tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethicalhacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive … have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) EthicalHacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS More ❯
tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethicalhacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive … have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) EthicalHacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS More ❯
tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethicalhacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive … have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) EthicalHacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS More ❯
tuning via detailed log analysis, false positive detection and mitigation, and making tuning and configuration recommendations. The ideal candidate will have experience in SOC or CSIRT and AppSec or EthicalHacking for in-depth log analysis and have previously worked with at least three major WAF vendors such as Akamai, F5, AWS, GCP, etc. Key Responsibilities Identification and … strong understanding of web application security principles. Proven track record of proactively identifying and mitigating false positives to optimize WAF performance. Background in SOC or CSIRT and AppSec or EthicalHacking, demonstrating hands-on experience for the key responsibilities Proficiency in log analysis tools and techniques, with the ability to identify patterns and anomalies in web traffic Experience More ❯
tuning via detailed log analysis, false positive detection and mitigation, and making tuning and configuration recommendations. The ideal candidate will have experience in SOC or CSIRT and AppSec or EthicalHacking for in-depth log analysis and have previously worked with at least three major WAF vendors such as Akamai, F5, AWS, GCP, etc. Key Responsibilities Identification and … strong understanding of web application security principles. Proven track record of proactively identifying and mitigating false positives to optimize WAF performance. Background in SOC or CSIRT and AppSec or EthicalHacking, demonstrating hands-on experience for the key responsibilities Proficiency in log analysis tools and techniques, with the ability to identify patterns and anomalies in web traffic Experience More ❯
in Computer Science, Cybersecurity, Information Technology, or a related field is often advantageous. Entry-level certifications (optional but beneficial) that demonstrate knowledge and commitment to cybersecurity: CompTIA Security+ Certified Ethical Hacker (CEH) CompTIA Network+ ISO 27001 Foundation or Practitioner AWS Certified Security Familiarity with TCP/IP, DNS, firewalls, VPNs, and VLANs. Basic experience with SIEMs and security logs More ❯
skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and More ❯
area (s) (Records Management, Data Retention, Data Protection, Handling Information) Desirable Data Security/Information Security Qualification Certified Information Systems Security Professional (CISSP) Certified Cloud Security Professional (CCSP) Certified Ethical Hacker (CEH) ISO27001 Lead Auditor Certification Formal management/leadership training/qualification Service Improvement training/qualification Experience Essential Significant operational management experience in leading a team in More ❯
CCIE, CCNA, etc.) with recent experience working on Cisco switches, routers, and other networking devices. Preferred: Certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH). Experience with firewall technologies (e.g., Cisco ASA, Palo Alto, Fortinet). Strong troubleshooting skills in Azure Active Directory (Entra) environments and related cloud-based security tools. More ❯
Strong skills in risk assessment, vulnerability identification, and development of practical security solutions for complex IT environments. Experience with penetration testing and vulnerability assessments; certifications such as CEH (Certified Ethical Hacker) are an advantage Solid hands-on experience managing and administering SIEM platforms for threat detection and incident analysis. Strong interpersonal and communication skills, with the ability to collaborate … based in? Select Do you have experience working to ISO 27001 standards? Select Do you require sponsorship to work in the UK? Select Do you have work experience in EthicalHacking? Select Are you willing to work in the office 3 days a week? This is a mandatory requirement. Select More ❯
can communicate effectively with both technical and non-technical stakeholders. Qualifications: Relevant certifications such as Cisco CCNA (or above), CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) are preferred. Experience: We are looking for candidates with experience in: Assessing network infrastructure requirements and associated cyber security controls. Hands-on configuration and maintenance of live More ❯
can communicate effectively with both technical and non-technical stakeholders. Qualifications: Relevant certifications such as Cisco CCNA (or above), CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) are preferred. Experience: We are looking for candidates with experience in: Assessing network infrastructure requirements and associated cyber security controls. Hands-on configuration and maintenance of live More ❯
