London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
Required Skills & Experience 3-5+ years' professional penetration testing/offensive security experience Strong understanding of enterprise infrastructure, AD security, networking, and protocols Proficiency with tools such as Nmap, Nessus, Metasploit, BloodHound, Burp Suite, Kali/Linux toolsets Solid track record of delivering infrastructure pentests end-to-end Excellent communication skills, including producing business-focused reporting Preferred Qualifications CHECK More ❯
CCIE Proficiency in Python, PowerShell, and Bash scripting Hands-on experience with both Linux and Windows operating systems Deep familiarity with tools such as Kali Linux, Metasploit Pro, and NMAP Ability to exploit vulnerabilities such as SQL injection, XSS, and conduct password cracking Prior experience on a Cyber Defense Blue Team (e.g., SOC, Incident Response, Threat Hunting, or Security Architecture More ❯
with customer satisfaction and retention initiatives. Knowledge of Lean and Agile tools (e.g., Microsoft Planner, JIRA, Confluence). Involvement in offensive cybersecurity (red teaming, use of tools like Metasploit, Nmap, etc.). Experience with physical security assessments aligned with NIS and NPSA standards. Expertise in Digital Forensics and Incident Response (DFIR) in industrial environments (e.g., VxWorks, RTOS, Embedded Linux, WinCC More ❯
ESP32), and RTOS. Understanding of debugging interfaces (UART, JTAG, SPI, I2C). Basic knowledge of wireless protocols: Zigbee, Bluetooth, Wi-Fi, Cellular, LoRa WAN. Exposure to tools like Wireshark, Nmap, Burp Suite, Nessus. Strong written and verbal communication skills. Degree in Cybersecurity, Computer Engineering, Electronics, Telecommunications, or related field. Desirable: Familiarity with standards such as ETSI EN , ETSI TS , IEC More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitmen
Key Skills Hands-on experience in penetration testing or IT Health Check delivery Eligibility to obtain and maintain UK security clearances. Familiarity with common tools such as Burp Suite, Nmap, Nessus, Metasploit, etc. Understanding of network protocols (TCP/IP, OSI model) and common web application Current penetration testing qualification such as Crest Practitioner Security Analyst (CPSA), Crest Registered Tester More ❯
STM32, ESP32), RTOS, and wireless protocols (Zigbee, Bluetooth, Wi-Fi, Cellular, LoRa WAN). Skilled in interfaces like UART, JTAG, SPI, I2C for debugging. Proficiency with tools such as Nmap, Burp Suite, Wireshark, Nessus. Strong programming foundation (Python, C/C++, Java, etc.). Bachelor's degree in Cybersecurity, Computer/Electrical/Electronic Engineering, Telecommunications or IT. Preferred: Previous More ❯