d love to hear from you. What you will be doing: Planning and executing full-spectrum red team operations against large-scale organisations. Designing and delivering targeted phishing and socialengineering campaigns with behavioural realism. Performing advanced Active Directory enumeration and abuse, including trust path abuse, delegation exploitation, and credential material extraction. Simulating adversary behaviour based on threat … red team infrastructure and frameworks (e.g. Cobalt Strike, Mythic, Sliver, custom C2). Solid grasp of Active Directory and Azure AD internals, and related abuse paths. Familiarity with common socialengineering tactics and phishing techniques, from initial contact to payload execution. Ability to think like an attacker, document like a consultant, and communicate like a trusted advisor. Nice More ❯
threats. You will: Conduct comprehensive penetration tests: Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and socialengineering simulations. Vulnerability identification and analysis: Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises … a penetration tester on the following areas as a minimum: Infrastructure Active Directory networks Web Application penetration testing Cloud security (Entra ID/Azure) IoT mobile physical security/socialengineering Ability to develop custom tools, or adapt existing tooling for the task at hand Demonstrable experience contributing to open-source tools Bachelors degree in Cybersecurity, Information Technology More ❯
threats. You will: Conduct comprehensive penetration tests : Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and socialengineering simulations. Vulnerability identification and analysis : Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises … a penetration tester on the following areas as a minimum: Infrastructure Active Directory networks Web Application penetration testing Cloud security (Entra ID/Azure) IoT mobile physical security/socialengineering Ability to develop custom tools, or adapt existing tooling for the task at hand Demonstrable experience contributing to open-source tools Bachelor's degree in Cybersecurity, Information More ❯
threats. You will: Conduct comprehensive penetration tests : Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and socialengineering simulations. Vulnerability identification and analysis : Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises … a penetration tester on the following areas as a minimum: Infrastructure Active Directory networks Web Application penetration testing Cloud security (Entra ID/Azure) IoT mobile physical security/socialengineering Ability to develop custom tools, or adapt existing tooling for the task at hand Demonstrable experience contributing to open-source tools Bachelor's degree in Cybersecurity, Information More ❯
threats. You will: Conduct comprehensive penetration tests : Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and socialengineering simulations. Vulnerability identification and analysis : Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises … a penetration tester on the following areas as a minimum: Infrastructure Active Directory networks Web Application penetration testing Cloud security (Entra ID/Azure) IoT mobile physical security/socialengineering Ability to develop custom tools, or adapt existing tooling for the task at hand Demonstrable experience contributing to open-source tools Bachelor's degree in Cybersecurity, Information More ❯
threats. You will: Conduct comprehensive penetration tests : Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and socialengineering simulations. Vulnerability identification and analysis : Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises … a penetration tester on the following areas as a minimum: Infrastructure Active Directory networks Web Application penetration testing Cloud security (Entra ID/Azure) IoT mobile physical security/socialengineering Ability to develop custom tools, or adapt existing tooling for the task at hand Demonstrable experience contributing to open-source tools Bachelor's degree in Cybersecurity, Information More ❯
threats. You will: Conduct comprehensive penetration tests : Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and socialengineering simulations. Vulnerability identification and analysis : Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises … a penetration tester on the following areas as a minimum: Infrastructure Active Directory networks Web Application penetration testing Cloud security (Entra ID/Azure) IoT mobile physical security/socialengineering Ability to develop custom tools, or adapt existing tooling for the task at hand Demonstrable experience contributing to open-source tools Bachelor's degree in Cybersecurity, Information More ❯
threats. You will: Conduct comprehensive penetration tests : Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and socialengineering simulations. Vulnerability identification and analysis : Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises … a penetration tester on the following areas as a minimum: Infrastructure Active Directory networks Web Application penetration testing Cloud security (Entra ID/Azure) IoT mobile physical security/socialengineering Ability to develop custom tools, or adapt existing tooling for the task at hand Demonstrable experience contributing to open-source tools Bachelor's degree in Cybersecurity, Information More ❯
penetration testing. Create detailed technical reports and deliver test findings directly to clients. Provide remediation advice and post-assessment consultancy. Contribute to internal testing methodologies and Red Team/socialengineering activities. Mentor junior team members and support collaborative delivery of projects. Occasionally support the creation of marketing materials such as research papers and articles. Skills/Must … and IoT security. Exposure to CI/CD security, Docker/container security, and AI/LLM testing. Hands-on experience with Red Teaming tools (e.g., Cobalt Strike) and social engineering. Familiarity with bug bounty platforms and vulnerability disclosure best practices. Benefits: Competitive salary with regular performance reviews Annual training and personal development plan Access to conferences and professional More ❯
security testing. Conduct manual reviews to identify issues within customer infrastructure and web applications. Perform various types of security testing, including network penetration, web application, mobile security assessments, and social engineering. Participate in red team engagements, employing creative strategies to outsmart defenders. Explore various approaches to gain unauthorized access to customer networks during red team exercises. Perform security assessments More ❯
machine learning, and AI to stop fraud before it happens. Today, over 300 banks, retailers, and fintechs worldwide use Sardine to stop identity fraud, payment fraud, account takeovers, and socialengineering scams. We have raised $145M from world-class investors, including Andreessen Horowitz, Activant, Visa, Experian, FIS, and Google Ventures. Our culture: We have hubs in the Bay … work from there. About the Role: As a backend-focused Software Engineer, you will play a pivotal role in designing, constructing, and maintaining APIs, services, and systems across our engineering team. This multifaceted position involves developing new features on a large scale, refining internal tooling and processes, contributing to product and technical roadmaps, and assuming diverse responsibilities within the … business stakeholders to architect and implement new services from inception to delivery. Contribute to developing new features and capabilities that deliver substantial value to our customers. Work with various engineering and product teams to synchronize efforts and deliver cutting-edge solutions. Craft and maintain user-facing technical documentation, enhancing user understanding and facilitating seamless adoption of our services. Play More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
