and techniques related to penetration testing. • Proven ability to perform computer network vulnerability assessment and penetration testing. • Proficient in tools such as Nmap, Wireshark, Metasploit, Canvas, Kismet, Burp Suite, Kali Linuxetc. • Understanding of operating systems (MaxOS, Windows, Linux) and how clients/servers are built and secured. • Ability to research, prioritize, problem solve, synthesize large amounts of data … conducting risk analysis, risk management, infosec, system testing and client structures. TECHNOLOGIES USED: Operating Systems: • Microsoft Windows (7 - 10, Server ) • UNIX (Solaris, HP-UX, etc.,) Operating System versions • Common Linux distributions including RHEL/CentOS/Rocky and Debian/Ubuntu • OSX/iOS and Android • VMware/ESXi/KVM/OpenVZ or other virtualized environments • Linux … application vulnerabilities like XSS, CSRF, Command Injection, SQLi, single sign-on limitations, etc. Tools: • Proficiency in any of the following: PowerShell Empire, Metasploit Framework, Cobalt Strike, Burp Suite, Canvas, KaliLinux, IPTables, Sysinternals, A/V evasion methodologies, exploit development. Certifications: • Advanced GIAC and/or (ISC)2 network/cyber security specialties such as OSCP, OSCE, GPEN More ❯
actionable reports to both technical and non-technical audiences. Requirements Proven experience in penetration testing and ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP, OSCE, CEH, or similar are More ❯
. Experience in scoping penetration testing assessments. Strong knowledge of security testing methodologies and frameworks (eg, OWASP, NIST). Proficiency with industry-standard tools (eg, Burp Suite, Nmap, Metasploit, KaliLinux). Excellent written and verbal communication skills. O ne of the following qualifications is essential: OSCP, Crest CRT, ECPPT, GPEN, CRTO or equivalent. Experience with red teaming More ❯
penetration testing field. This position will allow you to expand both your offensive and defensive networks security skills by using tools like Shodan, Maltego and various tools in the KaliLinux environment. Applicants for this position should have a solid understanding of network engineering with some exposure to bash and/or Python scripting. REQUIRED SKILLS: • Proficiency working … in a Linux environment (CentOS, Ubuntu, Fedora, Solaris, Kali). • Experience configuring small business or home network (SOHO) devices (e.g., wifi routers, switches, etc.). • Comfortable working in a command-line environment (SSH, bash, telnet, etc.) • Experience monitoring network activity, to include performing network packet inspection, traffic analysis, performance characterization (e.g., Wireshark, tcpdump, etc.). • Understanding of information … network forensics. • Experience in either the design, implementation, procurement, tradecraft or maintenance of various layers within covert network infrastructure. • Proven ability to design and develop integrated network solutions using Linux and traditional appliance network devices. DESIRED SKILLS: • Scripting including Python, Bash and Perl and frameworks like Ansible. • Understanding of Linux network security tools (e.g., Metasploit, Netcat, Nmap, iptables More ❯
infrastructure security. Up-to-date on the latest cybersecurity threats and technologies. Strong knowledge in pen testing tools ( Metasploit, Nmap, Wireshark, Burp Suite, Nessus, OWASP ZAP, Eyewitness, Nessus, sqlmap, kalilinux, etc) Ideally certified – eg OSCP, CRTP, CPPT, CEH, CISSP, OSWP, eJPT, eWPT Good reporting and security debriefing skills A passion for cybersecurity and a safer world. If More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Vector Recruitment Ltd
infrastructure security. Up-to-date on the latest cybersecurity threats and technologies. Strong knowledge in pen testing tools ( Metasploit, Nmap, Wireshark, Burp Suite, Nessus, OWASP ZAP, Eyewitness, Nessus, sqlmap, kalilinux, etc) Ideally certified – eg OSCP, CRTP, CPPT, CEH, CISSP, OSWP, eJPT, eWPT Good reporting and security debriefing skills A passion for cybersecurity and a safer world. If More ❯
matter expertise in web, mobile or network penetration testing with track record of end to end testing of complex systems. Advanced knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong expertise with web application and network pen testing methodologies. Proficiency in using penetration testing tools … such as BurpSuite Pro, Nmap, Nessus, and Metasploit. Experienced in using KaliLinux and the associated penetration testing tool suite. Advanced completion of penetration testing simulations like Hack the Box or Capture the Flag or ideally one of the following certifications: CSTL/CCT, OSCP, OCWE, or relevant equivalent. Excellent communication and technical report writing skills. UK SC More ❯
