the client’s advocate for cybersecurity best practices and will provide recommendations in this domain. Your Impact Conducts periodic scans of networks to find and detect vulnerabilities Performs client penetrationtesting to find any vulnerabilities or weaknesses that might be exploited by a malicious party, using open-source, custom, and commercial testing tools Ability to assist in … scoping engagements by clearly articulating various penetration approaches and methodologies to audiences ranging from highly technical to executive personnel Report generation that clearly communicates testing and assessment details, results, and remediation recommendations to clients Develop scripts, tools, and methodologies to automate and streamline internal processes and engagements Conducts IT application testing, cybersecurity tool and systems analysis, system … and network administration, and systems engineering support for the sustainment of information technology systems (mobile application testing, penetrationtesting, application, security, and hardware testing) Conduct threat hunting and/or compromise assessment engagements to identify active or dormant indicators of compromise (IoCs) using Crypsis and Palo Alto Networks’ threat hunting tools (and/or client owned More ❯
the client’s advocate for cybersecurity best practices and will provide recommendations in this domain. Your Impact Conducts periodic scans of networks to find and detect vulnerabilities Performs client penetrationtesting to find any vulnerabilities or weaknesses that might be exploited by a malicious party, using open-source, custom, and commercial testing tools Ability to assist in … scoping engagements by clearly articulating various penetration approaches and methodologies to audiences ranging from highly technical to executive personnel Report generation that clearly communicates testing and assessment details, results, and remediation recommendations to clients Develop scripts, tools, and methodologies to automate and streamline internal processes and engagements Conducts IT application testing, cybersecurity tool and systems analysis, system … and network administration, and systems engineering support for the sustainment of information technology systems (mobile application testing, penetrationtesting, application, security, and hardware testing) Conduct threat hunting and/or compromise assessment engagements to identify active or dormant indicators of compromise (IoCs) using Crypsis and Palo Alto Networks’ threat hunting tools (and/or client owned More ❯
Penetration Tester Permanent - up to £85k per annum London based - hybrid working - 2-3 days office based Must have CHECK CTL and certified Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus understanding on threat intelligence and attack methods. The ideal candidate will be responsible for managing and conducting advanced penetrationtesting engagements, leveraging threat intelligence to simulate real-world attacks across a variety of environments, including OT, IT, web applications, cloud infrastructure, and APIs. This role requires a deep understanding of adversarial approaches, excellent communication skills, and the ability to provide strategic and actionable recommendations to significantly enhance our clients' security posture. Responsibilities: Lead and manage the full … lifecycle of complex penetrationtesting engagements, applying a strong threat intelligence-led approach. Execute advanced penetration tests across a broad range of environments (applications, infrastructure, web, APIs, O365, Azure, AWS, OT), directly applying your knowledge of current threat landscapes and attacker TTPs. Develop and maintain sophisticated test plans, execution plans, and targeted use cases directly informed by More ❯
london, south east england, united kingdom Hybrid / WFH Options
Advanced Resource Managers
Penetration Tester Permanent – up to £85k per annum London based – hybrid working – 2-3 days office based Must have CHECK CTL and certified Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus understanding on threat intelligence and attack methods. The ideal candidate will be responsible for managing and conducting advanced penetrationtesting engagements, leveraging threat intelligence to simulate real-world attacks across a variety of environments, including OT, IT, web applications, cloud infrastructure, and APIs. This role requires a deep understanding of adversarial approaches, excellent communication skills, and the ability to provide strategic and actionable recommendations to significantly enhance our clients' security posture. Responsibilities: Lead and manage the full … lifecycle of complex penetrationtesting engagements, applying a strong threat intelligence-led approach. Execute advanced penetration tests across a broad range of environments (applications, infrastructure, web, APIs, O365, Azure, AWS, OT), directly applying your knowledge of current threat landscapes and attacker TTPs. Develop and maintain sophisticated test plans, execution plans, and targeted use cases directly informed by More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Advanced Resource Managers
