Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Investigo
background in penetration testing, ethical hacking, or red teaming Deep knowledge of OWASP Top 10, MITRE ATT&CK, and CVSS scoring systems Proficiency with tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux Scripting experience with Python, Bash, or PowerShell Understanding of network protocols, operating systems, and cloud platforms Certifications such as OSCP , CEH , GPEN , or CRTP More ❯
teaming engagements Strong knowledge of frameworks such as OWASP Top 10 , MITRE ATT&CK , and risk-scoring methods like CVSS Practical use of tools such as Burp Suite, Nmap, Metasploit, Wireshark, Kali Linux Proficiency with scripting languages (e.g., Python, Bash, PowerShell ) Broad understanding of operating systems, networking, and cloud-based environments Professional certifications such as OSCP, GPEN, CEH, CRTP More ❯
Qualifications Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating systems, and cloud environments Relevant certifications (e.g., OSCP, CEH, GPEN, CRTP) are highly More ❯
Qualifications Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITRE ATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating systems, and cloud environments Relevant certifications (e.g., OSCP, CEH, GPEN, CRTP) are highly More ❯
Breach & Attack Simulation (BAS) tools for threat scenario development Strong knowledge of adversary TTPs, MITRE ATT&CK, and modern threat modelling techniques Technical proficiency with pentesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing actionable threat intelligence reports and clear technical briefings If you are ready to drive the next wave of cyber defense More ❯
Breach & Attack Simulation (BAS) tools for threat scenario development Strong knowledge of adversary TTPs, MITRE ATT&CK, and modern threat modelling techniques Technical proficiency with pentesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing actionable threat intelligence reports and clear technical briefings I f you are ready to drive the next wave of cyber More ❯