Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
Professional (CISSP) SANS GIAC Penetration Tester (GPEN) or Web Application Penetration Tester (GWAPT) Experience in mobile application (iOS/Android) testing, cloud security (AWS/Azure/GCP), or social engineering. Experience scripting in Python, PowerShell, or Bash to develop custom tools or exploits. What We Offer A competitive salary of £50,000 - £85,000 . Fully remote working More ❯
Bradford, Yorkshire, United Kingdom Hybrid / WFH Options
Anson Mccade
For: Proven experience in Red Teaming or offensive security roles. Deep understanding of Command and Control frameworks. Strong technical proficiency in areas such as Windows/Linux post-exploitation, socialengineering, initial access, EDR bypass, malware and exploit development. Ability to solve complex technical problems and communicate effectively with both technical and non-technical stakeholders. Proficiency in at More ❯
York, Yorkshire, United Kingdom Hybrid / WFH Options
Anson Mccade
For: Proven experience in Red Teaming or offensive security roles. Deep understanding of Command and Control frameworks. Strong technical proficiency in areas such as Windows/Linux post-exploitation, socialengineering, initial access, EDR bypass, malware and exploit development. Ability to solve complex technical problems and communicate effectively with both technical and non-technical stakeholders. Proficiency in at More ❯
Doncaster, Yorkshire, United Kingdom Hybrid / WFH Options
Anson Mccade
For: Proven experience in Red Teaming or offensive security roles. Deep understanding of Command and Control frameworks. Strong technical proficiency in areas such as Windows/Linux post-exploitation, socialengineering, initial access, EDR bypass, malware and exploit development. Ability to solve complex technical problems and communicate effectively with both technical and non-technical stakeholders. Proficiency in at More ❯
Wakefield, Yorkshire, United Kingdom Hybrid / WFH Options
Anson Mccade
For: Proven experience in Red Teaming or offensive security roles. Deep understanding of Command and Control frameworks. Strong technical proficiency in areas such as Windows/Linux post-exploitation, socialengineering, initial access, EDR bypass, malware and exploit development. Ability to solve complex technical problems and communicate effectively with both technical and non-technical stakeholders. Proficiency in at More ❯