Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Experian Ltd
Center or Cyber Security Incident Response Teams Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security or professional certification related to Digital Forensics, Incident Response, or EthicalHacking (e.g., GCIH, CEH, GCFE, GCFA, and CFCE). Knowledge of main concepts related to the Incident Response Life Cycle, MITRE ATT&CK Framework, Cyber Kill Chain, and More ❯
skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and More ❯
skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and More ❯
Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of Vulnerability Scanning, Management, and EthicalHacking (Penetration Testing). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work in a 24/ More ❯
or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Education Requirements & Experience Minimum of More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Circle Group
advanced offensive roles , including Red Team and Adversarial Simulation Exposure to a broad range of real-world security challenges in varied environments Keywords: Penetration Tester, OSCP, OSEP, Offensive Security, EthicalHacking, Red Team, Web Application Security, Cyber Security Jobs UK, Cloud Security, Infrastructure Testing, Adversarial Simulation, Ethical Hacker, InfoSec, Application Security, UK Cyber Jobs, Security Testing, Cyber More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Circle Group
advanced offensive roles , including Red Team and Adversarial Simulation Exposure to a broad range of real-world security challenges in varied environments Keywords: Penetration Tester, OSCP, OSEP, Offensive Security, EthicalHacking, Red Team, Web Application Security, Cyber Security Jobs UK, Cloud Security, Infrastructure Testing, Adversarial Simulation, Ethical Hacker, InfoSec, Application Security, UK Cyber Jobs, Security Testing, Cyber More ❯
tools. Strong verbal and written English communication skills. Interpersonal and presentation skills. Strong analytical skills. Understanding network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and EthicalHacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines (Incident, Problem, Change Management). Ability to work independently. Willingness More ❯
Chesterfield, England, United Kingdom Hybrid / WFH Options
Hays
You will be leading the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of threat intelligence, threat detection, incident response, vulnerability management, and ethicalhacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to establishing responsibilities and More ❯
Derbyshire, England, United Kingdom Hybrid / WFH Options
Hays
You will be leading the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of threat intelligence, threat detection, incident response, vulnerability management, and ethicalhacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to establishing responsibilities and More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Hays Technology
You will be leading the Cyber Security operations function, by providing strategic direction and coordinating day-to-day delivery of threat intelligence, threat detection, incident response, vulnerability management, and ethicalhacking capabilities. You will be leading a team of Infrastructure Engineers, ensuring strong data controls are in place, whilst working closely with key stakeholders to establishing responsibilities and More ❯
Employment Type: Permanent
Salary: £70000 - £80000/annum Up to £80,000+ Benefits
Holiday Private Pension (8% Employer, 5% Employee) Private Healthcare Life Assurance Cycle to Work Scheme Day to Day Co-ordinate and execute system/network level pen tests and ethicalhacking exercises in client's Infrastructure/cloud, Web Applications and Mobile Applications. Write detailed reports outlining vulnerabilities and providing tailored actionable recommendations. Manage end-to-end testing More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Ocho
Ocho are exclusively working on a number of Penetration Tester roles! If you're passionate about ethicalhacking and want to work on real-world cybersecurity challenges, this is the role for you. This organisation is on a serious growth trajectory, having secured major clients and high-profile projects, offering you the chance to work on cutting-edge … like Burp Suite, Nessus, Metasploit, and Kali Linux. Provide detailed reports with clear, actionable recommendations. Experience required: Strong knowledge of OWASP, CVE, and security frameworks. Hands-on experience with ethicalhacking & exploit techniques. Scripting & automation skills a plus. Ability to communicate findings to technical and non-technical teams. Proficiency in using penetration testing tools such as BurpSuite Pro More ❯
Description Summary The Department of Science, Technology, Engineering and Mathematics (STEM) at Regis College seeks an Adjunct Professor for the Fall semester specializing in Cybersecurity to teach CYS 230, Hacking and Penetration Testing. This course is an introduction to ethicalhacking and penetration testing. Areas of instruction include various tools and vulnerabilities of operating systems, software and More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerability scanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security vulnerabilities, so they can remediate issues and More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerability scanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security vulnerabilities, so they can remediate issues and More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Graphnet Health
solutions that aid service operation. Work closely with the Security teams to analyse and help remediate internal and SoC flagged issues, along with assisting in internal vulnerability checks/ethical hacking. Keep an eye on emerging technologies/approaches and identify where these could be used in our estate to improve existing services. Able to work well as an More ❯
OSINT investigations that help drive positive outcomes in the areas of digital risk and attack surface protection . Our team works at the intersection of technology, critical thinking, and ethical inquiry — always using intelligence for good. The Role As an Associate Analyst & Researcher, you’ll play a key part in supporting and conducting online investigations, drawing insights from digital … ll work with best-in-class OSINT tools and receive mentoring and hands-on training from industry experts. What We’re Looking For A recent graduate in Cyber Security, EthicalHacking, Digital Forensics, Intelligence Studies, or a related field Demonstrable OSINT skills — this might be from a university project, a work placement, a student society, or your own More ❯
Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Forward Role
analysis, Vulnerability analysis and/or exploitation development. Processor architectures (x86-64 and ARM). Debugging with gdb, binary exploitation and code injection. Python, C or bash for programming. Ethicalhacking, including familiarity with web/network technologies. Experience and knowledge of different OS including Android or Linux. Due to the nature of the work, you will be More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerability scanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web apps and networks for security vulnerabilities, so they can remediate issues and More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
Glasgow, Glasgow City, City of Glasgow, United Kingdom
ITOL Recruit
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