center domain(s). DESIRABLE QUALIFICATIONS Certifications o Certified Information Systems Security Professional (CISSP). o Certified Information Systems Auditor (CISA) o Certified Information Security Manager (CISM) o Certified Ethical Hacker (CEH) The pay range for this opportunity is from 59,000 to 80,000 GBP + performance-related bonus + benefits. This range represents the anticipated low and More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Claranet Limited
having lasting impact with our customers and delivering exceptional returns to our stakeholders. Position Summary The penetration testing team at Claranet Cyber Security is composed of highly skilled, professional ethical hackers with a real passion for improving our clients’ security posture by demonstrating how systems can be compromised and what steps can be taken to defend. Team members work More ❯
Security Manager (CISM)And two or more of the following certifications:- CompTIA Security+- Certified Cloud Security Professional (CCSP)- Systems Security Certified Practitioner (SSCP)- GIAC Security Essentials Certification (GSEC)- Certified Ethical Hacker (CEH)- Certified in Risk and Information Systems Control (CRISC)- ISO 27001 Lead Auditor- ISO 27001 Lead Implementer- Certified Information Systems Auditor (CISA)We actively recruit citizens of all More ❯
that keep them resilient and ahead of cyber threats. The Role We are looking for an experienced Penetration Tester to join our team. You will conduct security assessments and ethicalhacking activities to identify vulnerabilities in client systems. This role requires a deep understanding of attack techniques, security frameworks, and risk mitigation strategies. Key Responsibilities Conduct penetration testing … Develop security testing methodologies and improve existing processes. Collaborate with clients to provide security recommendations and mitigation strategies. Stay up to date with the latest security threats, exploits, and hacking techniques. Assist in security awareness training and red team exercises. Provide clear and actionable reports to both technical and non-technical audiences. Requirements Proven experience in penetration testing and … ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP, OSCE, CEH, or similar are highly desirable. Understanding of regulatory compliance standards (ISO 27001, GDPR, NIST, etc.). Excellent problem-solving More ❯
tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we offer: At More ❯
or equivalent experience Demonstrable skills and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions Understanding of common frameworks More ❯
Paddington, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
awareness training Requirements Demonstrable skills and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions Understanding of common frameworks More ❯
Security Vulnerabilities to both technical and non-technical stakeholders. Need to Have At least 1-2 years of experience in penetration testing. Demonstrable skills in the Penetration Testing/EthicalHacking field. In-depth knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience More ❯
Demonstrable experience as a Systems Administrator or Software Developeror both! Expert knowledge of Cloud Software Security (NOT Networking or Infrastructure) Software Security related Certification such as CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional) Passion for DevSecOps and with knowledge of Terraform, Bicep, Sonar Clous, Wiz, and other security product like Trivy Experience with cloud More ❯
a good old fashioned Unix/Linux Systems Administratoror someone who has worked as a Senior .NET Developer and has a Software Security Certification like:like CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional),We want someone with a development/some form of coding background who has blossomed into Software Security/Cloud Security More ❯
a good old fashioned Unix/Linux Systems Administratoror someone who has worked as a Senior .NET Developer and has a Software Security Certification like:like CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional), We want someone with a development/some form of coding background who has blossomed into Software Security/Cloud Security More ❯
stakeholders. Contribute to internal collaborative development or knowledge sharing initiative. Need to Have At least 2+ years of experience in penetration testing. Demonstrable skills in the Penetration Testing/EthicalHacking field. In-depth knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience More ❯
and nurture strong client relationships, delivering actionable advice based on test findings to enhance their security and build trust. Skills/Must have: 3 years experience in penetration testing, ethicalhacking, and security assessments. Industry-recognised certifications (e.g., CSTM, CRT, CTL, OSCP). Proficient in advanced tools and techniques for penetration testing. Strong leadership skills with a passion More ❯