London, Coleman Street, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions Limited
is a hands-on role where you'll simulate advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethicalhacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce … executive reporting on cyber threats, risks, and remediation progress Collaborate with security and infrastructure teams to strengthen overall cyber resilience Skills & Experience 3+ years in penetration testing/ethicalhacking/red teaming Strong understanding of cyber threats, APTs, threat actor tactics, and exploit development Familiar with SIEM, defensive security monitoring, incident response, and detection engineering Deep knowledge … working model - 3 days in the London office. Competitive salary and benefits on offer. Apply now to take on a high-impact role in cyber security, penetration testing, and ethicalhacking at enterprise scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead More ❯
/Forensics or CSIRT backgrounds - very experienced with analysing security logs to quickly ascertain TP/FP conviction and the techniques to except Ideally some AppSec/DevSecOps or EthicalHacking experience - need a good understanding of Web Application attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning More ❯
/Forensics or CSIRT backgrounds - very experienced with analysing security logs to quickly ascertain TP/FP conviction and the techniques to except Ideally some AppSec/DevSecOps or EthicalHacking experience - need a good understanding of Web Application attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning More ❯
/Forensics or CSIRT backgrounds - very experienced with analysing security logs to quickly ascertain TP/FP conviction and the techniques to except Ideally some AppSec/DevSecOps or EthicalHacking experience - need a good understanding of Web Application attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning More ❯
/Forensics or CSIRT backgrounds - very experienced with analysing security logs to quickly ascertain TP/FP conviction and the techniques to except Ideally some AppSec/DevSecOps or EthicalHacking experience - need a good understanding of Web Application attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning More ❯
/Forensics or CSIRT backgrounds - very experienced with analysing security logs to quickly ascertain TP/FP conviction and the techniques to except Ideally some AppSec/DevSecOps or EthicalHacking experience - need a good understanding of Web Application attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning More ❯
/Forensics or CSIRT backgrounds - very experienced with analysing security logs to quickly ascertain TP/FP conviction and the techniques to except Ideally some AppSec/DevSecOps or EthicalHacking experience - need a good understanding of Web Application attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning More ❯
/Forensics or CSIRT backgrounds - very experienced with analysing security logs to quickly ascertain TP/FP conviction and the techniques to except Ideally some AppSec/DevSecOps or EthicalHacking experience - need a good understanding of Web Application attacks and security; they must have deep knowledge of the OWASP Top 10 If they have Hands-on tuning More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
many students on completion of the training we can get them straight into entry level cyber roles. Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training iour recruitment support team specialises in the … 2nd Line Support, IT Training Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIA Security+, Ethical Hacker, Cyber Security Analyst, Trainee Cyber Security. More ❯
many students on completion of the training we can get them straight into entry level cyber roles. Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training iour recruitment support team specialises in the … 2nd Line Support, IT Training Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIA Security+, Ethical Hacker, Cyber Security Analyst, Trainee Cyber Security. More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two … 2nd Line Support, IT Training Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIA Security+, Ethical Hacker More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two … 2nd Line Support, IT Training Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIA Security+, Ethical Hacker More ❯
Gloucester, Gloucestershire, England, United Kingdom
ITOL Recruit
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two … 2nd Line Support, IT Training Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIA Security+, Ethical Hacker More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two … 2nd Line Support, IT Training Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIA Security+, Ethical Hacker More ❯
West Hoe, Plymouth, Devon, England, United Kingdom
ITOL Recruit
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two … 2nd Line Support, IT Training Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIA Security+, Ethical Hacker More ❯