Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Eames Consulting
Bring - Skills & Experience 2 to 5+ years of hands-on penetration testing experience across network, web, wireless, and cloud environments. Expert with core tools: Burp Suite, Metasploit, Cobalt Strike, Nmap , and custom scripting. Deep understanding of vulnerabilities (OWASP Top 10, MITRE ATT&CK) and exploitation methods. Experience delivering reports aligned to PTES, OWASP, NIST, or OSSTMM standards. Exceptional communicator who More ❯
Stratford-upon-avon, Warwickshire, United Kingdom Hybrid / WFH Options
Ccl Solutions Group
hands-on penetration testing experience in enterprise environments. Deep understanding of infrastructure testing, Active Directory security, and cloud technologies (AWS, Azure, Kubernetes). Strong familiarity with tools such as Nmap, Burp Suite, Metasploit, Impacket, and SMBClient. Able to articulate technical findings to both technical and non-technical audiences in written and verbal formats. How to be successful in this role More ❯
but not required). Solid understanding of common attack techniques and vulnerability classes (e.g., OWASP Top 10, MITRE ATT&CK). Strong familiarity with tools such as Burp Suite, Nmap, Metasploit, etc. Excellent communication and reporting skills. Required Qualifications: Demonstrable experience in penetration testing (minimum 2 years preferred). Hold at least one of the following certifications: OSCP (Offensive Security More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
and articles. Skills/Must have: Strong knowledge of OWASP methodologies and offensive testing across black/grey/white-box approaches. Proficiency in tools like Burp Suite, Kali, Nmap, Nessus, Qualys, Metasploit. Familiarity with cloud platform security testing (AWS, Azure, GCP). Understanding of mobile security (Android & iOS), networking protocols, and the OSI model. Excellent verbal and written communication More ❯
and articles. Skills/Must have: Strong knowledge of OWASP methodologies and offensive testing across black/grey/white-box approaches. Proficiency in tools like Burp Suite, Kali, Nmap, Nessus, Qualys, Metasploit. Familiarity with cloud platform security testing (AWS, Azure, GCP). Understanding of mobile security (Android & iOS), networking protocols, and the OSI model. Excellent verbal and written communication More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
GoDefend Limited
Minimum 3 years of hands-on penetration testing experience. Skilled in testing: Web apps, Mobile apps, Cloud (AWS, Azure, GCP), and On-prem infrastructure. Familiar with Burp Suite, Metasploit, Nmap, Wireshark, and other industry tools. Scripting ability in Python, Bash or similar. Comfortable with Linux, networking principles, and cloud environments. Soft Skills & Consulting Ability: Excellent verbal and written communication skills. More ❯
threat mitigation, and root cause analysis. Conduct internal security reviews, network scans, and targeted penetration tests of applications and infrastructure using common security tooling (e.g., Burp Suite, ZAP, Amass, Nmap). Assess and mitigate static (SAST) and dynamic (DAST) vulnerabilities across services and components. Evaluate, implement, and maintain security tooling to support vulnerability management, secure development, and event detection workflows. More ❯
Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience with web application and network pen testing methodologies. Proficiency in using penetration testing tools such as BurpSuite Pro, Nmap, and Nessus. Familiarity with Kali Linux and the associated penetration testing tool suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag. Excellent communication and technical More ❯
Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience with web application and network pen testing methodologies. Proficiency in using penetration testing tools such as BurpSuite Pro, Nmap, and Nessus. Familiarity with Kali Linux and the associated penetration testing tool suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag. Excellent communication and technical More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Task Force Talent LLC
clearance. Cloud environments (AWS/Azure/Google Cloud Platform) Developing security test plans Linux/Windows as well as virtual and wireless platforms Infosec policies Tools such as nmap, Wireshark, Metasploit, IDA Pro, Encase, etc. Network security technologies (firewalls, proxies, iptables, VPN, IDS/IPS, etc.) Further details will be provided to qualified candidates after an initial interview. All More ❯
environments (e.g., SIEM, intrusion detection/prevention systems, endpoint monitoring) Scripting experience using languages like Python, PowerShell, or Bash Familiarity with open-source diagnostic and assessment tools such as Nmap, Wireshark, and Kali Linux Solid understanding of established security frameworks and models (e.g., MITRE ATT&CK, NIST, and related methodologies) Comfortable using general productivity and communication software for remote collaboration More ❯
Washington, Washington DC, United States Hybrid / WFH Options
ShorePoint, Inc
Who we are: ShorePoint is a fast-growing, industry recognized, and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Wood Consulting Services, Inc
Security Engineering Professional (ISSEP) and CISSP Certifications are required. Demonstrated expertise in: Risk Management Framework (RMF) Security policy formulation and assessment Vulnerability testing and mitigation Security tools (e.g., Nessus, NMAP, Wireshark) Secure OS configurations and system hardening Strong communication skills and ability to work in fast-paced, collaborative environments. Experience with system security engineering across the full system lifecycle. About More ❯