Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Investigo
Strong background in penetration testing, ethical hacking, or red teaming Deep knowledge of OWASP Top 10, MITRE ATT&CK, and CVSS scoring systems Proficiency with tools such as BurpSuite, Metasploit, Nmap, Wireshark, and Kali Linux Scripting experience with Python, Bash, or PowerShell Understanding of network protocols, operating systems, and cloud platforms Certifications such as OSCP More ❯
or red teaming engagements Strong knowledge of frameworks such as OWASP Top 10 , MITRE ATT&CK , and risk-scoring methods like CVSS Practical use of tools such as BurpSuite, Nmap, Metasploit, Wireshark, Kali Linux Proficiency with scripting languages (e.g., Python, Bash, PowerShell ) Broad understanding of operating systems, networking, and cloud-based environments Professional certifications such More ❯
Skills & Qualifications Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Proficiency with tools like BurpSuite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating systems, and cloud environments Relevant certifications (e.g., OSCP, CEH More ❯
Skills & Qualifications Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Proficiency with tools like BurpSuite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating systems, and cloud environments Relevant certifications (e.g., OSCP, CEH More ❯
BAS) tools for threat scenario development Strong knowledge of adversary TTPs, MITRE ATT&CK, and modern threat modelling techniques Technical proficiency with pentesting tools such as Metasploit Framework, BurpSuite, Kali Linux, and Pentera Experience producing actionable threat intelligence reports and clear technical briefings I?????f you are ready to drive the next wave of cyber More ❯
BAS) tools for threat scenario development Strong knowledge of adversary TTPs, MITRE ATT&CK, and modern threat modelling techniques Technical proficiency with pentesting tools such as Metasploit Framework, BurpSuite, Kali Linux, and Pentera Experience producing actionable threat intelligence reports and clear technical briefings I f you are ready to drive the next wave of cyber More ❯