tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethicalhacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive … have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) EthicalHacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS More ❯
tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethicalhacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive … have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) EthicalHacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS More ❯
tuning via detailed log analysis, false positive detection and mitigation, and making tuning and configuration recommendations. The ideal candidate will have experience in SOC or CSIRT and AppSec or EthicalHacking for in-depth log analysis and have previously worked with at least three major WAF vendors such as Akamai, F5, AWS, GCP, etc. Key Responsibilities Identification and … strong understanding of web application security principles. Proven track record of proactively identifying and mitigating false positives to optimize WAF performance. Background in SOC or CSIRT and AppSec or EthicalHacking, demonstrating hands-on experience for the key responsibilities Proficiency in log analysis tools and techniques, with the ability to identify patterns and anomalies in web traffic Experience More ❯
skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and More ❯
area (s) (Records Management, Data Retention, Data Protection, Handling Information) Desirable Data Security/Information Security Qualification Certified Information Systems Security Professional (CISSP) Certified Cloud Security Professional (CCSP) Certified Ethical Hacker (CEH) ISO27001 Lead Auditor Certification Formal management/leadership training/qualification Service Improvement training/qualification Experience Essential Significant operational management experience in leading a team in More ❯
can communicate effectively with both technical and non-technical stakeholders. Qualifications: Relevant certifications such as Cisco CCNA (or above), CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) are preferred. Experience: We are looking for candidates with experience in: Assessing network infrastructure requirements and associated cyber security controls. Hands-on configuration and maintenance of live More ❯
can communicate effectively with both technical and non-technical stakeholders. Qualifications: Relevant certifications such as Cisco CCNA (or above), CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) are preferred. Experience: We are looking for candidates with experience in: Assessing network infrastructure requirements and associated cyber security controls. Hands-on configuration and maintenance of live More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Claranet Limited
having lasting impact with our customers and delivering exceptional returns to our stakeholders. Position Summary The penetration testing team at Claranet Cyber Security is composed of highly skilled, professional ethical hackers with a real passion for improving our clients’ security posture by demonstrating how systems can be compromised and what steps can be taken to defend. Team members work More ❯
that keep them resilient and ahead of cyber threats. The Role We are looking for an experienced Penetration Tester to join our team. You will conduct security assessments and ethicalhacking activities to identify vulnerabilities in client systems. This role requires a deep understanding of attack techniques, security frameworks, and risk mitigation strategies. Key Responsibilities Conduct penetration testing … Develop security testing methodologies and improve existing processes. Collaborate with clients to provide security recommendations and mitigation strategies. Stay up to date with the latest security threats, exploits, and hacking techniques. Assist in security awareness training and red team exercises. Provide clear and actionable reports to both technical and non-technical audiences. Requirements Proven experience in penetration testing and … ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP, OSCE, CEH, or similar are highly desirable. Understanding of regulatory compliance standards (ISO 27001, GDPR, NIST, etc.). Excellent problem-solving More ❯
Security Vulnerabilities to both technical and non-technical stakeholders. Need to Have At least 1-2 years of experience in penetration testing. Demonstrable skills in the Penetration Testing/EthicalHacking field. In-depth knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience More ❯
stakeholders. Contribute to internal collaborative development or knowledge sharing initiative. Need to Have At least 2+ years of experience in penetration testing. Demonstrable skills in the Penetration Testing/EthicalHacking field. In-depth knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience More ❯
such as completion of online courses (e.g., through platforms like Coursera, Udemy, or Cyber Discovery). Understanding of basic networking principles (e.g., IP Addressing, DNS, Firewalls). Exposure to ethicalhacking tools or cyber security software (e.g., Wireshark, Metasploit). Knowledge of cloud platforms (e.g., AWS, Azure, Okta, Salesforce). Basic understanding of computer systems, networks and cyber More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Graphnet Health
dashboards/scripts etc. - Work closely with the Security teams to analyse and help remediate on internal and SoC flagged issues, along with assisting in internal vulnerability checks/ethicalhacking - Continuous improvement and testing of DR/BCP to ensure high availability Able to work well as an individual and as part of a team Take part More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Square One Resources
WAF management, tuning, and engineering, with a strong understanding of web application security principles. Proven ability to proactively identify and mitigate false positives. Background in SOC, CSIRT, AppSec, or EthicalHacking with hands-on log analysis experience. Proficiency in analysing traffic patterns using tools such as Splunk, Wireshark, or custom scripts. Experience working with at least three major More ❯
cloud environment. An understanding of key attacker techniques and capabilities models; and the various Cyber Kill Chain frameworks. Experience in securing cloud platform. Encryption; Knowledge in threat modelling and ethical hacking. Extensive experience working with SIEM solutions. Basic experience in some scripting languages This role falls inside of IR35 and is hybrid working with the expectation to attend the More ❯
VR and AI trends to keep things cutting-edge. Collab on school-wide tech initiatives, like esports or app dev clubs. Mentor students on tech careers, from gaming to ethical hacking. Job Requirements QTS via BEd, PGCE, or equivalent. Degree in computer science, IT, or related field. DBS check required. Proficiency in programming (e.g., Python, JavaScript) and edtech platforms. More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
methodologies, and red team capabilities. Collaborate across security teams and maintain strong client relationships. Support project delivery and manage multiple testing engagements. Requirements: Extensive experience in penetration testing and ethical hacking. Certifications such as OSCP, CRT, CSTM, or equivalent. Must hold Check Team Member (CTM) status Proficiency with offensive security tools and techniques. Strong communication, leadership, and client-facing More ❯
Glasgow, Glasgow City, City of Glasgow, United Kingdom
ITOL Recruit
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