to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
UK and operations worldwide, the company enable clients to navigate complex security challenges, ensuring the safety of their people, data, and reputation. The company is looking for a skilled Penetration Tester to join the Cyber/Technical team. If you would like to learn more about this opportunity, feel free to reach out and apply today! Responsibilities: Deliver technical … training to clients across sectors, both in the UK and internationally. Manage and mentor Technical Consultants, overseeing professional development and project execution. Lead project management for vulnerability assessments and penetrationtesting, ensuring smooth delivery and client satisfaction. Provide security consultancy services to commercial clients, offering tailored solutions and technical expertise. Assist with business development by networking and helping … to bring in new projects. Skills/Must Have: Strong technical security expertise, with a well-rounded understanding of penetrationtesting and risk management. Experience in government or defence security, with an interest in applying knowledge to commercial sectors. Proven consultancy, training, and leadership skills, with the ability to guide and mentor technical teams. Strong written communication and More ❯
remediation advice. Contribute to the development and continual improvement of internal CE+ processes and documentation. Collaborate with the Pen Test team on planning and scoping engagements. Assist in delivering penetration tests under the supervision of the PenetrationTesting Manager, depending on experience and certifications. Produce clear, concise, and technically accurate reports for both technical and non-technical … Access to internal and external training for career development (technical & compliance) Work across a growing and well-respected consultancy team Exposure to both compliance frameworks and hands-on security testing Salary: £45,000 - £60,000 DOE More ❯
Are you a cybersecurity enthusiast with expertise in penetrationtesting across infrastructure, web applications, mobile, and cloud environments? A Penetration Tester is needed to deliver high-quality security assessments and support clients in identifying and addressing vulnerabilities across their technology landscape. Based near Doncaster or Manchester, this role involves hands-on penetrationtesting across infrastructure … web, or cloud testing. Looking to deepen your expertise and work on meaningful security challenges? Apply now to be part of a team delivering real impact. Key Responsibilities: Conduct penetrationtesting on infrastructure, web applications, mobile platforms, and cloud environments to uncover vulnerabilities. Analyze testing outcomes and provide actionable recommendations to improve security measures. Collaborate with cross … functional teams to develop and implement security strategies. Stay updated on emerging cybersecurity threats and adapt testing methodologies accordingly. Skills & Requirements: Proven experience in penetrationtesting for infrastructure, web applications, mobile, and cloud environments. Strong understanding of networking protocols, systems architecture, and security best practices. Proficiency in using penetrationtesting tools and techniques to identify More ❯
Join a dynamic cybersecurity team near Doncaster or Manchester, where you'll play a key role in securing clients' digital landscapes. As a penetrationtesting expert, you will work on cutting-edge projects across infrastructure, web applications, mobile, and cloud environments. Collaborating with a talented team, you'll have the opportunity to contribute to innovative cybersecurity solutions while … enjoying continued growth and development in the field. Take the next step in your cybersecurity career-apply now! Responsibilities: Conduct penetrationtesting on infrastructure, web applications, mobile platforms, and cloud environments to uncover vulnerabilities. Analyze testing outcomes and provide actionable recommendations to improve security measures. Collaborate with cross-functional teams to develop and implement security strategies. Stay … updated on emerging cybersecurity threats and adapt testing methodologies accordingly. Skills/Must Have: Proven experience in penetrationtesting for infrastructure, web applications, mobile, and cloud environments. Strong understanding of networking protocols, systems architecture, and security best practices. Proficiency in using penetrationtesting tools and techniques to identify vulnerabilities. Excellent problem-solving skills with a More ❯
Are you ready to venture deeper into your career as a Senior PenetrationTesting Consultant? Join a well-established Managed Security Service Provider (MSSP) and a leading Fortinet and Microsoft partner, delivering high-impact cybersecurity solutions to clients in the defense, government, and financial services industries. Committed to nurturing talent, the organization offers a certification sponsorship and professional … development plan. They are currently seeking for a Senior PenetrationTesting Consultant to lead advanced penetration tests and security assessments of systems, networks, and applications. Ready to take the next step in your career? Apply today! Responsibilities: Conduct advanced penetration tests, including complex network, application security, and specialized assessments. Use cutting-edge tools and techniques to … identify and exploit vulnerabilities in diverse environments. Apply knowledge and practical experience in cloud and mobile penetration testing. Collaborate with clients to define project scopes, objectives, and expectations, including conducting pre-engagement meetings to understand their environments and threat landscapes. Offer technical leadership by guiding and mentoring junior team members while reviewing and validating their work to ensure quality More ❯
A UK-based cyber security consultancy is seeking a CHECK Team Member or Team Leader certified Penetration Tester to join their growing offensive security team. This is an opportunity to work on high-assurance engagements across public and private sector clients, delivering technical assessments to support risk reduction, compliance, and threat readiness. Key Responsibilities Deliver infrastructure and application penetration … in line with CHECK/NCSC requirements Produce high-quality technical and non-technical reports with clear risk articulation Lead or contribute to Red Team, scenario-based and assurance testing engagements Liaise with clients pre- and post-engagement to scope, explain findings, and advise on remediation Maintain technical expertise in emerging tools, attack vectors, and testing methodologies Support … internal knowledge sharing and mentoring of junior team members Essential Requirements Current CHECK Team Member (CTM) or CHECK Team Leader (CTL) status Demonstrable experience delivering penetrationtesting across networks, applications, and cloud environments Strong working knowledge of tools such as Burp Suite, Cobalt Strike, Kali Linux, etc. Familiarity with reporting to NCSC standards and presenting findings to both More ❯
