areas, including WAF Proofs of Concept (PoCs) Provide specialized WAF-focused advice on web and API attack methodologies, evasions, and mitigation techniques, leveraging your ethicalhacking background. Contribute to DevSecOps/DevOps with security testing expertise to enhance the automation aspects of the project Key Accountabilities: Utilize ethicalhacking skills to safeguard the organization from web-based attacks, ensuring the protection of operations, reputation, and customer trust. Conduct in-depth technical evaluations of WAF solution rulesets, focusing on detection and prevention of web and API security threats. Develop custom WAF rules and features, addressing gaps and more »
identified vulnerabilities in the infrastructure. Desired Qualifications: Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of WAN technologies including MPLS, SD WAN. Knowledge of cloud providers security (AWS more »
diverse technology and business teams. Strong verbal and written communication skills. Desirable experience: Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). In-depth knowledge of Operating System security and system hardening concepts, such as CIS Benchmarks. more »
including but not limited to: CISSP – Certified Information Systems Security Professional, CISM – Certified Information Security Manager, ISSAP – Information Systems Security Architecture Professional, CEH – Certified Ethical Hacker, AWS Certified Solution Architect more »
National Security clearances Hold one or more the following: CompTIA, GIAC Security Essentials (GSEC), NIST Cybersecurity Framework (NCSF), Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP), Certified Protection Professional (CPP), Industrial Security more »
threat patterns and vulnerabilities i.e. SentinelOne Managing technical problems related to applications and production equipment Addressing intrusions using expertise in computer forensics Engage in 'ethicalhacking', for example, simulating security breaches Foreseeing future problem areas by monitoring workflows and network traffic patterns Monitor identity and access management, including … and cloud security technologies would be beneficial. Strong understanding of firewalls, networking. Microsoft 365 and endpoint security. Keen awareness of Cyber Security trends and hacking techniques. Network Security Control If you are a highly skilled Cyber Security Engineer, who is looking to take on a new challenge within the more »
beneficial to applicants: Certification in Computer Science, Information Security, or related field (or equivalent work experience). Cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH) or Microsoft M365/Azure Understanding of cybersecurity principles, networking concepts, and various operating systems. Knowledge of common security threats, attack vectors more »
which allow us significant opportunities to sell long terms engagements. We're adding to our team and are actively looking for Penetration Testers/Ethical Hackers. As a Penetration Tester/Ethical Hacker working as part of a team, you will be required to operate in a high … skills will be essential. Ideally you will have 3+ years pen testing experience in a number of environments, and be able to demonstrate leading ethicalhacking services to customers. You will hold relevant security certs including but not limited to, OSCP,CRT, CE+. With rapid growth we want more »
Experience with network and application Firewalls, intrusion prevention, anti-virus, and security tooling. Familiarity with Microsoft 365/Azure. Desirable: SSCP or CISSP CISM EthicalHacking/Purple Teaming more »
Experience with network and application firewalls, intrusion prevention, anti-virus, and security tooling. Familiarity with Microsoft 365/Azure. Desirable: SSCP or CISSP CISM EthicalHacking/Purple Teaming more »
modelling and risk scoring platforms Proxy security Vulnerability and Threat detection/Endpoint detection and response (EDR) Intrusion detection and prevention, such as Darktrace Ethical Hacker, Cyber Security SANS, CISSP certification Packet capture networking Systems and Networks Firewalls and Load balancers This is not a network security/firewall more »
and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM more »
and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM more »
that improve existing assessment capabilities. Essential Criteria: Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability assessment and more »
Batley, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
AppCheck Ltd
fun environment, with significant opportunities for career progression. About AppCheck: AppCheck is a B2B cyber security software platform (vulnerability scanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability scan for security vulnerabilities in their web applications and hosted infrastructure and more »
of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. IT Security Role Once you have completed all the mandatory training in more »
of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step more »
of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step more »
of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step more »
Glasgow, Glasgow City, City of Glasgow, United Kingdom
ITonlinelearning
of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step more »
of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step more »
of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step more »
Leicester, City of Leicester, Leicestershire, United Kingdom
ITonlinelearning
of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step more »
of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step more »