actionable reports to both technical and non-technical audiences. Requirements Proven experience in penetration testing and ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP, OSCE, CEH, or similar are More ❯
and techniques related to penetration testing. • Proven ability to perform computer network vulnerability assessment and penetration testing. • Proficient in tools such as Nmap, Wireshark, Metasploit, Canvas, Kismet, Burp Suite, Kali Linuxetc. • Understanding of operating systems (MaxOS, Windows, Linux) and how clients/servers are built and secured. • Ability to research, prioritize, problem solve, synthesize large amounts of data … conducting risk analysis, risk management, infosec, system testing and client structures. TECHNOLOGIES USED: Operating Systems: • Microsoft Windows (7 - 10, Server ) • UNIX (Solaris, HP-UX, etc.,) Operating System versions • Common Linux distributions including RHEL/CentOS/Rocky and Debian/Ubuntu • OSX/iOS and Android • VMware/ESXi/KVM/OpenVZ or other virtualized environments • Linux … application vulnerabilities like XSS, CSRF, Command Injection, SQLi, single sign-on limitations, etc. Tools: • Proficiency in any of the following: PowerShell Empire, Metasploit Framework, Cobalt Strike, Burp Suite, Canvas, KaliLinux, IPTables, Sysinternals, A/V evasion methodologies, exploit development. Certifications: • Advanced GIAC and/or (ISC)2 network/cyber security specialties such as OSCP, OSCE, GPEN More ❯
infrastructure security. Up-to-date on the latest cybersecurity threats and technologies. Strong knowledge in pen testing tools ( Metasploit, Nmap, Wireshark, Burp Suite, Nessus, OWASP ZAP, Eyewitness, Nessus, sqlmap, kalilinux, etc) Ideally certified – eg OSCP, CRTP, CPPT, CEH, CISSP, OSWP, eJPT, eWPT Good reporting and security debriefing skills A passion for cybersecurity and a safer world. If More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Vector Recruitment Ltd
infrastructure security. Up-to-date on the latest cybersecurity threats and technologies. Strong knowledge in pen testing tools ( Metasploit, Nmap, Wireshark, Burp Suite, Nessus, OWASP ZAP, Eyewitness, Nessus, sqlmap, kalilinux, etc) Ideally certified – eg OSCP, CRTP, CPPT, CEH, CISSP, OSWP, eJPT, eWPT Good reporting and security debriefing skills A passion for cybersecurity and a safer world. If More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Vector Recruitment Ltd
infrastructure security. Up-to-date on the latest cybersecurity threats and technologies. Strong knowledge in pen testing tools ( Metasploit, Nmap, Wireshark, Burp Suite, Nessus, OWASP ZAP, Eyewitness, Nessus, sqlmap, kalilinux, etc) Ideally certified – eg OSCP, CRTP, CPPT, CEH, CISSP, OSWP, eJPT, eWPT Good reporting and security debriefing skills A passion for cybersecurity and a safer world. If More ❯
London, King's Cross, United Kingdom Hybrid / WFH Options
Vector Recruitment
infrastructure security. Up-to-date on the latest cybersecurity threats and technologies. Strong knowledge in pen testing tools ( Metasploit, Nmap, Wireshark, Burp Suite, Nessus, OWASP ZAP, Eyewitness, Nessus, sqlmap, kalilinux, etc) Ideally certified – eg OSCP, CRTP, CPPT, CEH, CISSP, OSWP, eJPT, eWPT Good reporting and security debriefing skills A passion for cybersecurity and a safer world. If More ❯
King's Cross, Isle Of Arran, United Kingdom Hybrid / WFH Options
Vector Recruitment
infrastructure security. Up-to-date on the latest cybersecurity threats and technologies. Strong knowledge in pen testing tools ( Metasploit, Nmap, Wireshark, Burp Suite, Nessus, OWASP ZAP, Eyewitness, Nessus, sqlmap, kalilinux, etc) Ideally certified eg OSCP, CRTP, CPPT, CEH, CISSP, OSWP, eJPT, eWPT Good reporting and security debriefing skills A passion for cybersecurity and a safer world. If More ❯
Techniques, and Procedures), and MITRE ATT&CK framework. Ability to identify, exploit, and document vulnerabilities in diverse environments, including cloud-based infrastructure. Proficiency with offensive security tools such as: KaliLinux, Burp Suite, Nmap, Metasploit, C2 Frameworks, Wireshark, Impacket, BloodHound, Responder Working knowledge of one or more scripting or automation languages (e.g., Python, PowerShell, Bash). Familiarity with … Linux and Windows command line. Strong verbal and written communication skills for documenting findings and presenting to both technical and non-technical stakeholders. Ability to conduct post-exploitation activities and lateral movement simulations in safe and controlled environments. Understanding of defensive techniques and how to evade common detection tools (EDR, SIEM, IDS/IPS). Experience conducting threat modeling More ❯
