managed services, and compliance teams Skills You’ll Need: 2-5+ years in penetration testing (network, web, cloud, etc.) Mastery of tools like Burp Suite, Metasploit, Cobalt Strike, Nmap Deep knowledge of OWASP Top 10, MITRE ATT&CK, and exploitation techniques Strong communication skills (you’ll explain risks to both tech & non-tech stakeholders) Certifications like OSCP, eCPPT, CREST More ❯
/internal). Experience in scoping penetration testing assessments. Strong knowledge of security testing methodologies and frameworks (eg, OWASP, NIST). Proficiency with industry-standard tools (eg, Burp Suite, Nmap, Metasploit, Kali Linux). Excellent written and verbal communication skills. O ne of the following qualifications is essential: OSCP, Crest CRT, ECPPT, GPEN, CRTO or equivalent. Experience with red teaming More ❯
exfiltration techniques. • Proactive interest in emerging technologies and techniques related to penetration testing. • Proven ability to perform computer network vulnerability assessment and penetration testing. • Proficient in tools such as Nmap, Wireshark, Metasploit, Canvas, Kismet, Burp Suite, Kali Linuxetc. • Understanding of operating systems (MaxOS, Windows, Linux) and how clients/servers are built and secured. • Ability to research, prioritize, problem solve More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Eames Consulting
Bring - Skills & Experience 2 to 5+ years of hands-on penetration testing experience across network, web, wireless, and cloud environments. Expert with core tools: Burp Suite, Metasploit, Cobalt Strike, Nmap , and custom scripting. Deep understanding of vulnerabilities (OWASP Top 10, MITRE ATT&CK) and exploitation methods. Experience delivering reports aligned to PTES, OWASP, NIST, or OSSTMM standards. Exceptional communicator who More ❯
threat mitigation, and root cause analysis. Conduct internal security reviews, network scans, and targeted penetration tests of applications and infrastructure using common security tooling (e.g., Burp Suite, ZAP, Amass, Nmap). Assess and mitigate static (SAST) and dynamic (DAST) vulnerabilities across services and components. Evaluate, implement, and maintain security tooling to support vulnerability management, secure development, and event detection workflows. More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
GoDefend Limited
Minimum 3 years of hands-on penetration testing experience. Skilled in testing: Web apps, Mobile apps, Cloud (AWS, Azure, GCP), and On-prem infrastructure. Familiar with Burp Suite, Metasploit, Nmap, Wireshark, and other industry tools. Scripting ability in Python, Bash or similar. Comfortable with Linux, networking principles, and cloud environments. Soft Skills & Consulting Ability: Excellent verbal and written communication skills. More ❯
based technologies (AWS Platform, Azure Platform, Google Cloud) • Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerability assessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetration testing, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must meet ALL of the below criteria. The candidate must: • Have More ❯
Stratford-upon-avon, Warwickshire, United Kingdom Hybrid / WFH Options
Ccl Solutions Group
hands-on penetration testing experience in enterprise environments. Deep understanding of infrastructure testing, Active Directory security, and cloud technologies (AWS, Azure, Kubernetes). Strong familiarity with tools such as Nmap, Burp Suite, Metasploit, Impacket, and SMBClient. Able to articulate technical findings to both technical and non-technical audiences in written and verbal formats. How to be successful in this role More ❯
SR2 | Socially Responsible Recruitment | Certified B CorporationTM
across web apps, APIs, infrastructure, and cloud environments (AWS, Azure, GCP) Strong understanding of OWASP Top 10, CVSS, and secure coding principles Experience with tools such as Burp Suite, Nmap, Metasploit, Kali, and custom scripts Familiarity with MITRE ATT&CK, red teaming methodologies, and reporting best practices Highly Desirable: CHECK, CREST, OSCP, or CRTO certifications Experience working in or alongside More ❯
Go and Node.js application security. Experience with TEE technologies or confidential computing. Knowledge of OWASP Top 10, CVEs, and secure coding practices. Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, etc. Certifications such as OSCP, CEH, or GIAC are a plus. Nice to Have: Experience with Kubernetes and container security. Familiarity with CI/CD security integration. Familiarity with More ❯
Provide clear and actionable reports to both technical and non-technical audiences. Requirements Proven experience in penetration testing and ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP, OSCE, CEH, or More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
and articles. Skills/Must have: Strong knowledge of OWASP methodologies and offensive testing across black/grey/white-box approaches. Proficiency in tools like Burp Suite, Kali, Nmap, Nessus, Qualys, Metasploit. Familiarity with cloud platform security testing (AWS, Azure, GCP). Understanding of mobile security (Android & iOS), networking protocols, and the OSI model. Excellent verbal and written communication More ❯
