Stratford-upon-avon, Warwickshire, United Kingdom Hybrid / WFH Options
Ccl Solutions Group
hands-on penetration testing experience in enterprise environments. Deep understanding of infrastructure testing, Active Directory security, and cloud technologies (AWS, Azure, Kubernetes). Strong familiarity with tools such as Nmap, Burp Suite, Metasploit, Impacket, and SMBClient. Able to articulate technical findings to both technical and non-technical audiences in written and verbal formats. How to be successful in this role More ❯
Go and Node.js application security. Experience with TEE technologies or confidential computing. Knowledge of OWASP Top 10, CVEs, and secure coding practices. Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, etc. Certifications such as OSCP, CEH, or GIAC are a plus. Nice to Have: Experience with Kubernetes and container security. Familiarity with CI/CD security integration. Familiarity with More ❯
the offensive security space Essential Skills and Experience: Hands-on experience with penetration testing or vulnerability assessments (commercial or demonstrable practical knowledge) Familiarity with tools such as Burp Suite, Nmap, Nessus, Metasploit, etc. Understanding of OWASP Top 10 and common exploitation techniques Strong written and verbal communication skills for technical documentation and client interaction UK resident with eligibility for SC More ❯
Provide clear and actionable reports to both technical and non-technical audiences. Requirements Proven experience in penetration testing and ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP, OSCE, CEH, or More ❯
Kingston Upon Thames, Surrey, United Kingdom Hybrid / WFH Options
Unilever
Development & Vulnerability Research : Ability to identify and exploit zero-day and known vulnerabilities, and develop custom proof-of-concept exploits. Tool Proficiency : Offensive tools: Cobalt Strike, Metasploit, Burp Suite, Nmap, BloodHound, Covenant, Sliver Scripting: Python, PowerShell, Bash Automation: CI/CD integration for security testing, custom tooling for red team automation Detection Engineering Collaboration : Ability to translate offensive findings into More ❯
Kingston-on-soar, Nottinghamshire, United Kingdom Hybrid / WFH Options
Unilever
Development & Vulnerability Research : Ability to identify and exploit zero-day and known vulnerabilities, and develop custom proof-of-concept exploits. Tool Proficiency : Offensive tools: Cobalt Strike, Metasploit, Burp Suite, Nmap, BloodHound, Covenant, Sliver Scripting: Python, PowerShell, Bash Automation: CI/CD integration for security testing, custom tooling for red team automation Detection Engineering Collaboration : Ability to translate offensive findings into More ❯
and articles. Skills/Must have: Strong knowledge of OWASP methodologies and offensive testing across black/grey/white-box approaches. Proficiency in tools like Burp Suite, Kali, Nmap, Nessus, Qualys, Metasploit. Familiarity with cloud platform security testing (AWS, Azure, GCP). Understanding of mobile security (Android & iOS), networking protocols, and the OSI model. Excellent verbal and written communication More ❯
and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, Kali Linux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in designing More ❯
and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, Kali Linux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in designing More ❯
and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, Kali Linux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in designing More ❯
Gloucestershire, England, United Kingdom Hybrid / WFH Options
Maxwell Bond
Member (CTM or CSTM) certification . Eligibility and willingness to undergo DV clearance. Demonstrable experience in network and application-layer testing. Skilled with industry-standard tools (e.g. Burp Suite, Nmap, Metasploit, Cobalt Strike). Strong knowledge of OWASP Top 10, MITRE ATT&CK, and vulnerability management principles. Excellent communication and technical reporting skills. 🎯 Offer: £60,000 salary. Predominantly remote working. More ❯
or Nessus Palo Alto Firewalls, InTune, Entra ID, Active Directory Desirable: Imperva WAF, Menlo Security, Cisco Secure Access/Umbrella, KnowBe4, AppCheck Ivanti or Automox patching Kali Linux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetration testing preferred Strong interpersonal and More ❯
or Nessus Palo Alto Firewalls, InTune, Entra ID, Active Directory Desirable: Imperva WAF, Menlo Security, Cisco Secure Access/Umbrella, KnowBe4, AppCheck Ivanti or Automox patching Kali Linux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetration testing preferred Strong interpersonal and More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Marlin Selection
Web Security Gateway Menlo CASB Cisco Secure Access Cisco Umbrella Cisco ASA KnowBe4 Digicert Certificates and Microsoft Certificate Services Ivanti or Automox patching AppCheck or Tenable WAS Kali Linux (NMAP, Metasploit, BurpSuite, John etc) Desired Education: CISM, MS SC100, 200 and 900, OSCP or other penetration testing qualifications. Industry: Financial services, SOC, Pentesting is desirable Personal Skills: Excellent inter-personal More ❯
Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
travel to Southampton Inside IR35 Strong understanding of Cisco Routing and Switching, TCP/IP, UDP, BGP, OSPF, MPLS, VLANs, QoS, and multicast. Proficient with tools such as Wireshark, Nmap, iPerf, SolarWinds. Ability to write test scripts or automate test execution using Python, Bash, Ansible or other network automation frameworks. Ability to isolate and troubleshoot network faults in complex, layered More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Maxwell Bond
across client engagements. What We’re Looking For Strong technical background in vulnerability and security operations. Experience using scanning tools (e.g. Qualys, Nessus) and open-source analysis tools (e.g. Nmap, Wireshark, OWASP ZAP). Familiarity with Microsoft security products (Intune, Conditional Access, DLP, Defender Suite). Scripting knowledge in PowerShell or Python to automate workflows and reporting. Clear communicator with More ❯
context to all customer engagements. Our ideal candidate: Able to demonstrate proven experience with technical accreditations or demonstrable experience in security and vulnerability remediation technologies: Security Tooling: OWASP ZAP, Nmap, Wireshark Assessment Tooling: Nessus, Qualys, etc Remediation Tooling: Microsoft Endpoint Management/Intune Microsoft Security/Compliance: MFA,?Conditional Access, SSPR, DLP, IPM, IRM, DKIM, MCAS Application packaging for automated More ❯