Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
What You’ll Bring 2–5 years’ experience in ethical hacking or penetration testing. Strong understanding of OWASP, web, and infrastructure testing. Experience with Burp Suite, Nmap, Nessus, Qualys, Metasploit, Kali Linux. Familiarity with cloud security (AWS, Azure, or GCP). Confident communicator with client-facing experience. Bonus points for: Public sector testing experience. Code review skills (Python, Java More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
Experience 3-5+ years' professional penetration testing/offensive security experience Strong understanding of enterprise infrastructure, AD security, networking, and protocols Proficiency with tools such as Nmap, Nessus, Metasploit, BloodHound, Burp Suite, Kali/Linux toolsets Solid track record of delivering infrastructure pentests end-to-end Excellent communication skills, including producing business-focused reporting Preferred Qualifications CHECK Team More ❯
tool development What You'll Bring 2+ years' experience in penetration testing or vulnerability assessment CHECK, Crest, or equivalent certification Strong technical understanding of networks, OS, and security tools (Metasploit, Burp Suite, Nmap, etc.) Excellent communication and problem-solving skills Nice to Have Coding/Scripting (Python, Bash, C#) Web/mobile app testing, reverse engineering, or malware analysis More ❯
tool development What You’ll Bring 2+ years’ experience in penetration testing or vulnerability assessment CHECK, CREST, or equivalent certification Strong technical understanding of networks, OS, and security tools (Metasploit, Burp Suite, Nmap, etc.) Excellent communication and problem-solving skills Nice to Have Coding/scripting (Python, Bash, C#) Web/mobile app testing, reverse engineering, or malware analysis More ❯
london (city of london), south east england, united kingdom
WillHire
of networking basics, OSI model, TCP/IP, firewalls, VPNs, IDS/IPS Familiarity with Linux & Windows system administration commands Knowledge of penetration testing tools (Nmap, Wireshark, Burp Suite, Metasploit, etc.) Fundamentals of cryptography, authentication protocols & OWASP Top 10 Critical thinking, attention to detail, and a proactive learning mindset Nice to Have (Bonus) Certifications such as CEH, CompTIA Security+ More ❯
and deliverables Extensive experience with common automated VAPT tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave Expert in common attack tools and frameworks such as Wireshark, Kali, Metasploit, etc. Expert in mobile platform security technology, including vulnerability identification and exploitation tools, as well as mobile platform security best practices, frameworks, etc. Understand VAPT in the context of More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
penetration testing Strong knowledge of attacker frameworks (e.g., MITRE ATT&CK, NIST adversary simulation guidelines) Highly proficient with red team tools and techniques (e.g., Cobalt Strike, Mimikatz, Sliver, BloodHound, Metasploit etc.) Hands-on experience with Active Directory attacks , privilege escalation , lateral movement , and stealth operations Ability to conduct social engineering and phishing campaigns Strong understanding of networking, Windows/ More ❯
/programmers, memory dumping toolkits). Exposure to USB, Bluetooth/BLE, Wi-Fi, or Cellular interfaces (development or testing). Knowledge of network penetration tools such as Nmap, Metasploit, and Burp Suite. Good understanding of TCP/IP protocols and the OSI model. Experience with firmware reverse engineering using tools like IDA Pro or Ghidra. Background in developing More ❯
/programmers, memory dumping toolkits). Exposure to USB, Bluetooth/BLE, Wi-Fi, or Cellular interfaces (development or testing). Knowledge of network penetration tools such as Nmap, Metasploit, and Burp Suite. Good understanding of TCP/IP protocols and the OSI model. Experience with firmware reverse engineering using tools like IDA Pro or Ghidra. Background in developing More ❯
/programmers, memory dumping toolkits). Exposure to USB, Bluetooth/BLE, Wi-Fi, or Cellular interfaces (development or testing). Knowledge of network penetration tools such as Nmap, Metasploit, and Burp Suite. Good understanding of TCP/IP protocols and the OSI model. Experience with firmware reverse engineering using tools like IDA Pro or Ghidra. Background in developing More ❯
Familiarity with customer satisfaction and retention initiatives. Knowledge of Lean and Agile tools (e.g., Microsoft Planner, JIRA, Confluence). Involvement in offensive cybersecurity (red teaming, use of tools like Metasploit, Nmap, etc.). Experience with physical security assessments aligned with NIS and NPSA standards. Expertise in Digital Forensics and Incident Response (DFIR) in industrial environments (e.g., VxWorks, RTOS, Embedded More ❯