exfiltration techniques. • Proactive interest in emerging technologies and techniques related to penetration testing. • Proven ability to perform computer network vulnerability assessment and penetration testing. • Proficient in tools such as Nmap, Wireshark, Metasploit, Canvas, Kismet, Burp Suite, Kali Linuxetc. • Understanding of operating systems (MaxOS, Windows, Linux) and how clients/servers are built and secured. • Ability to research, prioritize, problem solve More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Investigo
in penetration testing, ethical hacking, or red teaming Deep knowledge of OWASP Top 10, MITRE ATT&CK, and CVSS scoring systems Proficiency with tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux Scripting experience with Python, Bash, or PowerShell Understanding of network protocols, operating systems, and cloud platforms Certifications such as OSCP , CEH , GPEN , or CRTP (highly desirable More ❯
based technologies (AWS Platform, Azure Platform, Google Cloud) • Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerability assessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetration testing, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must meet ALL of the below criteria. The candidate must: • Have More ❯
Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating systems, and cloud environments Relevant certifications (e.g., OSCP, CEH, GPEN, CRTP) are highly desirable Excellent More ❯
Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating systems, and cloud environments Relevant certifications (e.g., OSCP, CEH, GPEN, CRTP) are highly desirable Excellent More ❯
red teaming engagements Strong knowledge of frameworks such as OWASP Top 10 , MITRE ATT&CK , and risk-scoring methods like CVSS Practical use of tools such as Burp Suite, Nmap, Metasploit, Wireshark, Kali Linux Proficiency with scripting languages (e.g., Python, Bash, PowerShell ) Broad understanding of operating systems, networking, and cloud-based environments Professional certifications such as OSCP, GPEN, CEH, CRTP More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
4SQUARE RECRUITMENT LTD
systems (Windows, Linux), and common infrastructure vulnerabilities. Strong experience in web application penetration testing (OWASP Top 10). Proficiency with common penetration testing tools (e.g., Burp Suite Pro, Metasploit, Nmap, Cobalt Strike, etc.). Excellent written and verbal communication skills, with a proven ability to write detailed technical reports. A proactive and self-motivated attitude, capable of working effectively in More ❯
the above-mentioned areas of responsibility Advanced knowledge and experience in application, network, and cloud security testing Proven knowledge and experience with penetration testing tools (e.g., Burp Suite, Metasploit, Nmap, Kali Linux, Wireshark, etc.) and scripting experience for automation (Python, PowerShell, Bash, etc.) Strong knowledge and experience with the OWASP Top 10, the MITRE ATT&CK framework, and common attack More ❯
years of relevant work experience. • Experience in penetration testing and/or red teaming. • Knowledge of tools used for offensive security testing such as Kali Linux, Cobalt Strike, NMAP, Wireshark, Metasploit, Burp suite, Bloodhound, PowerShell Empire, Sqlmap, etc. • Experience in shell scripting or automation of simple tasks using Perl, Python, or Ruby. • Experience developing, extending, or modifying exploits, shellcode, or More ❯
secure configuration practices. Experience identifying and exploiting vulnerabilities across various platforms (e.g., Windows, Linux, macOS, network devices, web APIs). Proficient with open-source and commercial security tools (e.g., Nmap, Kali Linux, Cobalt Strike, Burp Suite, etc.). Proficiency with scripting languages such as Python, Ruby, Lua, NSE, or PowerShell. Experience developing or integrating AI/ML solutions into cybersecurity More ❯
GWAPT, OSWA, or equivalent. Strong understanding of network protocols, security controls, and common vulnerabilities. Experience with web application testing, API testing, and infrastructure assessments. Familiarity with tools such as Nmap, Burp Suite, Metasploit, Cobalt Strike, or Kali Linux. Basic scripting skills in Python, PowerShell, Ruby, or similar. Understanding of attack frameworks such as MITRE ATT&CK. Preferred Experience: Exposure to More ❯
GWAPT, OSWA, or equivalent. Strong understanding of network protocols, security controls, and common vulnerabilities. Experience with web application testing, API testing, and infrastructure assessments. Familiarity with tools such as Nmap, Burp Suite, Metasploit, Cobalt Strike, or Kali Linux. Programming or scripting proficiency in Python, Ruby, and/or C/C++ . Understanding of attack frameworks such as MITRE ATT More ❯
solutions using Linux and traditional appliance network devices. DESIRED SKILLS: • Scripting including Python, Bash and Perl and frameworks like Ansible. • Understanding of Linux network security tools (e.g., Metasploit, Netcat, Nmap, iptables, BurpSuite, IDS, SELinux, etc.). • Experience monitoring threats via a SIEM console such as Solarwinds, Cisco Network Analysis Module (LogRhythm/Splunk preferred). • Experience performing analysis of log More ❯
/Bluetooth) technology (hardware or core software). • Familiarity with mobile phone operating systems (Android/iOS). • Experience working with network security tools such as Metasploit, Netcat, BurpSuite, NMAP, Nessus or similar. • Understanding/use of network IDS/IPS technologies such as firewalls, proxies, ipchains, iptables, Snort, and related technologies. • Experience managing and installing network technologies such as More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Task Force Talent LLC
clearance. Cloud environments (AWS/Azure/Google Cloud Platform) Developing security test plans Linux/Windows as well as virtual and wireless platforms Infosec policies Tools such as nmap, Wireshark, Metasploit, IDA Pro, Encase, etc. Network security technologies (firewalls, proxies, iptables, VPN, IDS/IPS, etc.) Further details will be provided to qualified candidates after an initial interview. All More ❯
principles. Experience with evaluating system security configurations. Understand common Web Application vulnerabilities like SQLi, XSS, CSRF, and HTTP Flooding. Experience with penetration testing tools such as Metasploit, Burp Suite, Nmap, etc. Fundamentals of network routing & switching and assessing network device configurations. Familiarity in evaluating findings and performing root cause analysis. Demonstrated ability to work alone and/or within a More ❯
performance characterization (e.g. Wireshark, TCPdump, etc.). Understanding of network/cyber security, penetration testing, and information security best practices Understanding of Linux network security tools - (e.g. Metasploit, netcat, nmap, etc.). Experience building virtual infrastructure - (e.g. vSphere). Experience using scripting languages for automation, parsing data sets, and network monitoring (e.g. bash, Perl, Python, etc.). Experience in either More ❯
principles. Experience with evaluating system security configurations. Understand common Web Application vulnerabilities like SQLi, XSS, CSRF, and HTTP Flooding. Experience with penetration testing tools such as Metasploit, Burp Suite, Nmap, etc. Fundamentals of network routing & switching and assessing network device configurations. Familiarity in evaluating findings and performing root cause analysis. Demonstrated ability to work alone and/or within a More ❯
Linux, ma c OS, network devi c es, web APIs). Profi c ient with open-sour c e and c ommer c ial se c urity tools (e.g., Nmap, Kali Linux, C obalt Strike, Burp Suite, et c .). Strong software development skills, particularly in Python, Ruby, and C/C++ , with experience creating custom testing tools and More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
UKRI
systems, core computer fundamentals, networking, authentication, and cloud platforms like AWS and Azure. (S&I) Proficient with open-source penetration testing and assessment tools such as Metasploit, Burp Suite, Nmap, and strong understanding of networking configurations and products. (S&I) Ability to quickly adapt to emerging technologies, vulnerabilities, and new penetration testing tools. (S&I) Skilled in drafting detailed reports More ❯
more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform More ❯
more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform More ❯
more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform More ❯
more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform More ❯