conducting penetration tests, vulnerability assessments, and network scans. Excellent communication and collaboration skills; able to guide developers, write clear documentation, and engage stakeholders. Nice to have: Certifications such as OSCP, GCIH, GWAPT, or CISSP. Familiarity with security frameworks such as NIST CSF, MITRE ATT&CK, OWASP ASVS, or ISO 27001. Experience with commercial security tools such as EDR, SIEM, CSPM More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
GoDefend Limited
and client-focused mindset. Qualifications: A-Level or equivalent (required) HND or Degree in Computer Science, Ethical Hacking, or Digital Forensics (preferred) One or more of the following certifications: OSCP , OSWA , GPEN , GWAPT , CEH , CRT , CCT-WEB , CCT-INF, CSSL, CCSM Work Authorisation: We are not able to support work visas. Benefits: Casual dress Cycle to work scheme Free parking More ❯
Experience in writing technical proposals along with other teams to deliver robust statement of works for client sign off. CERTIFICATIONS: CCNP/CCNA is nice to have. CREST/OSCP is nice to have. Microsoft and/or other cloud providers. SKILLS: Working knowledge of cloud security architecture, specifically within Azure (or other Cloud platforms). Familiarity with security frameworks More ❯
with compliance standards: ISO 27001, NIST, CIS, GDPR, HIPAA. Bonus: scripting/automation skills (Python, PowerShell, Bash). Deep understanding of Microsoft security technologies. Certifications such as CISSP, CEH, OSCP, CISM, or Security+ are highly desirable. Strong problem-solving, communication, and collaboration abilities. Ready to Make an Impact? Join us and be part of a security-first team committed to More ❯
you do and understanding how your work impacts and contributes ESO's success Who You Are - it's desirable if you have any of the following Certifications such as OSCP or OSCP+, OSCE GPEN, OSWA, OSSTIMM or equivalents Exposure to Infrastructure as Code and Azure native technologies Experience with threat modelling, NIST and CIS frameworks Experience working with and securing More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP, CISM, OSCP, GIAC (preferred but not mandatory). Must be eligible for SC security clearance. Experience working in defense, government, or high-security environments is a plus. Knowledge of cloud security architectures More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP, CISM, OSCP, GIAC (preferred but not mandatory). Must be eligible for SC security clearance. Experience working in defense, government, or high-security environments is a plus. Knowledge of cloud security architectures More ❯
for technical documentation and client interaction UK resident with eligibility for SC clearance (or already SC cleared) Desirable: Experience working in public sector or regulated environments Certifications such as OSCP, CRT, CEH, or CompTIA Pentest+ Exposure to cloud environments (AWS, Azure) from a security perspective Scripting or automation (Python, PowerShell, Bash) Location: South UK (M4 Corridor - Travel to clients/ More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
OSAAVA Services
degree in Cybersecurity, Computer Science, or related field (or equivalent experience). • 5+ years of experience in cybersecurity, penetration testing, or software security evaluation. • Certifications such as CISSP, CEH, OSCP, or GIAC GWEB are highly preferred. • Experience with secure coding practices and software vulnerability assessment tools (e.g., Nessus, Burp Suite, Fortify, SonarQube). • Familiarity with secure software development lifecycle (SSDLC More ❯
Stratford-upon-avon, Warwickshire, United Kingdom Hybrid / WFH Options
Ccl Solutions Group
using Python, Bash, or PowerShell. Strong understanding of Active Directory attack chains and common privilege escalation paths. Experience interpreting logs and event outputs from OS and security appliances. Certifications: OSCP, OSEP, CRTO, or other advanced offensivesecurity qualifications. Programming/scripting in Python, Ruby, Go, C#, or Java. Experience in red teaming, threat emulation, or purple teaming. Agile experience and More ❯
host logs, network traffic logs, firewall logs and IPS logs. • Well-versed in leveraging and securing cloud platforms. • Demonstrated knowledge of information security discipline via industry certification such as: OSCP, CCSP, CISSP, SSCP, GIAC (Security Track). • Experience conducting incident response to include: research and identification of attack vector, malware mitigation and removal and documentation of event. • Motivated self-starter More ❯
