanding of attack frameworks such as MITRE ATT&CK. Preferred Experience: Exposure to More ❯
or Cyber Scheme Team Member. 2+ years of penetration testing experience Ability to maintain UK security clearances as required by the business. Skills & Knowledge: Skilled in tools like Nessus, Nmap, BurpSuite, Metasploit. Proficient in at least one scripting language (Bash, PowerShell, Python, etc.). Strong understanding of TCP/IP, OSI model, and network device reviews. Solid experience testing web More ❯
Keyworth, Nottinghamshire, United Kingdom Hybrid / WFH Options
UK Research and Innovation (UKRI)
systems, core computer fundamentals, networking, authentication, and cloud platforms like AWS and Azure. (S&I) Proficient with open-source penetration testing and assessment tools such as Metasploit, Burp Suite, Nmap, and strong understanding of networking configurations and products. (S&I) Ability to quickly adapt to emerging technologies, vulnerabilities, and new penetration testing tools. (S&I) Skilled in drafting detailed reports More ❯
solutions using Linux and traditional appliance network devices. DESIRED SKILLS: • Scripting including Python, Bash and Perl and frameworks like Ansible. • Understanding of Linux network security tools (e.g., Metasploit, Netcat, Nmap, iptables, BurpSuite, IDS, SELinux, etc.). • Experience monitoring threats via a SIEM console such as Solarwinds, Cisco Network Analysis Module (LogRhythm/Splunk preferred). • Experience performing analysis of log More ❯
/Bluetooth) technology (hardware or core software). • Familiarity with mobile phone operating systems (Android/iOS). • Experience working with network security tools such as Metasploit, Netcat, BurpSuite, NMAP, Nessus or similar. • Understanding/use of network IDS/IPS technologies such as firewalls, proxies, ipchains, iptables, Snort, and related technologies. • Experience managing and installing network technologies such as More ❯
principles. Experience with evaluating system security configurations. Understand common Web Application vulnerabilities like SQLi, XSS, CSRF, and HTTP Flooding. Experience with penetration testing tools such as Metasploit, Burp Suite, Nmap, etc. Fundamentals of network routing & switching and assessing network device configurations. Familiarity in evaluating findings and performing root cause analysis. Demonstrated ability to work alone and/or within a More ❯
Linux, ma c OS, network devi c es, web APIs). Profi c ient with open-sour c e and c ommer c ial se c urity tools (e.g., Nmap, Kali Linux, C obalt Strike, Burp Suite, et c .). Strong software development skills, particularly in Python, Ruby, and C/C++ , with experience creating custom testing tools and More ❯
least one of the following areas: incident detection and response, malware analysis, or cyber forensics. Experience with at least 3 of the following tools: Kali Linux Metasploit Burp Suite Nmap Cobalt Strike Tenable Nessus WebInspect Scuba AppDetective Ref: (ALTA IT More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Task Force Talent LLC
clearance. Cloud environments (AWS/Azure/Google Cloud Platform) Developing security test plans Linux/Windows as well as virtual and wireless platforms Infosec policies Tools such as nmap, Wireshark, Metasploit, IDA Pro, Encase, etc. Network security technologies (firewalls, proxies, iptables, VPN, IDS/IPS, etc.) Further details will be provided to qualified candidates after an initial interview. All More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
UKRI
systems, core computer fundamentals, networking, authentication, and cloud platforms like AWS and Azure. (S&I) Proficient with open-source penetration testing and assessment tools such as Metasploit, Burp Suite, Nmap, and strong understanding of networking configurations and products. (S&I) Ability to quickly adapt to emerging technologies, vulnerabilities, and new penetration testing tools. (S&I) Skilled in drafting detailed reports More ❯
CCIE Proficiency in Python, PowerShell, and Bash scripting Hands-on experience with both Linux and Windows operating systems Deep familiarity with tools such as Kali Linux, Metasploit Pro, and NMAP Ability to exploit vulnerabilities such as SQL injection, XSS, and conduct password cracking Prior experience on a Cyber Defense Blue Team (e.g., SOC, Incident Response, Threat Hunting, or Security Architecture More ❯