Have Skills: Active Offensive Security OSCP or GIAC GPEN certification Active Security+, SSCP, CISSP, CISM, GSEC, GCIH, GSLC, CASP, Network+, CCNA, CCNP, or CCIE certification Hands-on experience with Linux and Windows OS Proficiency in Python, PowerShell, and Bash scripting Experience with tools like KaliLinux, Metasploit Pro, and NMAP; capable of exploiting vulnerabilities such as SQL … ATT&CK Framework and core networking concepts. Responsibilities and Job Details: Conduct red team operations and penetration testing activities Exploit vulnerabilities and simulate sophisticated attack scenarios Utilize tools including KaliLinux, Metasploit Pro, and NMAP for offensive security testing Develop and execute exploits such as SQL injection, XSS, and password attacks Write and maintain scripts in Python, PowerShell … to automate tasks and testing procedures Collaborate with Blue Team counterparts to improve overall security posture Analyze and report on vulnerabilities, scoring, and remediation efforts Apply deep knowledge of Linux and Windows environments during testing Leverage knowledge of ports, protocols, operating systems, and file systems in assessments Adhere to shift coverage requirements (03:00 - 12:00 EST) Communicate findings More ❯
actionable reports to both technical and non-technical audiences. Requirements Proven experience in penetration testing and ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP, OSCE, CEH, or similar are More ❯
At least 2+ years of experience in penetration testing. Demonstrable skills in the Penetration Testing/Ethical Hacking field. In-depth knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience with web application and network pen testing methodologies. Proficiency in using penetration testing tools … such as BurpSuite Pro, Nmap, and Nessus. Familiarity with KaliLinux and the associated penetration testing tool suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag. Excellent communication and technical report writing skills. Eligibility to live and work in the UK (please note we are unable to provide VISA sponsorship). Nice to More ❯
least 1-2 years of experience in penetration testing. Demonstrable skills in the Penetration Testing/Ethical Hacking field. In-depth knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience with web application and network pen testing methodologies. Proficiency in using penetration testing tools … such as BurpSuite Pro, Nmap, and Nessus. Familiarity with KaliLinux and the associated penetration testing tool suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag. Excellent communication and technical report writing skills. Eligibility to live and work in the UK (please note we are unable to provide VISA sponsorship). Nice to More ❯
papers and articles. Skills/Must have: Strong knowledge of OWASP methodologies and offensive testing across black/grey/white-box approaches. Proficiency in tools like Burp Suite, Kali, Nmap, Nessus, Qualys, Metasploit. Familiarity with cloud platform security testing (AWS, Azure, GCP). Understanding of mobile security (Android & iOS), networking protocols, and the OSI model. Excellent verbal and More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Cyber Guarded Ltd
and readiness to pursue the CSTM exam soon Hold a UKCSC Professional Registration Title of Practitioner, Principal or Chartered in the Security Testing Specialism. Strong working knowledge of networks, Linux/Windows, and web technologies Experience with tools such as Burp Suite, Metasploit, KaliLinux, and Nessus Excellent problem-solving, communication, and reporting skills What We Offer More ❯
people who have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g. … AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, KaliLinux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in designing or adapting course material More ❯
people who have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g. … AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, KaliLinux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in designing or adapting course material More ❯
people who have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g. … AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, KaliLinux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in designing or adapting course material More ❯
CTM) or CHECK Team Leader (CTL) status Demonstrable experience delivering penetration testing across networks, applications, and cloud environments Strong working knowledge of tools such as Burp Suite, Cobalt Strike, KaliLinux, etc. Familiarity with reporting to NCSC standards and presenting findings to both technical and non-technical audiences Ability to obtain or hold SC clearance Desirable OSCP, OSCE More ❯
