testing, vulnerability assessment, and application security. Proven track record of executing penetration tests and exploiting vulnerabilities in complex systems and applications. Experience with vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR, PCI-DSS) Relevant certifications (e.g., CEH More ❯
Gloucester, Gloucestershire, South West, United Kingdom
Forward Role
of C, C++, or C#. Familiarity with scripting and automation using Python. Experience working with Linux or Windows-based systems. Hands-on experience with vulnerability scanning tools (e.g., Nessus, OpenVAS, Burp Suite, or similar). Familiarity with CVSS scoring, vulnerability databases (e.g., NVD, MITRE ATT&CK), and risk prioritization frameworks. Understanding of patch management processes, secure configuration baselines, and compliance More ❯
network, which identifies known security flaws. The scanner reports these issues so the IT team can prioritize and fix them to secure the network. Thereare tools like Nessus, Qualys, OpenVAS, Nexpose, Astra etc. CVE stands for Common Vulnerabilities and Exposures and is a standardized identifier for known security vulnerabilities. Each CVE entry includes a uniqueidentifier (e.g., CVE-2024-XXXX), a More ❯