level certifications (e.g. CREST Certified Tester or Cyber Scheme Team Leader). Strong client-facing experience. Able to obtain UK security clearance. Skills & Knowledge: Skilled in tools like Nessus, Nmap, BurpSuite, Metasploit. Proficient in at least one scripting language (Bash, PowerShell, Python, etc.). Strong understanding of TCP/IP, OSI model, and network device reviews. Solid experience testing web More ❯
experience. Strong understanding of OWASP, SSL/TLS, SSH, and HTTP. Comfortable conducting black box, grey box, and white box testing. Familiar with tools like Kali, Burp Suite, Metasploit, Nmap, Nessus, and Qualys. Knowledge of AWS, Azure, or Google Cloud platform security. At least 2 certifications from: CREST CRT, OSCP, OSCE, or CCT. Desirable Extras: Experience with CI/CD More ❯
City of London, London, Grange, United Kingdom Hybrid / WFH Options
Applause IT Recruitment Ltd
experience. Strong understanding of OWASP, SSL/TLS, SSH, and HTTP. Comfortable conducting black box, grey box, and white box testing. Familiar with tools like Kali, Burp Suite, Metasploit, Nmap, Nessus, and Qualys. Knowledge of AWS, Azure, or Google Cloud platform security. At least 2 certifications from: CREST CRT, OSCP, OSCE, or CCT. Desirable Extras: Experience with CI/CD More ❯
security defences. Technologies and Soft Skills required: Advanced technical knowledge of penetration testing techniques, security assessments, and vulnerability exploitation. Expertise in security testing tools (such as Burp Suite, Metasploit, Nmap, OWASP ZAP, etc.), as well as manual testing methods. Strong understanding of common application security vulnerabilities (such as SQL injection, XSS, CSRF, insecure deserialization, etc.) and OWASP Top 10. Proficiency More ❯
Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong expertise with web application and network pen testing methodologies. Proficiency in using penetration testing tools such as BurpSuite Pro, Nmap, Nessus, and Metasploit. Experienced in using Kali Linux and the associated penetration testing tool suite. Advanced completion of penetration testing simulations like Hack the Box or Capture the Flag or More ❯
Central London, London, England, United Kingdom Hybrid / WFH Options
Bupa UK
MITRE ATT&CK, CVE/CVSS, and NIST SP 800-53. Experience of vulnerability scanning tools, penetration testing tools, and security testing frameworks (e.g., Nessus, Metasploit, Burp Suite, Nmap, Claire, and OpenSCAP). Extensive experience with Red Teaming, Purple Teaming and Attack Automation. Familiarity with industry regulations and compliance standards related to cybersecurity, such as NIST CSF, SOC2, PCI More ❯
solutions using Linux and traditional appliance network devices. DESIRED SKILLS: • Scripting including Python, Bash and Perl and frameworks like Ansible. • Understanding of Linux network security tools (e.g., Metasploit, Netcat, Nmap, iptables, BurpSuite, IDS, SELinux, etc.). • Experience monitoring threats via a SIEM console such as Solarwinds, Cisco Network Analysis Module (LogRhythm/Splunk preferred). • Experience performing analysis of log More ❯
testing CREST Practitioner, CRT, or Cyber Scheme Team Member certified Ability to maintain UK security clearances as required by the business Hands-on experience with tools like BurpSuite, Metasploit, Nmap, Nessus Strong understanding of TCP/IP, OSI model, and security testing methodologies Skilled in at least one scripting language (Python, Bash, PowerShell, etc.) Confident communicator, able to explain technical More ❯
a similar role within cybersecurity ️ Strong knowledge of common vulnerabilities (OWASP Top 10, CVEs) and attack techniques ️ Familiarity with penetration testing tools such as Burp Suite, Metasploit, Nessus, and Nmap ️ Certifications such as OSCP, CEH, or equivalent are highly desirable ️ Strong communication skills to present findings to both technical and non-technical stakeholders More ❯
work collaboratively with Blue Team and Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … Experience: • Seven (7) years of full-time professional experience conducting penetration testing or offensive Cyber operations in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. o Mimicking threat behavior. o Utilizing various operating systems (examples include Linux, Windows, MAC OS, etc.); o Utilizing Active Directory. o Performing exploit development. o Identifying … Seven (7) years of full-time professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. Mimicking threat behavior. Utilizing various operating systems (Linux, Windows, MAC OS); Utilizing Active Directory. Performing exploit development. More ❯
work collaboratively with Blue Team and Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … years of full-time professional experience conducting penetration testing or offensive Cyber operations including demonstrated experience in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. o Mimicking threat behavior. o Utilizing various operating systems (examples include Linux, Windows, MAC OS, etc.); o Utilizing Active Directory. NR3006 Attachment J.6 o Exploit development. … Seven (7) years of full-time professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. Mimicking threat behavior. Utilizing various operating systems (Linux, Windows, MAC OS); Utilizing Active Directory. Performing exploit development. More ❯