IAT Level II or IAT Level III certification per DoD 8140 requirements such as CompTIA SecurityX (formerly CASP+) or CompTIA Security+ within 60 days of start date • Experience with Linux command line interface (CLI), including scripting in Bash, Python, PowerShell and automating tasks • Technical knowledge of infrastructure components, including network, storage, Linux/Windows, and IT security concepts … with Cloud-based technologies (AWS Platform, Azure Platform, Google Cloud) • Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerability assessment tools including Nessus, Wireshark, KaliLinux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetration testing, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must meet ALL of the below criteria. … SCI) • Able to obtain IAT Level II certification per DoD 8570.01 such as CASP+ or Security+ within 60 days of start date. • Expertise with infrastructure components, including network, storage, Linux/Windows, and IT security concepts • Strong technical knowledge of Cloud-based technologies (AWS Platform, Azure Platform, Google Cloud) • Expertise with Infrastructure as Code (IaC), containerization (Docker, Kubernetes), and More ❯
a Certified Ethical Hacker (CEH), OSCP, GPEN, or equivalent are preferred but not required. • Proficient in the use of Nessus Security Center, Wireshark, Web Application Scanning, Penetration Testing, BurpeSuite, Kalilinux, and similar tools. Must have recent Software Assurance experience. Metasploit experience is preferred. • Linux and Cisco Routing and Switching experience. • Bachelor's Degree or Master's More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Ocho
What You'll Be Doing: Perform penetration tests on networks, applications, and infrastructure. Identify and exploit vulnerabilities to strengthen security defences. Use tools like Burp Suite, Nessus, Metasploit, and Kali Linux. Provide detailed reports with clear, actionable recommendations. Experience required: Strong knowledge of OWASP, CVE, and security frameworks. Hands-on experience with ethical hacking & exploit techniques. Ability to communicate … findings to technical and non-technical teams. Proficiency in using penetration testing tools such as BurpSuite Pro, Nmap, Nessus, and Metaspolit. Experienced in using KaliLinux and the associated penetration testing tool suite Nice to Have: Relevant security certifications (e.g. OSCP, CREST, Cyber Scheme.) UK SC clearance Package: Bonus Hybrid working (2 days onsite - Belfast office) 25 + More ❯
of executing penetration tests and exploiting vulnerabilities in complex systems and applications. Experience with vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and penetration testing tools (e.g., Metasploit, Burp Suite, KaliLinux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR, PCI-DSS) Relevant certifications (e.g., CEH, OSCP, CISSP, CISM, GIAC) are strongly preferred. More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
papers and articles. Skills/Must have: Strong knowledge of OWASP methodologies and offensive testing across black/grey/white-box approaches. Proficiency in tools like Burp Suite, Kali, Nmap, Nessus, Qualys, Metasploit. Familiarity with cloud platform security testing (AWS, Azure, GCP). Understanding of mobile security (Android & iOS), networking protocols, and the OSI model. Excellent verbal and More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
papers and articles. Skills/Must have: Strong knowledge of OWASP methodologies and offensive testing across black/grey/white-box approaches. Proficiency in tools like Burp Suite, Kali, Nmap, Nessus, Qualys, Metasploit. Familiarity with cloud platform security testing (AWS, Azure, GCP). Understanding of mobile security (Android & iOS), networking protocols, and the OSI model. Excellent verbal and More ❯
collaboratively with Blue Team and Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and … Seven (7) years of full-time professional experience conducting penetration testing or offensive Cyber operations in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. o Mimicking threat behavior. o Utilizing various operating systems (examples include Linux, Windows, MAC OS, etc.); o Utilizing Active Directory. o Performing exploit development. … years of full-time professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. Mimicking threat behavior. Utilizing various operating systems (Linux, Windows, MAC OS); Utilizing Active Directory. Performing exploit development. More ❯
collaboratively with Blue Team and Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and … of full-time professional experience conducting penetration testing or offensive Cyber operations including demonstrated experience in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. o Mimicking threat behavior. o Utilizing various operating systems (examples include Linux, Windows, MAC OS, etc.); o Utilizing Active Directory. NR3006 Attachment J.6 o … years of full-time professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. Mimicking threat behavior. Utilizing various operating systems (Linux, Windows, MAC OS); Utilizing Active Directory. Performing exploit development. More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
JR United Kingdom
What You'll Be Doing: Perform penetration tests on networks, applications, and infrastructure. Identify and exploit vulnerabilities to strengthen security defences. Use tools like Burp Suite, Nessus, Metasploit, and Kali Linux. Provide detailed reports with clear, actionable recommendations. Experience required: Strong knowledge of OWASP, CVE, and security frameworks. Hands-on experience with ethical hacking & exploit techniques. Ability to communicate … findings to technical and non-technical teams. Proficiency in using penetration testing tools such as BurpSuite Pro, Nmap, Nessus, and Metaspolit. Experienced in using KaliLinux and the associated penetration testing tool suite Nice to Have: Relevant security certifications (e.g. OSCP, CREST, Cyber Scheme.) UK SC clearance Package: Bonus Hybrid working (2 days onsite - Belfast office) 25 + More ❯