IVM, Tenable IO or Nessus Palo Alto Firewalls, InTune, Entra ID, Active Directory Desirable: Imperva WAF, Menlo Security, Cisco Secure Access/Umbrella, KnowBe4, AppCheck Ivanti or Automox patching KaliLinux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetration More ❯
IVM, Tenable IO or Nessus Palo Alto Firewalls, InTune, Entra ID, Active Directory Desirable: Imperva WAF, Menlo Security, Cisco Secure Access/Umbrella, KnowBe4, AppCheck Ivanti or Automox patching KaliLinux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetration More ❯
regulatory landscape: e.g. CAF, NCSC, NIS. Knowledge of OT network protocols: e.g. modbus, DNP3, LoRaWAN. Tools: Experience with standard penetration testing tools, such as port and vulnerability scanners, BurpSuite, KaliLinux, etc as well as OT/ICS related tools and traffic analysis solutions (e.g. Malcom, Hedgehog Linux). Communication: Strong verbal and written communication skills for More ❯
a consultative capacity Demonstratable experience in delivering Web Application and Infrastructure/cloud tests Relevant penetration testing certifications (OSCP, CRT, CCT) Experience of relevant toolings such as Nessus, Qualys, Kali etc.. Experience mentoring or assisting junior/graduate testers Eligibility to be SC Cleared This client do pen testing differently & are not your typical offensive security consultancy & there are More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
FryerMiles Recruitment
a consultative capacity Demonstratable experience in delivering Web Application and Infrastructure/cloud tests Relevant penetration testing certifications (OSCP, CRT, CCT) Experience of relevant toolings such as Nessus, Qualys, Kali etc.. Experience mentoring or assisting junior/graduate testers Eligibility to be SC Cleared This client do pen testing differently & are not your typical offensive security consultancy & there are More ❯
/Auditing role Previous work in a Managed Service Provider (MSP) environment A Strong understanding of Microsoft 365 & Azure Cloud Experience with technical audits and offensive security tools (e.g. KaliLinux) Familiarity with vulnerability management tools like Tenable or Qualys OSCP (Offensive Security Certified Professional) status Microsoft SC-200 and AZ-500 certifications Experience with Microsoft Defender suite More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Marlin Selection
MAM Desirable Experience: Working knowledge of tools such as: Imperva WAF Cisco Secure Access/Umbrella/ASA KnowBe4 Menlo Security Ivanti, Automox, AppCheck Certificate management tools (e.g., Digicert) KaliLinux toolset Qualifications & Skills: Relevant certifications such as CISM, SC-100/200/900, OSCP or equivalent. Strong interpersonal and communication skills. Ability to lead, prioritise, and More ❯
web security gateways (e.g., Mimecast) MFA/SSO (e.g., Duo, Okta) Vulnerability scanners (e.g., Rapid7, Tenable, Nessus) InTune and Conditional Access Exposure to: Imperva WAF KnowBe4 Certificate management tools KaliLinux toolset and penetration testing basics Qualifications: Working towards or holding certifications such as SC-200, SC-900, OSCP, or similar. Strong communication skills and an eagerness to More ❯
knowledge of Microsoft 365 and Azure Cloud technologies. In addition, they will have experience of client reporting and analytics, as well as experience of offensive security tools, such as Kali Linux. This is a fantastic opportunity for a Cyber Security professional to develop their career in an ongoing learning and highly supportive environment, with opportunities to obtain further fully More ❯
knowledge of Microsoft 365 and Azure Cloud technologies. In addition, they will have experience of client reporting and analytics, as well as experience of offensive security tools, such as Kali Linux. This is a fantastic opportunity for a Cyber Security professional to develop their career in an ongoing learning and highly supportive environment, with opportunities to obtain further fully More ❯
City of Westminster, Greater London, Tottenham Court Road, United Kingdom
Mobilus Limited
knowledge of Microsoft 365 and Azure Cloud technologies. In addition, they will have experience of client reporting and analytics, as well as experience of offensive security tools, such as Kali Linux. This is a fantastic opportunity for a Cyber Security professional to develop their career in an ongoing learning and highly supportive environment, with opportunities to obtain further fully More ❯