have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (PenetrationTesting) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. More ❯
log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (PenetrationTesting) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Education Requirements & Experience Minimum of 2 to More ❯
Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of Vulnerability Scanning, Management, and Ethical Hacking (PenetrationTesting). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work in a 24/7 operations More ❯
verbal and written English communication skills. Interpersonal and presentation skills. Strong analytical skills. Understanding network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (PenetrationTesting). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines (Incident, Problem, Change Management). Ability to work independently. Willingness to work More ❯
Key responsibilities include: Designing security architectures, solutions, and controls to safeguard client assets and data. Developing incident response plans and assisting customers in their implementation. Performing security assessments , including penetrationtesting, to identify vulnerabilities and proposing mitigation strategies. Recommending and implementing security tools such as firewalls, IDS, endpoint protection, and DDoS mitigation solutions. Building strong client relationships through More ❯
of areas such as access management, IT operations, job scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerability assessment and penetrationtesting, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology More ❯
resources, and the rate/salary is totally dependant on your experience, from 3 years to 30 years. The requirements are as follows: Manual Testers/QA Analysts & Automation Testing Execute test cases manually. Focus on UI/UX, functionality, user stories, and regression. Tools: Excel, TestRail, Zephyr, Jira, Quality Center. Create and execute automated test scripts. Improve test … coverage, speed up regression cycle. Tools: UFT (Unified Functional Testing) – enterprise tool for functional/regression testing (VBScript). Selenium Cypress Appium Playwright, TestComplete, Ranorex, Robot Framework. Multiple Deliverables SDET Testing (Software Development Engineer in Test) Ideally Developer-tester hybrid. Write testing frameworks and also contribute to production code. Strong coding background (Java, Python, C#, etc. … . Build integration and end-to-end automation pipelines. Performance/Load Testing Simulates real-world load and stress on systems. Ensures system performance, scalability, and reliability. Tools: JMeter, LoadRunner, Gatling, Neoload. Functional Testing Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and More ❯
If you're looking to join an established organisation expanding their penetrationtesting capabilities. As part of this strategic investment I'm now on the lookout for a number of experienced penetration testers to join the team. This is a genuine opportunity for a penetration tester to deliver impactful testing work - without getting side lined … adjacent tasks or red tape! If you're looking for a role to focus on delivering high-quality assessments and reports, honing your skills across a broad range of testing disciplines with full investment for training & certifications (including those you personally want to go for) this could be for you. What you'll be doing As a penetration … AWS, GCP, Azure) Produce clear, concise and actionable reports for both technical and none technical audiences. Ability to work on your own or collaboratively alongside a skilled team of penetration testers. Engage with clients and internal stakeholders to explain finding and remediation steps wherever appropriate. What's in it for you? Remote first culture - Must be UK Based Exposure More ❯