managed services, and compliance teams Skills You’ll Need: 2-5+ years in penetration testing (network, web, cloud, etc.) Mastery of tools like Burp Suite, Metasploit, Cobalt Strike, Nmap Deep knowledge of OWASP Top 10, MITRE ATT&CK, and exploitation techniques Strong communication skills (you’ll explain risks to both tech & non-tech stakeholders) Certifications like OSCP, eCPPT, CREST More ❯
/internal). Experience in scoping penetration testing assessments. Strong knowledge of security testing methodologies and frameworks (eg, OWASP, NIST). Proficiency with industry-standard tools (eg, Burp Suite, Nmap, Metasploit, Kali Linux). Excellent written and verbal communication skills. O ne of the following qualifications is essential: OSCP, Crest CRT, ECPPT, GPEN, CRTO or equivalent. Experience with red teaming More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Eames Consulting
Bring - Skills & Experience 2 to 5+ years of hands-on penetration testing experience across network, web, wireless, and cloud environments. Expert with core tools: Burp Suite, Metasploit, Cobalt Strike, Nmap , and custom scripting. Deep understanding of vulnerabilities (OWASP Top 10, MITRE ATT&CK) and exploitation methods. Experience delivering reports aligned to PTES, OWASP, NIST, or OSSTMM standards. Exceptional communicator who More ❯
exfiltration techniques. • Proactive interest in emerging technologies and techniques related to penetration testing. • Proven ability to perform computer network vulnerability assessment and penetration testing. • Proficient in tools such as Nmap, Wireshark, Metasploit, Canvas, Kismet, Burp Suite, Kali Linuxetc. • Understanding of operating systems (MaxOS, Windows, Linux) and how clients/servers are built and secured. • Ability to research, prioritize, problem solve More ❯
based technologies (AWS Platform, Azure Platform, Google Cloud) • Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerability assessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetration testing, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must meet ALL of the below criteria. The candidate must: • Have More ❯
threat mitigation, and root cause analysis. Conduct internal security reviews, network scans, and targeted penetration tests of applications and infrastructure using common security tooling (e.g., Burp Suite, ZAP, Amass, Nmap). Assess and mitigate static (SAST) and dynamic (DAST) vulnerabilities across services and components. Evaluate, implement, and maintain security tooling to support vulnerability management, secure development, and event detection workflows. More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
identification methods. Keen to participate in purple teaming activities, helping to develop scenarios and engage in both blue and red team activities. Some experience with tooling such as Metasploit, Nmap, Cobalt Strike, Hydra, John the Ripper, Burp Suite, Mimikatz, Bloodhound, and others. Threat Hunting Ability to learn fast new advanced persistent threat (APT) tactics, techniques, and procedures (TTPs) mapped to More ❯
Stratford-upon-avon, Warwickshire, United Kingdom Hybrid / WFH Options
Ccl Solutions Group
hands-on penetration testing experience in enterprise environments. Deep understanding of infrastructure testing, Active Directory security, and cloud technologies (AWS, Azure, Kubernetes). Strong familiarity with tools such as Nmap, Burp Suite, Metasploit, Impacket, and SMBClient. Able to articulate technical findings to both technical and non-technical audiences in written and verbal formats. How to be successful in this role More ❯
Go and Node.js application security. Experience with TEE technologies or confidential computing. Knowledge of OWASP Top 10, CVEs, and secure coding practices. Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, etc. Certifications such as OSCP, CEH, or GIAC are a plus. Nice to Have: Experience with Kubernetes and container security. Familiarity with CI/CD security integration. Familiarity with More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
GoDefend Limited
Minimum 3 years of hands-on penetration testing experience. Skilled in testing: Web apps, Mobile apps, Cloud (AWS, Azure, GCP), and On-prem infrastructure. Familiar with Burp Suite, Metasploit, Nmap, Wireshark, and other industry tools. Scripting ability in Python, Bash or similar. Comfortable with Linux, networking principles, and cloud environments. Soft Skills & Consulting Ability: Excellent verbal and written communication skills. More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
and articles. Skills/Must have: Strong knowledge of OWASP methodologies and offensive testing across black/grey/white-box approaches. Proficiency in tools like Burp Suite, Kali, Nmap, Nessus, Qualys, Metasploit. Familiarity with cloud platform security testing (AWS, Azure, GCP). Understanding of mobile security (Android & iOS), networking protocols, and the OSI model. Excellent verbal and written communication More ❯
and articles. Skills/Must have: Strong knowledge of OWASP methodologies and offensive testing across black/grey/white-box approaches. Proficiency in tools like Burp Suite, Kali, Nmap, Nessus, Qualys, Metasploit. Familiarity with cloud platform security testing (AWS, Azure, GCP). Understanding of mobile security (Android & iOS), networking protocols, and the OSI model. Excellent verbal and written communication More ❯
