tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethicalhacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive … have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) EthicalHacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS More ❯
tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethicalhacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive … have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) EthicalHacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS More ❯
tuning via detailed log analysis, false positive detection and mitigation, and making tuning and configuration recommendations. The ideal candidate will have experience in SOC or CSIRT and AppSec or EthicalHacking for in-depth log analysis and have previously worked with at least three major WAF vendors such as Akamai, F5, AWS, GCP, etc. Key Responsibilities Identification and … strong understanding of web application security principles. Proven track record of proactively identifying and mitigating false positives to optimize WAF performance. Background in SOC or CSIRT and AppSec or EthicalHacking, demonstrating hands-on experience for the key responsibilities Proficiency in log analysis tools and techniques, with the ability to identify patterns and anomalies in web traffic Experience More ❯
a hands-on, penetration testing-focused training course to adult learners and career changers. What You'll Do: Teach live, online sessions focused on penetration testing , vulnerability scanning , and ethicalhacking Help learners understand core cyber principles and real-world offensive security techniques Deliver engaging and accessible training sessions remotely, Monday to Thursday, 6pm to 9pm (12 hours … teaching, 4 hours planning per week) What We're Looking For: Hands-on experience with penetration testing , network security , or ethicalhacking Experience teaching or mentoring others in a technical environment Must have the right to work in the UK This is an exciting chance to use your expertise to help train the next generation of cyber professionals More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
GoDefend Limited
findings, and responding to questions. Strong time management and personal organisation. Professional, approachable, and client-focused mindset. Qualifications: A-Level or equivalent (required) HND or Degree in Computer Science, EthicalHacking, or Digital Forensics (preferred) One or more of the following certifications: OSCP , OSWA , GPEN , GWAPT , CEH , CRT , CCT-WEB , CCT-INF, CSSL, CCSM Work Authorisation: We are More ❯
skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and More ❯
skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and More ❯
or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Education Requirements & Experience Minimum of More ❯
Salisbury, Wiltshire, United Kingdom Hybrid / WFH Options
Finsbury Food Group Plc
protection, usability, and compliance. Ideally this is you! CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CRISC (Certified in Risk and Information Systems Control) CEH (Certified Ethical Hacker) Well organised with the ability to 'multi-task' and prioritise workload in order to achieve tight deadlines. Excellent interpersonal skills and ability to build and maintain relationships with More ❯
Sheffield, Yorkshire, United Kingdom Hybrid / WFH Options
Finsbury Food Group Plc
protection, usability, and compliance. Ideally this is you! CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CRISC (Certified in Risk and Information Systems Control) CEH (Certified Ethical Hacker) Well organised with the ability to 'multi-task' and prioritise workload in order to achieve tight deadlines. Excellent interpersonal skills and ability to build and maintain relationships with More ❯
Hamilton, Lanarkshire, United Kingdom Hybrid / WFH Options
Finsbury Food Group Plc
protection, usability, and compliance. Ideally this is you! CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CRISC (Certified in Risk and Information Systems Control) CEH (Certified Ethical Hacker) Well organised with the ability to 'multi-task' and prioritise workload in order to achieve tight deadlines. Excellent interpersonal skills and ability to build and maintain relationships with More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Finsbury Food Group Plc
protection, usability, and compliance. Ideally this is you! CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CRISC (Certified in Risk and Information Systems Control) CEH (Certified Ethical Hacker) Well organised with the ability to 'multi-task' and prioritise workload in order to achieve tight deadlines. Excellent interpersonal skills and ability to build and maintain relationships with More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
Finsbury Food Group Plc
protection, usability, and compliance. Ideally this is you! CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CRISC (Certified in Risk and Information Systems Control) CEH (Certified Ethical Hacker) Well organised with the ability to 'multi-task' and prioritise workload in order to achieve tight deadlines. Excellent interpersonal skills and ability to build and maintain relationships with More ❯