Security Operation Center/CSIRT work is considered an advantage. Computer forensics expertise, penetration testing experience, academic studies, and security related certifications (like: GCFA, GCFE, GCIA, GCIH, CISSP, GREM, OSCP) are a strong plus. Strong ethics, fluent written and spoken English as well as ability to efficiently work as a part of technical security team. Willingness to travel is highly More ❯
GDPR, PIPL etc) Knowledge of other regulatory or compliance frameworks such as ISO, PCI DSS, NIST etc Likely to hold at least one common security certification (CEH, CCSP, CISSP, OSCP) alongside other relevant IT certifications (ITIL, AMP, Prince2 etc) preferred Additional technologies/experience: Experience with any of the below technologies or in the below areas would be advantageous: Awareness More ❯
mindset and the ability to work independently Experience using CRM and sales analytics platforms Ability to thrive in a fast-paced, growth-focused environment Bachelor's degree Desirable CISSP, OSCP, CEH, or similar are a strong advantage 5+ years in pre-sales, consulting, or technical sales support role within cybersecurity or IT services Experience in the enterprise space Benefits Competitive More ❯
Application Basic understanding of virtual environments Bachelor's degree in Information Technology, Cybersecurity, Computer Science, or a related field, Master's degree or relevant certifications (e.g., PMP, Prince, CISSP, OSCP) is a plus Be able to work in a pressurised situation and set priorities accordingly. Ability to work in a fast paced, high pressure work environment. Excellent technical writing skills More ❯
work independently and as part of a team. o Strong attention to detail and a commitment to delivering high-quality work. Preferred Qualifications: Certifications: Relevant industry certifications such as OSCP, CEH, CISSP, or GPEN. Experience: Prior experience in a DoD or intelligence community environment is highly desirable. Knowledge: Familiarity with offensivesecurity techniques and frameworks, such as Metasploit or Cobalt More ❯
with TEE technologies or confidential computing. Knowledge of OWASP Top 10, CVEs, and secure coding practices. Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, etc. Certifications such as OSCP, CEH, or GIAC are a plus. Nice to Have: Experience with Kubernetes and container security. Familiarity with CI/CD security integration. Familiarity with Snowflake and Databricks Red Team experience More ❯
least one industry-recognized cybersecurity certification, such as CompTIA Security+, Certified Ethical Hacker (CEH), CISSP, GIAC, or equivalent. Preferred: Multiple certifications demonstrating expertise across various areas (e.g., CISM, CISA, OSCP, GPEN). Experience Industry Experience: Minimum of 3-5 years of professional experience in cybersecurity roles such as security analyst, penetration tester, security consultant, or security architect. Teaching Experience: Prior More ❯
to analyze attacks against networks and develop countermeasures. • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), OffensiveSecurity (OSCP), Certified Ethical Hacker (CEH) • General technical certifications such as CompTIA Network+, Security+, Linux+ More ❯
to work collaboratively and communicate technical findings clearly. 8. Willingness to learn and adapt to new tools and techniques in an evolving threat landscape. 9. Certifications such as GREM, OSCP, or CEH. 10. Familiarity with exploit development concepts. 11. Knowledge of cryptographic techniques and secure coding practices. 12. Experience in scripting languages such as Python, Bash, or PowerShell. BENEFITS That More ❯
IT and cybersecurity domains. Degree in IT (Information Technology), OT (Operational Technology), or equivalent experience. CISSP certification or equivalent experience would be an asset. Additional certifications such as CISM, OSCP, CEH, or equivalent are considered a strong asset. Proven experience in implementing and monitoring Information Security Management Systems (ISMS) is essential. Strong knowledge of information security standards such as ISO More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Corelight, Inc
captures) Deep understanding of information security Experience with network security monitoring, incident response, or blue team concepts (for example: GCMC, GNFA) Pentest or red team experience (for example: CEH, OSCP) Experience designing/implementing cloud-based security solutions (for example: AWS/AzureGCP traffic mirroring, flow logs, identity management) Good understanding of general SOC security processes and methodologies Solid understanding More ❯
cybersecurity ️ Strong knowledge of common vulnerabilities (OWASP Top 10, CVEs) and attack techniques ️ Familiarity with penetration testing tools such as Burp Suite, Metasploit, Nessus, and Nmap ️ Certifications such as OSCP, CEH, or equivalent are highly desirable ️ Strong communication skills to present findings to both technical and non-technical stakeholders More ❯