London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
Experience 3-5+ years' professional penetration testing/offensive security experience Strong understanding of enterprise infrastructure, AD security, networking, and protocols Proficiency with tools such as Nmap, Nessus, Metasploit, BloodHound, Burp Suite, Kali/Linux toolsets Solid track record of delivering infrastructure pentests end-to-end Excellent communication skills, including producing business-focused reporting Preferred Qualifications CHECK Team More ❯
tool development What You'll Bring 2+ years' experience in penetration testing or vulnerability assessment CHECK, Crest, or equivalent certification Strong technical understanding of networks, OS, and security tools (Metasploit, Burp Suite, Nmap, etc.) Excellent communication and problem-solving skills Nice to Have Coding/Scripting (Python, Bash, C#) Web/mobile app testing, reverse engineering, or malware analysis More ❯
tool development What You’ll Bring 2+ years’ experience in penetration testing or vulnerability assessment CHECK, CREST, or equivalent certification Strong technical understanding of networks, OS, and security tools (Metasploit, Burp Suite, Nmap, etc.) Excellent communication and problem-solving skills Nice to Have Coding/scripting (Python, Bash, C#) Web/mobile app testing, reverse engineering, or malware analysis More ❯
and deliverables Extensive experience with common automated VAPT tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave Expert in common attack tools and frameworks such as Wireshark, Kali, Metasploit, etc. Expert in mobile platform security technology, including vulnerability identification and exploitation tools, as well as mobile platform security best practices, frameworks, etc. Understand VAPT in the context of More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
penetration testing Strong knowledge of attacker frameworks (e.g., MITRE ATT&CK, NIST adversary simulation guidelines) Highly proficient with red team tools and techniques (e.g., Cobalt Strike, Mimikatz, Sliver, BloodHound, Metasploit etc.) Hands-on experience with Active Directory attacks , privilege escalation , lateral movement , and stealth operations Ability to conduct social engineering and phishing campaigns Strong understanding of networking, Windows/ More ❯
london (city of london), south east england, united kingdom
Bonhill Partners
experience in offensive security, including red teaming and penetration testing Strong understanding of the MITRE ATT&CK framework and threat emulation methodologies Proficiency in offensive tools (Cobalt Strike, Sliver, Metasploit, etc.) and custom payload development Experience with evasion techniques (e.g., AV/EDR bypass, obfuscation, DLL sideloading) Good knowledge of Windows and Linux internals, AD exploitation, and cloud environments More ❯
Familiarity with customer satisfaction and retention initiatives. Knowledge of Lean and Agile tools (e.g., Microsoft Planner, JIRA, Confluence). Involvement in offensive cybersecurity (red teaming, use of tools like Metasploit, Nmap, etc.). Experience with physical security assessments aligned with NIS and NPSA standards. Expertise in Digital Forensics and Incident Response (DFIR) in industrial environments (e.g., VxWorks, RTOS, Embedded More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitmen
Hands-on experience in penetration testing or IT Health Check delivery Eligibility to obtain and maintain UK security clearances. Familiarity with common tools such as Burp Suite, Nmap, Nessus, Metasploit, etc. Understanding of network protocols (TCP/IP, OSI model) and common web application Current penetration testing qualification such as Crest Practitioner Security Analyst (CPSA), Crest Registered Tester (CRT More ❯