Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Circle Group
advanced offensive roles , including Red Team and Adversarial Simulation Exposure to a broad range of real-world security challenges in varied environments Keywords: Penetration Tester, OSCP, OSEP, Offensive Security, EthicalHacking, Red Team, Web Application Security, Cyber Security Jobs UK, Cloud Security, Infrastructure Testing, Adversarial Simulation, Ethical Hacker, InfoSec, Application Security, UK Cyber Jobs, Security Testing, Cyber More ❯
Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps … validation in data pipelines. Works with SQL, Informatica, Talend, SSIS, Snowflake. AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing More ❯
Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps … validation in data pipelines. Works with SQL, Informatica, Talend, SSIS, Snowflake. AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing More ❯
Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps … validation in data pipelines. Works with SQL, Informatica, Talend, SSIS, Snowflake. AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing More ❯
Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps … validation in data pipelines. Works with SQL, Informatica, Talend, SSIS, Snowflake. AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing More ❯
High Wycombe, Buckinghamshire, UK Hybrid / WFH Options
G&L Consulting
Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps … validation in data pipelines. Works with SQL, Informatica, Talend, SSIS, Snowflake. AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing More ❯
Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps … validation in data pipelines. Works with SQL, Informatica, Talend, SSIS, Snowflake. AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Graphnet Health
solutions that aid service operation. Work closely with the Security teams to analyse and help remediate internal and SoC flagged issues, along with assisting in internal vulnerability checks/ethical hacking. Keep an eye on emerging technologies/approaches and identify where these could be used in our estate to improve existing services. Able to work well as an More ❯
OSINT investigations that help drive positive outcomes in the areas of digital risk and attack surface protection . Our team works at the intersection of technology, critical thinking, and ethical inquiry — always using intelligence for good. The Role As an Associate Analyst & Researcher, you’ll play a key part in supporting and conducting online investigations, drawing insights from digital … ll work with best-in-class OSINT tools and receive mentoring and hands-on training from industry experts. What We’re Looking For A recent graduate in Cyber Security, EthicalHacking, Digital Forensics, Intelligence Studies, or a related field Demonstrable OSINT skills — this might be from a university project, a work placement, a student society, or your own More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