Greater London, Grange, United Kingdom Hybrid / WFH Options
Remarkable Jobs
Testing Consultant (Pen Tester) Responsibilities: Perform regular penetration tests on web applications, infrastructure, cloud, API, wireless, and mobile applications Contribute to Red Team and socialengineering testing Write reports and present test findings to clients Consult clients on required remedial actions Assist in developing junior team members Help … Hands-on experience with programming languages, databases, and IoT Knowledge of containerization technologies (e.g., Docker) Experience with Attack & Threat Modeling Red Team testing and socialengineering methodologies Working knowledge of CobaltStrike Experience with bug bounty programs and vulnerability disclosure policies Security Testing Consultant (Pen Tester) Education, Training, and more »
rewards for outstanding performance. Responsibilities: Perform regular penetration tests on web applications, infrastructure, cloud, API, wireless, and mobile applications. Contribute to Red Team and socialengineering testing. Write detailed reports and present test findings to clients. Consult clients on required remedial actions. Assist with the development of junior … with programming languages, databases, and IoT. Knowledge of containerisation technologies such as Docker. Experience with Attack & Threat Modelling. Familiarity with Red Team testing and socialengineering attack methodologies. Working knowledge of CobaltStrike. Experience with bug bounty programs and vulnerability disclosure policies. Education, Training, and Experience: Bachelor's degree more »
software, authentication systems, log management, content filtering, etc.An excellent understanding of security approaches: ISMS, risk analysis and assessments, the CIA triad, attack vectors including socialengineering, cryptography, confidentiality issues and cyber security incident response best practices, including triage and chain of custodyProactively identifies areas for improvement, shares lessons more »
anti-virus software, authentication systems, and log management. knowledge of security approaches including ISMS, risk analysis and assessments, the CIA triad, attack vectors (including socialengineering), cryptography, confidentiality issues, and best practices for cyber security incident response (including triage and chain of custody). to proactively identify areas more »
humble expert with a sense of urgency to make things happen and bring others along with you.You are empathetic to the challenges of software engineering and work with engineering leaders to build security in by design and are accountable to ensure your team is an authoritative source of … posture and product incident response.Own key metrics around product security incidents, and risk trends in the codebase.Supervise the application security efforts across the software engineering teams, providing technical guidance, and manage the application security budget and drive a security-first approach to software development and delivery.Promote active, continuous learning … effectively solving problems that cross product boundaries.Establish strong partnerships and champion quality throughout a cross-functional organization to support the best possible security and engineering outcomes.Support developer productivity, through training, driving solutions and tooling.Your experience and Skills:Bachelor’s degree in Computer Science or related technical field; or relevant more »
cloud services, APIs, wireless, and mobile applications. You will engage in leading end-to-end client projects, employing your expertise in red teaming and socialengineering to identify and mitigate potential threats. Your daily activities will involve the adept use of leading penetration testing tools such as Kali more »
Awareness and Training: Educate end-users about cybersecurity best practices, such as safe web browsing habits, avoiding suspicious links or email attachments, and recognizing socialengineering techniques. Provide training and guidance on how to use endpoint security tools effectively, report security incidents, and respond to security alerts in more »
communication, presentation and writing skills. Expertise in both offensive and defensive security concepts. Bachelor’s degree or higher with a concentration in computer science, engineering, maths, IT, or equivalent skills and experience. Demonstrable knowledge in the following areas: Windows and/or *nix administration within client and server architecture. … application layer protocols, HTTP/S, DNS, SSH, etc. Active Directory, Microsoft Entra and related authentication/authorization technologies. Modern attack strategies that use socialengineering and technological abuse primitives. Utilizing and customizing a variety of C2 frameworks and offensive toolkits used to deliver Red Team Operations as more »
and output risk assessments and vulnerability assessments to identify potential weaknesses in the organisation's systems, processes, infrastructure, supply chain and employee susceptibility to socialengineering techniques. Collaborate with internal teams to develop and implement appropriate controls and measures to mitigate identified risks and vulnerabilities. Conduct thorough and more »
on red teaming methodologies and techniques. Strong understanding of offensive security tools and techniques Proven experience in conducting red team engagements, including penetration testing, socialengineering, and scenario-based simulations. What our client is offering: Explore the captivating world of Cyber Attack Simulation Exercises, Cyber Preparedness & Red Teaming more »
out! https://www.nccgroup.com/uk/The Opportunity The successful candidate will be involved in each aspect of the attack chain from socialengineering and initial access, evading best-in-class EDR products, through lateral movement and achieving objectives set by the client. Operational Security and more »
prospects. Guide your team to do the same through regular coaching, brainstorming and maintaining of best practice documentationCollaborating with wider teams. These include Product, Engineering, Sales and Marketing to help shape and improve our products and external messagingDemonstrating a professional and customer-centric persona when interacting directly with customers … correct mannerShow a keen eye for detail and good critical thinking skillsShow a deep curiosity that drives your investigations into fraud. Account takeover, scams, socialengineering, Card Not Present (CNP) fraud, money laundering, money mules, synthetic identity etcExperience with fraud system managements such as ThreatMetrix, Featurespace, Hunter, Iovation more »
the following: · Conduct comprehensive investigations into potential intellectual property (IP) infringement using open-source intelligence (OSINT) techniques and methodologies. · Utilize various online resources, including social media platforms, websites, forums, and dark web monitoring tools to gather relevant information. · Leverage effective search strategies to uncover hidden infrastructure and key individuals … have the following qualifications and experience: · Minimum of 2 years of experience conducting high-stakes OSINT investigations. · Demonstrated expertise in advanced OSINT techniques, including socialengineering, infiltration, data mining, automation, and dark web analysis. · Excellent written and verbal communication skills, with the ability to tailor reports and presentations more »