Penetration Tester Permanent – up to £85k per annum London based – hybrid working – 2-3 days office based Must have CHECK CTL and certified Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus understanding on threat intelligence and attack methods. The ideal candidate will be responsible for managing and conducting advanced penetrationtesting engagements, leveraging threat intelligence to simulate real-world attacks across a variety of environments, including OT, IT, web applications, cloud infrastructure, and APIs. This role requires a deep understanding of adversarial approaches, excellent communication skills, and the ability to provide strategic and actionable recommendations to significantly enhance our clients' security posture. Responsibilities: Lead and manage the full … lifecycle of complex penetrationtesting engagements, applying a strong threat intelligence-led approach. Execute advanced penetration tests across a broad range of environments (applications, infrastructure, web, APIs, O365, Azure, AWS, OT), directly applying your knowledge of current threat landscapes and attacker TTPs. Develop and maintain sophisticated test plans, execution plans, and targeted use cases directly informed by More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Advanced Resource Managers
Penetration Tester Permanent – up to £85k per annum London based – hybrid working – 2-3 days office based Must have CHECK CTL and certified Role Overview: We are seeking a highly skilled and experienced Offensive Security Consultant with a strong focus understanding on threat intelligence and attack methods. The ideal candidate will be responsible for managing and conducting advanced penetrationtesting engagements, leveraging threat intelligence to simulate real-world attacks across a variety of environments, including OT, IT, web applications, cloud infrastructure, and APIs. This role requires a deep understanding of adversarial approaches, excellent communication skills, and the ability to provide strategic and actionable recommendations to significantly enhance our clients' security posture. Responsibilities: Lead and manage the full … lifecycle of complex penetrationtesting engagements, applying a strong threat intelligence-led approach. Execute advanced penetration tests across a broad range of environments (applications, infrastructure, web, APIs, O365, Azure, AWS, OT), directly applying your knowledge of current threat landscapes and attacker TTPs. Develop and maintain sophisticated test plans, execution plans, and targeted use cases directly informed by More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
Principal Offensive Security Consultant £100k Location: Hybrid (2 days per month in London) Salary: £80,000 - £100,000 + benefits Are you a Senior Offensive Security Consultant or Principal Penetration Tester ready to take the next step into Red Teaming and Adversarial Simulation This is your opportunity to join an agile, rapidly growing UK cyber security consultancy where you … to research and tooling that truly make an impact. About the Role As a Senior/Principal Offensive Consultant , you'll lead complex technical engagements that go beyond standard penetrationtesting - focusing on advanced exploitative infrastructure testing , Active Directory compromise , and assumed breach assessments . You'll work directly with clients to scope, plan, and deliver high … impact projects, while helping to expand the organisation's Red Team and adversarial simulation services . Key Responsibilities: Lead and deliver high-level infrastructure and Active Directory penetrationtesting engagements. Conduct advanced exploitative testing , lateral movement analysis, and privilege escalation within real-world environments. Support presales activity - crafting scopes, proposals, and technical solutions aligned with client objectives. More ❯
Japan. Our team of hands-on experts helps a blue chip client base of global OEMs and suppliers secure next-generation vehicles and mobility solutions through cybersecurity-by-design, testing and validation, competitive benchmarking and cutting-edge research and development. You will join at an exciting phase in our journey, with an opportunity to play a key role in … and experience An exciting opportunity to apply your technical cybersecurity expertise on cutting-edge projects with leading automotive clients. In this hands-on engineering role, you will apply advanced penetrationtesting, benchmarking, PoC development and security engineering techniques to evaluate and strengthen the resilience of next-generation automotive technologies. You will conduct in-depth assessments of diverse systems … a key role in shaping the security of future mobility solutions worldwide. The Role The position is predominantly lab-based, with responsibilities including: Planning and executing a variety of penetrationtesting projects on vehicle components and associated telematics infrastructure including whole vehicles. Performing technical benchmarking of components, systems and vehicles. Developing cybersecurity proof-of-concepts. Providing cybersecurity recommendations More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Network Security Engineer Network Security/PenetrationTesting/CREST/CSTL/API Testing/Config Reviews/Infrastructure/Outside IR35/West London We’re seeking an experienced Network Security Engineer to support a major multi-phase security testing project. You’ll conduct penetration tests, configuration reviews, and infrastructure assessments, contributing to … a high-profile programme of work extending into next year. Required Strong background in network and infrastructure security. Experience performing penetrationtesting, configuration reviews, and API testing. Knowledge of “classic” CHECK-style