that keep them resilient and ahead of cyber threats. The Role We are looking for an experienced Penetration Tester to join our team. You will conduct security assessments and ethicalhacking activities to identify vulnerabilities in client systems. This role requires a deep understanding of attack techniques, security frameworks, and risk mitigation strategies. Key Responsibilities Conduct penetration testing … Develop security testing methodologies and improve existing processes. Collaborate with clients to provide security recommendations and mitigation strategies. Stay up to date with the latest security threats, exploits, and hacking techniques. Assist in security awareness training and red team exercises. Provide clear and actionable reports to both technical and non-technical audiences. Requirements Proven experience in penetration testing and … ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP, OSCE, CEH, or similar are highly desirable. Understanding of regulatory compliance standards (ISO 27001, GDPR, NIST, etc.). Excellent problem-solving More ❯
standards, including practical application of NIST, MITRE and ISO27001. Related cyber/information qualifications valued e.g. Certified Information Systems Security Professional (CISSP). Security testing - Knowledge and understanding of ethicalhacking/security testing best practices and techniques (with hands-on experience valued). Relevant qualifications valued e.g. Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP More ❯
standards, including practical application of NIST, MITRE and ISO27001. Related cyber/information qualifications valued e.g. Certified Information Systems Security Professional (CISSP). Security testing - Knowledge and understanding of ethicalhacking/security testing best practices and techniques (with hands-on experience valued). Relevant qualifications valued e.g. Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP More ❯
Demonstrable experience as a Systems Administrator or Software Developer...or both! Expert knowledge of Cloud Software Security (NOT Networking or Infrastructure) Software Security related Certification such as CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional) Passion for DevSecOps and with knowledge of Terraform, Bicep, Sonar Clous, Wiz, and other security product like Trivy Experience with cloud More ❯
a good old fashioned Unix/Linux Systems Administrator...or someone who has worked as a Senior .NET Developer and has a Software Security Certification like: like CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional), We want someone with a development/some form of coding background who has blossomed into Software Security/Cloud Security More ❯
a good old fashioned Unix/Linux Systems Administrator...or someone who has worked as a Senior .NET Developer and has a Software Security Certification like: like CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional), We want someone with a development/some form of coding background who has blossomed into Software Security/Cloud Security More ❯
Security Vulnerabilities to both technical and non-technical stakeholders. Need to Have At least 1-2 years of experience in penetration testing. Demonstrable skills in the Penetration Testing/EthicalHacking field. In-depth knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience More ❯
stakeholders. Contribute to internal collaborative development or knowledge sharing initiative. Need to Have At least 2+ years of experience in penetration testing. Demonstrable skills in the Penetration Testing/EthicalHacking field. In-depth knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Graphnet Health
dashboards/scripts etc. - Work closely with the Security teams to analyse and help remediate on internal and SoC flagged issues, along with assisting in internal vulnerability checks/ethicalhacking - Continuous improvement and testing of DR/BCP to ensure high availability Able to work well as an individual and as part of a team Take part More ❯
cloud environment. An understanding of key attacker techniques and capabilities models; and the various Cyber Kill Chain frameworks. Experience in securing cloud platform. Encryption; Knowledge in threat modelling and ethical hacking. Extensive experience working with SIEM solutions. Basic experience in some scripting languages This role falls inside of IR35 and is hybrid working with the expectation to attend the More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Hoop Recruitment
delivery teams throughout the software development lifecycle. Contribute to the design and implementation of automated security testing pipelines. Essential skills and experience: Proven experience in security testing. Certification in ethicalhacking or penetration testing (e.g. 7Safe CSTA, GIAC), or currently working towards one. Working knowledge of at least five of the following: Burp Suite, OWASP ZAP, Postman, OAuth2 More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Hoop Recruitment
we’re looking for Proven experience in security testing, with a strong focus on non-functional testing approaches. Hands-on experience leading, coaching, or managing technical teams. Certification in ethicalhacking or penetration testing (e.g. 7Safe CSTA, GIAC), or evidence of working towards one. Experience using at least 5 of the following: Burp Suite, OWASP ZAP, Postman or More ❯