Newtownabbey, Northern Ireland, United Kingdom Hybrid / WFH Options
JR United Kingdom
What You'll Be Doing: Perform penetration tests on networks, applications, and infrastructure. Identify and exploit vulnerabilities to strengthen security defences. Use tools like Burp Suite, Nessus, Metasploit, and Kali Linux. Provide detailed reports with clear, actionable recommendations. Experience required: Strong knowledge of OWASP, CVE, and security frameworks. Hands-on experience with ethical hacking & exploit techniques. Ability to communicate … findings to technical and non-technical teams. Proficiency in using penetration testing tools such as BurpSuite Pro, Nmap, Nessus, and Metaspolit. Experienced in using KaliLinux and the associated penetration testing tool suite Nice to Have: Relevant security certifications (e.g. OSCP, CREST, Cyber Scheme.) UK SC clearance Package: Bonus Hybrid working (2 days onsite - Belfast office) 25 + More ❯
Lisburn, Northern Ireland, United Kingdom Hybrid / WFH Options
JR United Kingdom
What You'll Be Doing: Perform penetration tests on networks, applications, and infrastructure. Identify and exploit vulnerabilities to strengthen security defences. Use tools like Burp Suite, Nessus, Metasploit, and Kali Linux. Provide detailed reports with clear, actionable recommendations. Experience required: Strong knowledge of OWASP, CVE, and security frameworks. Hands-on experience with ethical hacking & exploit techniques. Ability to communicate … findings to technical and non-technical teams. Proficiency in using penetration testing tools such as BurpSuite Pro, Nmap, Nessus, and Metaspolit. Experienced in using KaliLinux and the associated penetration testing tool suite Nice to Have: Relevant security certifications (e.g. OSCP, CREST, Cyber Scheme.) UK SC clearance Package: Bonus Hybrid working (2 days onsite - Belfast office) 25 + More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
techniques TS/SCI clearance HS diploma or GED and 7+ years of experience in Information Technology, or Bachelor's degree and 3+ years of experience in Information Technology Linux Computing Environment (CE) Certification Windows CE Certification Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN) Certification DoD Approved 8570 Information Assurance Technician (IAT) Level III Certification, including … CASP+ CE, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP Certification Additional Qualifications Experience with Cobalt Strike, Metasploit, and KaliLinux Python Certification Completion of the Red Team Apprentice, Offensive Methodology Analysis, or Red Team Operations Training Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified More ❯
years' penetration testing experience. Strong understanding of OWASP, SSL/TLS, SSH, and HTTP. Comfortable conducting black box, grey box, and white box testing. Familiar with tools like Kali, Burp Suite, Metasploit, Nmap, Nessus, and Qualys. Knowledge of AWS, Azure, or Google Cloud platform security. At least 2 certifications from: CREST CRT, OSCP, OSCE, or CCT. Desirable Extras: Experience More ❯
City of London, London, Grange, United Kingdom Hybrid / WFH Options
Applause IT Recruitment Ltd
years' penetration testing experience. Strong understanding of OWASP, SSL/TLS, SSH, and HTTP. Comfortable conducting black box, grey box, and white box testing. Familiar with tools like Kali, Burp Suite, Metasploit, Nmap, Nessus, and Qualys. Knowledge of AWS, Azure, or Google Cloud platform security. At least 2 certifications from: CREST CRT, OSCP, OSCE, or CCT. Desirable Extras: Experience More ❯
CWE, CVSS scoring etc.) Strong experience communicating to stakeholders of varying technical skill levels Your experience should include: Using offensive security tooling, including tools such as Burp Suite, Kali, Metasploit and such Scripting including the use of python, Powershell, bash or Javascript Securing networks, hosts, web applications and cloud native deployments Working with toolsets such as: vulnerability management, firewalls More ❯
IVM, Tenable IO or Nessus Palo Alto Firewalls, InTune, Entra ID, Active Directory Desirable: Imperva WAF, Menlo Security, Cisco Secure Access/Umbrella, KnowBe4, AppCheck Ivanti or Automox patching KaliLinux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetration More ❯
IVM, Tenable IO or Nessus Palo Alto Firewalls, InTune, Entra ID, Active Directory Desirable: Imperva WAF, Menlo Security, Cisco Secure Access/Umbrella, KnowBe4, AppCheck Ivanti or Automox patching KaliLinux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetration More ❯
IVM, Tenable IO or Nessus Palo Alto Firewalls, InTune, Entra ID, Active Directory Desirable: Imperva WAF, Menlo Security, Cisco Secure Access/Umbrella, KnowBe4, AppCheck Ivanti or Automox patching KaliLinux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetration More ❯