testing methodologies. CREST, CSTL or CTL certification (Team Member or Team Leader level). Ability to deliver high-quality reports and communicate technical findings clearly. … Hands-on experience across infrastructure, networking, and external testing. Desirable Experience working within CHECK or other accredited testing schemes. Strong understanding of secure network architecture and hardening practices. Previous consultancy or project-based testing experience. Contract Details Outside IR35 West London (on-site presence required for majority of testing) 0-hours contract – project-based work, phase by More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Network Security Engineer Network Security/PenetrationTesting/CREST/CSTL/API Testing/Config Reviews/Infrastructure/Outside IR35/West London We’re seeking an experienced Network Security Engineer to support a major multi-phase security testing project. You’ll conduct penetration tests, configuration reviews, and infrastructure assessments, contributing to … a high-profile programme of work extending into next year. Required Strong background in network and infrastructure security. Experience performing penetrationtesting, configuration reviews, and API testing. Knowledge of “classic” CHECK-style testing methodologies. CREST, CSTL or CTL certification (Team Member or Team Leader level). Ability to deliver high-quality reports and communicate technical findings clearly. … Hands-on experience across infrastructure, networking, and external testing. Desirable Experience working within CHECK or other accredited testing schemes. Strong understanding of secure network architecture and hardening practices. Previous consultancy or project-based testing experience. Contract Details Outside IR35 West London (on-site presence required for majority of testing) 0-hours contract – project-based work, phase by More ❯
analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and PenetrationTesting teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies Act as a liaison between threat intelligence and … intelligence and offensive security operations Ad hoc requests from your line manager Cyber Security Analyst Ideal Candidate: At least 5 years of experience in threat intelligence, cybersecurity operations, or penetrationtesting Ability to collaborate across technical teams, including Red/Blue teams and SOC Familiarity with threat intelligence platforms (TIPs), SIEMs, and threat data enrichment tools Experience using … Breach and Attack Simulation (BAS) platforms Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modelling Hands-on experience with penetrationtesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing threat reports and briefings Business level fluency in English Japanese, Cantonese, Mandarin language would be advantageous due More ❯
analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and PenetrationTesting teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies Act as a liaison between threat intelligence and … intelligence and offensive security operations Ad hoc requests from your line manager Cyber Security Analyst Ideal Candidate: At least 5 years of experience in threat intelligence, cybersecurity operations, or penetrationtesting Ability to collaborate across technical teams, including Red/Blue teams and SOC Familiarity with threat intelligence platforms (TIPs), SIEMs, and threat data enrichment tools Experience using … Breach and Attack Simulation (BAS) platforms Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modelling Hands-on experience with penetrationtesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing threat reports and briefings Business level fluency in English Japanese, Cantonese, Mandarin language would be advantageous due More ❯
london (city of london), south east england, united kingdom
Centre People Appointments
analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and PenetrationTesting teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies Act as a liaison between threat intelligence and … intelligence and offensive security operations Ad hoc requests from your line manager Cyber Security Analyst Ideal Candidate: At least 5 years of experience in threat intelligence, cybersecurity operations, or penetrationtesting Ability to collaborate across technical teams, including Red/Blue teams and SOC Familiarity with threat intelligence platforms (TIPs), SIEMs, and threat data enrichment tools Experience using … Breach and Attack Simulation (BAS) platforms Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modelling Hands-on experience with penetrationtesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing threat reports and briefings Business level fluency in English Japanese, Cantonese, Mandarin language would be advantageous due More ❯
analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and PenetrationTesting teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies Act as a liaison between threat intelligence and … intelligence and offensive security operations Ad hoc requests from your line manager Cyber Security Analyst Ideal Candidate: At least 5 years of experience in threat intelligence, cybersecurity operations, or penetrationtesting Ability to collaborate across technical teams, including Red/Blue teams and SOC Familiarity with threat intelligence platforms (TIPs), SIEMs, and threat data enrichment tools Experience using … Breach and Attack Simulation (BAS) platforms Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modelling Hands-on experience with penetrationtesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing threat reports and briefings Business level fluency in English Japanese, Cantonese, Mandarin language would be advantageous due More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Infrastructure Penetration Tester | CHECK | CREST | CSTL/CTL | Networking | Config Reviews | API Testing | Contract Pen Testing | Infrastructure | External & Internal Networks | SR2 is partnered with a leading security consultancy on a significant multi-phase testing programme, and we’re looking for an experienced Infrastructure Penetration Tester to join the team. This role will focus on delivering … hands-on penetrationtesting across external and internal networks, reviewing system configurations, and identifying vulnerabilities within critical infrastructure. You’ll work alongside a small team of experienced testers to support a major client undergoing large-scale change, ensuring their environment is secure and compliant. Key Responsibilities: Conduct comprehensive external and internal infrastructure penetration tests , starting with perimeter … systems and moving into internal networks Perform configuration reviews across servers, firewalls, routers, and network devices Execute API security testing to assess authentication, data access, and integration risks Deliver “old-school” CHECK-style network and infrastructure testing in line with industry standards Produce detailed technical reports outlining vulnerabilities, exploitation paths, and remediation guidance Collaborate with the project lead More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Infrastructure Penetration Tester | CHECK | CREST | CSTL/CTL | Networking | Config Reviews | API Testing | Contract Pen Testing | Infrastructure | External & Internal Networks | SR2 is partnered with a leading security consultancy on a significant multi-phase testing programme, and we’re looking for an experienced Infrastructure Penetration Tester to join the team. This role will focus on delivering … hands-on penetrationtesting across external and internal networks, reviewing system configurations, and identifying vulnerabilities within critical infrastructure. You’ll work alongside a small team of experienced testers to support a major client undergoing large-scale change, ensuring their environment is secure and compliant. Key Responsibilities: Conduct comprehensive external and internal infrastructure penetration tests , starting with perimeter … systems and moving into internal networks Perform configuration reviews across servers, firewalls, routers, and network devices Execute API security testing to assess authentication, data access, and integration risks Deliver “old-school” CHECK-style network and infrastructure testing in line with industry standards Produce detailed technical reports outlining vulnerabilities, exploitation paths, and remediation guidance Collaborate with the project lead More ❯
Manual Penetration Tester Fully Remote We're proud to be working with a renowned MSP in support of their search for an experienced Manual Penetration Tester. Key Responsibilities Carry out hands-on penetrationtesting across applications, infrastructure, and networks, with a particular focus on web apps and security products Deliver highly technical and effective security engagements … through hands on systematic and innovative testing Lead teams on client engagements as well as working alone Deliver detailed and actionable penetration test reports efficiently Explain complex security issues in a clear, business-focused way to different audiences, from technical development teams to senior non-technical management teams. Required experience Proven history in the delivery of manual penetrationtesting (Application and Infrastructure) A solid understanding of TCP/IP and networking concepts Extensive knowledge in the testing of Web-based applications Knowledge or experience of security build reviews for all common operating systems Comfortable with programming in one or more languages Deep knowledge of databases, including security considerations and database hardening techniques Solid technical understanding More ❯
/IPS, endpoint protection, etc.). • Monitoring security policies, standards, and best practices. • Reviewing and monitoring user access and identity management controls across systems. • Key activities in relation to PenetrationTesting & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing … of Information and Cyber Security practices like NIST, Cyber Essentials +, ISO27001. • Familiarity with regulatory compliance and auditing standards. • Ability to identify, assess and mitigate security risks. • Knowledge of penetrationtesting and vulnerability scanning tools like Nessus and Qualys. • Proficiency in applying security tooling including firewalls, VPN’s, Network Traffic Analysis. • Knowledge of network protocols TCP/IP More ❯
/IPS, endpoint protection, etc.). • Monitoring security policies, standards, and best practices. • Reviewing and monitoring user access and identity management controls across systems. • Key activities in relation to PenetrationTesting & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing … of Information and Cyber Security practices like NIST, Cyber Essentials +, ISO27001. • Familiarity with regulatory compliance and auditing standards. • Ability to identify, assess and mitigate security risks. • Knowledge of penetrationtesting and vulnerability scanning tools like Nessus and Qualys. • Proficiency in applying security tooling including firewalls, VPN’s, Network Traffic Analysis. • Knowledge of network protocols TCP/IP More ❯
