London, Coleman Street, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions Limited
is a hands-on role where you'll simulate advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethicalhacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce … executive reporting on cyber threats, risks, and remediation progress Collaborate with security and infrastructure teams to strengthen overall cyber resilience Skills & Experience 3+ years in penetration testing/ethicalhacking/red teaming Strong understanding of cyber threats, APTs, threat actor tactics, and exploit development Familiar with SIEM, defensive security monitoring, incident response, and detection engineering Deep knowledge … working model - 3 days in the London office. Competitive salary and benefits on offer. Apply now to take on a high-impact role in cyber security, penetration testing, and ethicalhacking at enterprise scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead More ❯
knowledge of threat detection, incident response, and cyber kill chain Familiarity with MITRE ATT&CK, NIST, and CIS frameworks Understanding of network traffic flows and vulnerability management Exposure to ethicalhacking and penetration testing Knowledge of ITIL disciplines (Incident, Problem, Change Management) Experience with ServiceNow Security Suite Cloud experience (AWS and/or Azure) Excellent communication, presentation, and More ❯
with Nutanix, VMware, Commvault, and hybrid cloud platforms Azure (preferred), AWS or GCP. Understanding of vulnerability management, monitoring, and orchestration tools. Relevant certifications such as Microsoft SC-200, Certified Ethical Hacker (CEH), CBCP/CBCI or equivalent. We are open to receiving applications from across a broad range of industries including Legal Services, Professional Services, Financial Services or Consultancy More ❯
strong understanding of web application security principles. Proven track record of proactively identifying and mitigating false positives to optimize WAF performance. Background in SOC or CSIRT and AppSec or EthicalHacking, demonstrating hands-on experience for the key responsibilities Proficiency in log analysis tools and techniques, with the ability to identify patterns and anomalies in web traffic Experience More ❯
delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incident response, vulnerability management, and ethicalhacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and other regulatory frameworks. This role also involves reporting More ❯
and security tooling Support internal awareness sessions and training around cyber threats Feed into the development of security standards, guidance, and processes Skillset & requirements Solid background in penetration testing, ethicalhacking, or red teaming engagements Strong knowledge of frameworks such as OWASP Top 10 , MITRE ATT&CK , and risk-scoring methods like CVSS Practical use of tools such More ❯
tools, and security trends Assist in security awareness training and internal education efforts Contribute to security policies and best practices development Required Skills & Qualifications Proven experience in penetration testing, ethicalhacking, or red teaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity More ❯
tools, and security trends Assist in security awareness training and internal education efforts Contribute to security policies and best practices development Required Skills & Qualifications Proven experience in penetration testing, ethicalhacking, or red teaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Henderson Scott
complex security challenges. Strong knowledge of firewalls, SIEM tools, and network/cloud security. An understanding of attacker tactics, threat modelling and security frameworks. Hands-on experience with encryption, ethicalhacking, or scripting. Flexibility to work onsite and ad hoc travel to London is also required. More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
SR2
place, plus additional commission for any opportunities generated that become clients About the Company: This organisation is a B2B cyber security software platform (vulnerability scanning) developed by industry-leading ethical hackers and web application security experts.Their technology enables companies to scan for security vulnerabilities in their web applications and hosted infrastructure, fixing them before malicious hackers can exploit them.Founded More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
Glasgow, Glasgow City, City of Glasgow, United Kingdom
ITOL Recruit
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
Leicester, City of Leicester, Leicestershire, United Kingdom
ITOL Recruit
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
Birmingham, West Midlands (County), United Kingdom
ITOL Recruit
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