the above-mentioned areas of responsibility Advanced knowledge and experience in application, network, and cloud security testing Proven knowledge and experience with penetration testing tools (e.g., Burp Suite, Metasploit, Nmap, Kali Linux, Wireshark, etc.) and scripting experience for automation (Python, PowerShell, Bash, etc.) Strong knowledge and experience with the OWASP Top 10, the MITRE ATT&CK framework, and common attack More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
Required Skills & Experience 3-5+ years' professional penetration testing/offensive security experience Strong understanding of enterprise infrastructure, AD security, networking, and protocols Proficiency with tools such as Nmap, Nessus, Metasploit, BloodHound, Burp Suite, Kali/Linux toolsets Solid track record of delivering infrastructure pentests end-to-end Excellent communication skills, including producing business-focused reporting Preferred Qualifications CHECK More ❯
of the following certifications: GPEN, GWAPT, GISF, GXPN, OSCP, OSCE, OSWP, OSEE, CISSP, or CEH - Experience with at least 3 of the following tools: •Kali Linux •Metasploit •Burp Suite •Nmap •Cobalt Strike •Tenable Nessus •WebInspect •Scuba •AppDetective Education Bachelor's or Master's degree in a related discipline Pay & Benefits Summary •Pay rate up to 115/h W2 Cybersecurity More ❯
of the following certifications: GPEN, GWAPT, GISF, GXPN, OSCP, OSCE, OSWP, OSEE, CISSP, or CEH - Experience with at least 3 of the following tools: •Kali Linux •Metasploit •Burp Suite •Nmap •Cobalt Strike •Tenable Nessus •WebInspect •Scuba •AppDetective Education Bachelor's or Master's degree in a related discipline Pay & Benefits Summary •Pay rate up to 74/h W2 Cybersecurity More ❯
of the following certifications: GPEN, GWAPT, GISF, GXPN, OSCP, OSCE, OSWP, OSEE, CISSP, or CEH - Experience with at least 3 of the following tools: •Kali Linux •Metasploit •Burp Suite •Nmap •Cobalt Strike •Tenable Nessus •WebInspect •Scuba •AppDetective Education Bachelor's or Master's degree in a related discipline Pay & Benefits Summary •Pay rate up to 93/h W2 Cybersecurity More ❯
with customer satisfaction and retention initiatives. Knowledge of Lean and Agile tools (e.g., Microsoft Planner, JIRA, Confluence). Involvement in offensive cybersecurity (red teaming, use of tools like Metasploit, Nmap, etc.). Experience with physical security assessments aligned with NIS and NPSA standards. Expertise in Digital Forensics and Incident Response (DFIR) in industrial environments (e.g., VxWorks, RTOS, Embedded Linux, WinCC More ❯
ESP32), and RTOS. Understanding of debugging interfaces (UART, JTAG, SPI, I2C). Basic knowledge of wireless protocols: Zigbee, Bluetooth, Wi-Fi, Cellular, LoRa WAN. Exposure to tools like Wireshark, Nmap, Burp Suite, Nessus. Strong written and verbal communication skills. Degree in Cybersecurity, Computer Engineering, Electronics, Telecommunications, or related field. Desirable: Familiarity with standards such as ETSI EN , ETSI TS , IEC More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitmen
Key Skills Hands-on experience in penetration testing or IT Health Check delivery Eligibility to obtain and maintain UK security clearances. Familiarity with common tools such as Burp Suite, Nmap, Nessus, Metasploit, etc. Understanding of network protocols (TCP/IP, OSI model) and common web application Current penetration testing qualification such as Crest Practitioner Security Analyst (CPSA), Crest Registered Tester More ❯
STM32, ESP32), RTOS, and wireless protocols (Zigbee, Bluetooth, Wi-Fi, Cellular, LoRa WAN). Skilled in interfaces like UART, JTAG, SPI, I2C for debugging. Proficiency with tools such as Nmap, Burp Suite, Wireshark, Nessus. Strong programming foundation (Python, C/C++, Java, etc.). Bachelor's degree in Cybersecurity, Computer/Electrical/Electronic Engineering, Telecommunications or IT. Preferred: Previous More ❯