any of the following: UNIX, Linux, Windows 7, Windows 10, Windows Server • Understanding of network vulnerability analysis and penetration testing with both open-source and commercial tools such as: Nmap, Wireshark, Metasploit, Kali, Burp, etc. • Computer hardware and software security analysis including use of commercial or specialty application analysis and reverse engineering tools • System level and security administration knowledge of … any of the following: UNIX, Linux, Windows 7, Windows 10, Windows Server • Understanding of network vulnerability analysis and penetration testing with both open-source and commercial tools such as: Nmap, Wireshark, Metasploit, Kali, Burp, etc. • Computer hardware and software security analysis including use of commercial or specialty application analysis and reverse engineering tools such as: IDA Pro, WinDebug, Olly Debug More ❯
any of the following: UNIX, Linux, Windows 7, Windows 10, Windows Server Understanding of network vulnerability analysis and penetration testing with both open-source and commercial tools such as: Nmap, Wireshark, Metasploit, Kali, Burp, etc. Computer hardware and software security analysis including use of commercial or specialty application analysis and reverse engineering tools such as: IDA Pro, WinDebug, Olly Debug More ❯
security defences. Technologies and Soft Skills required: Advanced technical knowledge of penetration testing techniques, security assessments, and vulnerability exploitation. Expertise in security testing tools (such as Burp Suite, Metasploit, Nmap, OWASP ZAP, etc.), as well as manual testing methods. Strong understanding of common application security vulnerabilities (such as SQL injection, XSS, CSRF, insecure deserialization, etc.) and OWASP Top 10. Proficiency More ❯
/Bluetooth) technology (hardware or core software). • Familiarity with mobile phone operating systems (Android/iOS). • Experience working with network security tools such as Metasploit, Netcat, BurpSuite, NMAP, Nessus or similar. • Understanding/use of network IDS/IPS technologies such as firewalls, proxies, ipchains, iptables, Snort, and related technologies. • Experience managing and installing network technologies such as More ❯
MITRE ATT&CK framework. Ability to identify, exploit, and document vulnerabilities in diverse environments, including cloud-based infrastructure. Proficiency with offensive security tools such as: Kali Linux, Burp Suite, Nmap, Metasploit, C2 Frameworks, Wireshark, Impacket, BloodHound, Responder Working knowledge of one or more scripting or automation languages (e.g., Python, PowerShell, Bash). Familiarity with Linux and Windows command line. Strong More ❯
knowledge in computer security, whether it be in penetration testing, penetration testing tool development, or other related effort. Expert working knowledge of and experience with Scanning/Analysis Tools (nmap, nikto, etc) Expert in use of Exploitation Tools (Metasploit, Cobalt Strike, etc) Experience with using scripting languages such as bash, python, etc Exceptional problem solving skills Candidate must be a More ❯
solutions using Linux and traditional appliance network devices. DESIRED SKILLS: • Scripting including Python, Bash and Perl and frameworks like Ansible. • Understanding of Linux network security tools (e.g., Metasploit, Netcat, Nmap, iptables, BurpSuite, IDS, SELinux, etc.). • Experience monitoring threats via a SIEM console such as Solarwinds, Cisco Network Analysis Module (LogRhythm/Splunk preferred). • Experience performing analysis of log More ❯
and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, Kali Linux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in designing More ❯
and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, Kali Linux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in designing More ❯
and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, Kali Linux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in designing More ❯
experience using Splunk to ingest and analyze network data Demonstrated experience in network vulnerability analysis and penetration testing with both open-source and commercial tools, such as Cobalt Strike, Nmap, Wireshark, Metasploit, Canvas, Kismet, BackTrack. Demonstrated experience providing in-depth holistic analysis of a technical threat to critical infrastructure by leveraging various data sources. Demonstrated experience with the current infrastructure More ❯
Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience with web application and network pen testing methodologies. Proficiency in using penetration testing tools such as BurpSuite Pro, Nmap, and Nessus. Familiarity with Kali Linux and the associated penetration testing tool suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag. Excellent communication and technical More ❯
Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience with web application and network pen testing methodologies. Proficiency in using penetration testing tools such as BurpSuite Pro, Nmap, and Nessus. Familiarity with Kali Linux and the associated penetration testing tool suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag. Excellent communication and technical More ❯