/IPS, endpoint protection, etc.). • Monitoring security policies, standards, and best practices. • Reviewing and monitoring user access and identity management controls across systems. • Key activities in relation to PenetrationTesting & Vulnerability Assessments will include conducting internal and external penetration tests to evaluate system security. • Performing regular vulnerability scans using tools like Nessus, Qualys, or OpenVAS. • Analysing … of Information and Cyber Security practices like NIST, Cyber Essentials +, ISO27001. • Familiarity with regulatory compliance and auditing standards. • Ability to identify, assess and mitigate security risks. • Knowledge of penetrationtesting and vulnerability scanning tools like Nessus and Qualys. • Proficiency in applying security tooling including firewalls, VPN's, Network Traffic Analysis. • Knowledge of network protocols TCP/IP More ❯
Experience with security and compliance tools such as ISMS Online, Qualys VMDR, and Cofense phishing simulation would be highly advantageous. The role requires strong proficiency in vulnerability management, coordinating penetrationtesting, supplier security assurance, and incident response. A thorough understanding of legal and procedural obligations relating to data protection and information governance is essential. Excellent communication and stakeholder … and Experience Proven experience managing an enterprise ISMS and leading ISO 27001 audits. Strong understanding of cyber threats, cloud security (Azure, M365), and regulatory compliance. Experience with supplier assurance, penetrationtesting, and vulnerability management. Excellent stakeholder engagement and communication skills. Ability to work independently and influence cross-functional teams. Familiarity with Cofense phishing simulation tool, ISMS Online, Qualys More ❯
Experience with security and compliance tools such as ISMS Online, Qualys VMDR, and Cofense phishing simulation would be highly advantageous. The role requires strong proficiency in vulnerability management, coordinating penetrationtesting, supplier security assurance, and incident response. A thorough understanding of legal and procedural obligations relating to data protection and information governance is essential. Excellent communication and stakeholder … and Experience Proven experience managing an enterprise ISMS and leading ISO 27001 audits. Strong understanding of cyber threats, cloud security (Azure, M365), and regulatory compliance. Experience with supplier assurance, penetrationtesting, and vulnerability management. Excellent stakeholder engagement and communication skills. Ability to work independently and influence cross-functional teams. Familiarity with Cofense phishing simulation tool, ISMS Online, Qualys More ❯
Security Engineer – GCP, Cloud Security, Pen Testing - Hybrid (London) You will be joining a company that build software solutions fast to solve real problems within the workplace. The team builds tools that help engineering and product teams respond to incidents, reduce downtime, and continuously improve. We’re looking for a pragmatic, energetic customer facing and product-minded engineers who … Teams to embed security features into designs Detect security weaknesses across API's, Applications and Infrastructure Driving secure development practices across the business Requirements: White-box and Black-box testingPenetrationTesting Cloud Security in GCP Secure Software Development (Go, Typescript) Ability to conduct in-depth Security Research If you're interested please get in touch ASAP More ❯
Security Engineer – GCP, Cloud Security, Pen Testing - Hybrid (London) You will be joining a company that build software solutions fast to solve real problems within the workplace. The team builds tools that help engineering and product teams respond to incidents, reduce downtime, and continuously improve. We’re looking for a pragmatic, energetic customer facing and product-minded engineers who … Teams to embed security features into designs Detect security weaknesses across API's, Applications and Infrastructure Driving secure development practices across the business Requirements: White-box and Black-box testingPenetrationTesting Cloud Security in GCP Secure Software Development (Go, Typescript) Ability to conduct in-depth Security Research If you're interested please get in touch ASAP More ❯
london (city of london), south east england, united kingdom
Movement8
Security Engineer – GCP, Cloud Security, Pen Testing - Hybrid (London) You will be joining a company that build software solutions fast to solve real problems within the workplace. The team builds tools that help engineering and product teams respond to incidents, reduce downtime, and continuously improve. We’re looking for a pragmatic, energetic customer facing and product-minded engineers who … Teams to embed security features into designs Detect security weaknesses across API's, Applications and Infrastructure Driving secure development practices across the business Requirements: White-box and Black-box testingPenetrationTesting Cloud Security in GCP Secure Software Development (Go, Typescript) Ability to conduct in-depth Security Research If you're interested please get in touch ASAP More ❯