a plus • Experience in System Level Integration, Verification, and Validation (IV&V) for ground based, ship, submarine, or airborne platforms • Familiarity with DoD focused security assessment tools, e.g. SCC, NMAP, Evaluate-STIG, Nessus, ACAS, Vulnerator, eMASSster, etc. • Familiarity with penetration test tooling, e.g. Kali Linux What We Offer • Medical, dental, and vision insurance • Three weeks of vacation for newly hired More ❯
the following certifications: Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … time professional experience conducting penetration testing and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Performing exploit development Identifying gaps in tools and development More ❯
met affiniteit of ervaring in technische security testing. De volgende domeinen ken je goed: 3LoD-model en relevante normenkaders zoals ISO 27001, NIS2 en GDPR, tooling zoals Burp Suite, Nmap en Metasploit. Certificeringen zoals OSCP, CPTS of CISSP zijn een pluspunt. Je kan ervaring aantonen met het uitvoeren van penetratietesten (web applications, mobiele apps, infrastructuur), met technische rapportering en het … Interprétariat, Uitvoering, Burp suite, Néerlandais, Inspection, Frans, Politique, Infrastructure, Metasploit, Ressources humaines, Penetratietest, Gestion des risques, ISO Standards, Rédaction, Burp suite, Rapport, Business, Informatique, Infrastructuur, Overtuigingskracht, Consulting, Risicobeheer, Management, Nmap, Metasploit, Surveillance, Service de sécurité, Application web, Audits, Nmap, Application mobile, Esprit critique, Stressbestendigheid, Cyber Security, Consulting, Audit, Webapplicatie, Engelse taal, Rapport, Beveiligingsdienst, Analyse, Suivi des problèmes, Mobile app, Service More ❯
met affiniteit of ervaring in technische security testing. De volgende domeinen ken je goed: 3LoD-model en relevante normenkaders zoals ISO 27001, NIS2 en GDPR, tooling zoals Burp Suite, Nmap en Metasploit. Certificeringen zoals OSCP, CPTS of CISSP zijn een pluspunt. Je kan ervaring aantonen met het uitvoeren van penetratietesten (web applications, mobiele apps, infrastructuur), met technische rapportering en het … Interprétariat, Uitvoering, Burp suite, Néerlandais, Inspection, Frans, Politique, Infrastructure, Metasploit, Ressources humaines, Penetratietest, Gestion des risques, ISO Standards, Rédaction, Burp suite, Rapport, Business, Informatique, Infrastructuur, Overtuigingskracht, Consulting, Risicobeheer, Management, Nmap, Metasploit, Surveillance, Service de sécurité, Application web, Audits, Nmap, Application mobile, Esprit critique, Stressbestendigheid, Cyber Security, Consulting, Audit, Webapplicatie, Engelse taal, Rapport, Beveiligingsdienst, Analyse, Suivi des problèmes, Mobile app, Service More ❯
environments, perform testing, and generate technical reports for Common Criteria and FIPS evaluations. Perform vulnerability analysis on product/system designs against applicable security criteria using tools like Nessus, NMAP, and Wireshark. Develop mitigation strategies for vulnerabilities identified during security testing. Act as the primary project point of contact (POC) for internal and external stakeholders. Required Skillset: 5+ years of … validation. Expertise in cryptographic encryption algorithms, key exchange protocols, PKI, random number generators, and hashing/message authentication algorithms. Proficiency in vulnerability analysis tools such as Nessus, NMAP, and Wireshark. Proficiency in FIPS 186-4/5, SP 800-186, SP 800-90B, and FIPS 140-3 requirements. Knowledge of security protocols (e.g., SSH, IPsec, TLS). Strong technical More ❯