with proposal writing and scoping. You will have the opportunity to work on a wide range of services: web and mobile application tests, internal tests, infrastructure tests, but also, social engineering. Ensure all testing activities comply with CHECK standards. What We're Looking For Experience : Significant experience in penetration testing, including network, web application and internal penetration testing as More ❯
client relationships We are seeking an enthusiastic Cyber Security Consultantto join our team. Working alongside ourexperienced team of specialists, you'll be delivering offensive securityservices including digital footprint reconnaissance, socialengineering,penetration testing and vulnerability assessments and more to high profileclients across all industries. The purpose of this role is to deliver our offensivesecurity services including digital footprint reconnaissance, socialengineering, vulnerability assessments, penetration testing, threat modelling,cyber-attack simulation exercises, and more to high profile clients across allindustries. The purpose of this role is to deliver our Cyber Security services More ❯
IPS, firewall solutions, offensive security tools ) Basic knowledge of Linux/Unix operating systems Certifications such as Network+, Security+, CySA + Experience with scripting or programming, including malware reverse engineering Professional-level foreign language skills, preferably Russian, Farsi , or Chinese Data or statistical analysis skills Familiarity with open, deep, and dark web cybercriminal marketplaces and forums Experience of online … HUMINT operations and/or socialengineering techniques Capacity to read security logs and code to understand the content and context About Us Why ReliaQuest? Making security possible for our customers starts with our commitment to our people. We inspire every individual to be the best that they can be and provide the tools necessary to get there. More ❯
with blockchain tech. Founded in 2019, Halborn is an elite cyber security company focused on solving complex adversarial problems unique to the cryptocurrency and fintech industries. From breaches and socialengineering to stolen private keys and economic hacks, Halborn solves it. Our clientele are the exclusive blockchain companies as well as new startups with high growth trajectories. Our … security experience. Experience in WASM/BPF is a plus. Understanding of system administration and network administration. Experience using common penetration testing tools (BurpSuite, Metasploit, etc.). Practical reverse engineering and fuzzing experience is a plus. Proficient in at least one scripting language. Proficiency with common server and workstation operating systems. Proficient in testing modern web application languages and More ❯
by joining us, you'll be at the forefront of this ever-evolving landscape. The field is rapidly changing, as threat actors employ AI to scale up phishing and socialengineering operations. Why Join Our Team? "You'll have the chance to build large-scale data pipelines moving billions of data points daily in real-time, and develop … Mentor and guide junior members of the team, establish and champion best practices and introduce fresh ideas and concepts Experience 10+ years of experience working on data processing and engineering for ML models, with 6+ years developing large-scale data and ML systems twhich receive billions of requests per day Expert level know-how of designing and implemention synchronous More ❯
subsequent remediation. Design, manage and deliver specialist assurance activities over first-line and the wider business including, Red & Purple Team assessments, Data Leakage, and Disinformation & Dark-Web Assessments and SocialEngineering exercises. Requirements: Experience as a 'Head of Information Security' or Senior Information Security Management role. Leading teams and enterprise risk remediation programmes. Designing and delivering enterprise Information More ❯
Draft reports, risk register updates, and maintain documentation aligned with best practice (ISO 27001, NIST CSF). Track and advise on industry security trends and their implications. Contribute to socialengineering assessments, BAU risk mitigation, and business process evaluations. Influence and support change by aligning policy updates with new regulations and business needs. What We're Looking For More ❯
to attain a unique perspective of the Internet, and every persona connected to it. On top of driving innovation projects, you’ll be continually collaborating with internal product and engineering teams, customer-facing account teams, and external business leaders and risk managers. The comprehensive models you build will go head-to-head against some of the most motivated attackers … attention to detail and ability to craft a story through data, delivering industry-leading presentations for external and executive audiences Building an extensive knowledge of cybercrime – account takeover, scams, socialengineering, Card Not Present (CNP) fraud, money laundering and mule fraud etc Employing your multi-tasking and prioritisation skills to excel in a fast-paced environment with frequently More ❯
to attain a unique perspective of the Internet, and every persona connected to it. On top of driving innovation projects, you’ll be continually collaborating with internal product and engineering teams, customer-facing account teams, and external business leaders and risk managers. The comprehensive models you build will go head-to-head against some of the most motivated attackers … attention to detail and ability to craft a story through data, delivering industry-leading presentations for external and executive audiences Building an extensive knowledge of cybercrime – account takeover, scams, socialengineering, Card Not Present (CNP) fraud, money laundering and mule fraud etc Employing your multi-tasking and prioritisation skills to excel in a fast-paced environment with frequently More ❯
to attain a unique perspective of the Internet, and every persona connected to it. On top of driving innovation projects, you’ll be continually collaborating with internal product and engineering teams, customer-facing account teams, and external business leaders and risk managers. The comprehensive models you build will go head-to-head against some of the most motivated attackers … attention to detail and ability to craft a story through data, delivering industry-leading presentations for external and executive audiences Building an extensive knowledge of cybercrime – account takeover, scams, socialengineering, Card Not Present (CNP) fraud, money laundering and mule fraud etc Employing your multi-tasking and prioritisation skills to excel in a fast-paced environment with frequently More ❯