penetration testing field. This position will allow you to expand both your offensive and defensive networks security skills by using tools like Shodan, Maltego and various tools in the KaliLinux environment. Applicants for this position should have a solid understanding of network engineering with some exposure to bash and/or Python scripting. REQUIRED SKILLS: • Proficiency working … in a Linux environment (CentOS, Ubuntu, Fedora, Solaris, Kali). • Experience configuring small business or home network (SOHO) devices (e.g., wifi routers, switches, etc.). • Comfortable working in a command-line environment (SSH, bash, telnet, etc.) • Experience monitoring network activity, to include performing network packet inspection, traffic analysis, performance characterization (e.g., Wireshark, tcpdump, etc.). • Understanding of information … network forensics. • Experience in either the design, implementation, procurement, tradecraft or maintenance of various layers within covert network infrastructure. • Proven ability to design and develop integrated network solutions using Linux and traditional appliance network devices. DESIRED SKILLS: • Scripting including Python, Bash and Perl and frameworks like Ansible. • Understanding of Linux network security tools (e.g., Metasploit, Netcat, Nmap, iptables More ❯
. Experience in scoping penetration testing assessments. Strong knowledge of security testing methodologies and frameworks (eg, OWASP, NIST). Proficiency with industry-standard tools (eg, Burp Suite, Nmap, Metasploit, KaliLinux). Excellent written and verbal communication skills. OSCP is essential. Experience with red teaming or threat simulation exercises. Experience conducting code reviews. Scripting experience (eg, Python, Bash More ❯
matter expertise in web, mobile or network penetration testing with track record of end to end testing of complex systems. Advanced knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong expertise with web application and network pen testing methodologies. Proficiency in using penetration testing tools … such as BurpSuite Pro, Nmap, Nessus, and Metasploit. Experienced in using KaliLinux and the associated penetration testing tool suite. Advanced completion of penetration testing simulations like Hack the Box or Capture the Flag or ideally one of the following certifications: CSTL/CCT, OSCP, OCWE, or relevant equivalent. Excellent communication and technical report writing skills. UK SC More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
papers and articles. Skills/Must have: Strong knowledge of OWASP methodologies and offensive testing across black/grey/white-box approaches. Proficiency in tools like Burp Suite, Kali, Nmap, Nessus, Qualys, Metasploit. Familiarity with cloud platform security testing (AWS, Azure, GCP). Understanding of mobile security (Android & iOS), networking protocols, and the OSI model. Excellent verbal and More ❯
collaboratively with Blue Team and Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and … Seven (7) years of full-time professional experience conducting penetration testing or offensive Cyber operations in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. o Mimicking threat behavior. o Utilizing various operating systems (examples include Linux, Windows, MAC OS, etc.); o Utilizing Active Directory. o Performing exploit development. … years of full-time professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. Mimicking threat behavior. Utilizing various operating systems (Linux, Windows, MAC OS); Utilizing Active Directory. Performing exploit development. More ❯
collaboratively with Blue Team and Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and … of full-time professional experience conducting penetration testing or offensive Cyber operations including demonstrated experience in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. o Mimicking threat behavior. o Utilizing various operating systems (examples include Linux, Windows, MAC OS, etc.); o Utilizing Active Directory. NR3006 Attachment J.6 o … years of full-time professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. Mimicking threat behavior. Utilizing various operating systems (Linux, Windows, MAC OS); Utilizing Active Directory. Performing exploit development. More ❯
tests (web, infrastructure, external/internal). Strong knowledge of security testing methodologies and frameworks (e.g., OWASP, NIST). Proficiency with industry-standard tools (e.g., Burp Suite, Nmap, Metasploit, KaliLinux). Excellent written and verbal communication skills. OSCP, OSWE, or other relevant certifications. Experience with red teaming or threat simulation exercises. Familiarity with secure coding practices and More ❯
of executing penetration tests and exploiting vulnerabilities in complex systems and applications. Experience with vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and penetration testing tools (e.g., Metasploit, Burp Suite, KaliLinux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR, PCI-DSS) Relevant certifications (e.g., CEH, OSCP, CISSP, CISM, GIAC) are strongly preferred. More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
candidate: Experience in offensive security and penetration testing. Demonstrable experience in infrastructure and web application testing; experience in API testing is desirable. Demonstrable experience using common pentesting tools including KaliLinux, Burpsuite, Nessus and other industry standard tools. Hold or working towards an industry recognised certification including CompTIA PenTest+; CHECK, CREST; Offensive Security Certified Professional (OSCP) etc. Relevant More ❯
years' penetration testing experience. Strong understanding of OWASP, SSL/TLS, SSH, and HTTP. Comfortable conducting black box, grey box, and white box testing. Familiar with tools like Kali, Burp Suite, Metasploit, Nmap, Nessus, and Qualys. Knowledge of AWS, Azure, or Google Cloud platform security. At least 2 certifications from: CREST CRT, OSCP, OSCE, or CCT. Desirable Extras: Experience More ❯
City of London, London, Grange, United Kingdom Hybrid / WFH Options
Applause IT Recruitment Ltd
years' penetration testing experience. Strong understanding of OWASP, SSL/TLS, SSH, and HTTP. Comfortable conducting black box, grey box, and white box testing. Familiar with tools like Kali, Burp Suite, Metasploit, Nmap, Nessus, and Qualys. Knowledge of AWS, Azure, or Google Cloud platform security. At least 2 certifications from: CREST CRT, OSCP, OSCE, or CCT. Desirable Extras: Experience More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Ocho
What You'll Be Doing: Perform penetration tests on networks, applications, and infrastructure. Identify and exploit vulnerabilities to strengthen security defences. Use tools like Burp Suite, Nessus, Metasploit, and Kali Linux. Provide detailed reports with clear, actionable recommendations. Experience required: Strong knowledge of OWASP, CVE, and security frameworks. Hands-on experience with ethical hacking & exploit techniques. Scripting & automation skills … a plus. Ability to communicate findings to technical and non-technical teams. Proficiency in using penetration testing tools such as BurpSuite Pro, Nmap, Nessus, and Metaspolit. Experienced in using KaliLinux and the associated penetration testing tool suite Nice to Have: Relevant security certifications (e.g. OSCP, CREST, Cyber Scheme.) UK SC clearance Package: £50k-£80k salary D.O.E Bonus More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
techniques TS/SCI clearance HS diploma or GED and 7+ years of experience in Information Technology, or Bachelor's degree and 3+ years of experience in Information Technology Linux Computing Environment (CE) Certification Windows CE Certification Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN) Certification DoD Approved 8570 Information Assurance Technician (IAT) Level III Certification, including … CASP+ CE, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP Certification Additional Qualifications Experience with Cobalt Strike, Metasploit, and KaliLinux Python Certification Completion of the Red Team Apprentice, Offensive Methodology Analysis, or Red Team Operations Training Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified More ❯
CWE, CVSS scoring etc.) Strong experience communicating to stakeholders of varying technical skill levels Your experience should include: Using offensive security tooling, including tools such as Burp Suite, Kali, Metasploit and such Scripting including the use of python, Powershell, bash or Javascript Securing networks, hosts, web applications and cloud native deployments Working with toolsets such as: vulnerability management, firewalls More ❯
IVM, Tenable IO or Nessus Palo Alto Firewalls, InTune, Entra ID, Active Directory Desirable: Imperva WAF, Menlo Security, Cisco Secure Access/Umbrella, KnowBe4, AppCheck Ivanti or Automox patching KaliLinux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetration More ❯
IVM, Tenable IO or Nessus Palo Alto Firewalls, InTune, Entra ID, Active Directory Desirable: Imperva WAF, Menlo Security, Cisco Secure Access/Umbrella, KnowBe4, AppCheck Ivanti or Automox patching KaliLinux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetration More ❯
IVM, Tenable IO or Nessus Palo Alto Firewalls, InTune, Entra ID, Active Directory Desirable: Imperva WAF, Menlo Security, Cisco Secure Access/Umbrella, KnowBe4, AppCheck Ivanti or Automox patching KaliLinux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetration More ❯