Job Title: Penetration Tester Location(s): Annapolis Junction, MD Hours: Regular Full-Time Salary Range: $110k/yr - $175k/yr Clearance Requirements: This position requires a current and active TS/SCI with FS Poly at the time of application. What you will be doing: Serve as a Subject Matter Expert providing testing expertise of the Risk … Management Framework. Direct and/or participate in the testing phase of security controls assessments using specialized knowledge of network protocols, operating systems, architectures, equipment, services, and standards. Perform vulnerability and penetrationtesting using a wide variety of tools Research and evaluate emerging technologies relevant to information systems security; interpret agency specific and federal security regulations Perform … both network and application-level testing using established testing protocols and methods Position Requirements Minimum Requirements: Experience: Eight (8) experience of related work experience as a Penetration Tester performing both network and application-level testing using established test protocols and methods. Education: A Bachelor's degree in Computer Science or related technical discipline from an accredited More ❯
At Instil we specialise in providing human-focused security and penetrationtesting services for web applications, cloud infrastructure and mobile applications. The Role We are looking for a Penetration Tester to join our dynamic team based in Belfast. As a Pen Tester, you will be part of the delivery team, conducting penetration tests and vulnerability assessments … Holiday Life Assurance Cycle to Work Scheme Day to Day Probe & exploit security vulnerabilities in client's Infrastructure/cloud, Web Applications and Mobile Applications using a variety of penetration tests. Write detailed reports outlining vulnerabilities and providing actionable recommendations. Collaborate with clients during kick-off and discovery sessions, providing expert advice. Stay current with the latest security threats … vulnerabilities, and trends. Research offensive security techniques to assess and validate infrastructure and technologies, including cloud-based systems. Automate repetitive tasks by developing scripts to streamline testing processes. Mentor junior penetration testers and contribute to their professional development. Play a key role in enhancing existing tools, methodologies, and reports. Occasionally support pre-sales efforts by acting as a More ❯
Role: Offensive Security Specialist Type: Permanent Location: Remote (UK) Clearance: Eligible for SC Interested in getting away from the grind of endless similar penetration tests? Keen to stretch yourself into a more managerial role over time, building up a capability around you? We are working with a leading security services provider who are in the process of standing up … their Offensive Security capability. The work will be focused on providing services such as Web App testing, Infrastructure testing and Code Review services to clients whilst also looking at how to develop that side of the company further. This role has a unique blend of hands on, technical work that would suit someone looking for something a bit … into a market leading function •Customer engagement, through the scoping process, tool selection and overall delivery •Run and take ownership of services such as Vulnerability Assessments, Code Review and PenetrationTesting •Potential to work overseas to provide training services or working with clients to develop their own security posture •Engage in a cross departmental way in order to More ❯
What You'll Be Working On: ️ Implementing secure development practices and conducting threat modeling for software applications ️ Performing static and dynamic application security testing (SAST/DAST) to identify vulnerabilities in code ️ Collaborating with DevOps and development teams to integrate security into the CI/CD pipeline ️ Conducting regular application security assessments, including penetrationtesting and vulnerability … Proven experience as an Application Security Specialist or in a similar application security role ️ Strong knowledge of secure coding practices, common vulnerabilities (e.g., OWASP Top 10), and application security testing tools ️ Experience with SAST, DAST, and security code review tools (e.g., Fortify, Veracode, Checkmarx) ️ Familiarity with secure software development frameworks (e.g., OWASP, NIST) ️ Relevant certifications such as CSSLP, CEH More ❯
Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetrationtesting, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and guidelines for usage Analyze design specifications … that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetrationtesting, and provide a comprehensive verification and validation report (certification report) for the information system Facilitate penetrationtesting Provide a comprehensive verification and validation report (certification … JASINT provides equal employment opportunities to all employees and applicants without regard to race, color, ancestry, national origin, gender, sexual orientation, marital status, religion, age, disability, gender identity, genetic testing results, or service in the military. Equal employment opportunity applies to all terms and conditions of employment, including hiring, placement, promotion, termination, layoff, recall, transfer, leave of absence, compensation More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
General Dynamics Information Technology
based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetrationtesting, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or … WHAT YOU'LL NEED TO SUCCEED: Required Experience: 5+ years of related experience Required Technical Skills: Offensive Security Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM) Security Clearance Level: TS/SCI US Citizenship Required Location: Hybrid-Ft. Belvoir, VA Required Skills and Abilities: Must be proficient in offensive … based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetrationtesting, security operations center analysis, defensive cyber operations, or offensive cyber operations. GDIT IS YOUR PLACE: Full-flex work week to own your priorities at work and at More ❯
that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetrationtesting, and provide a comprehensive verification and validation report (certification report) for the information system Facilitate penetrationtesting Provide a comprehensive verification and validation report (certification More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom
The Bridge (IT Recruitment) Limited
security initiatives across their development teams. You'll be at the heart of ensuring their platforms remain secure by leading the execution of vital security initiatives, managing tooling, coordinating testing efforts, and embedding security best practices into the fabric of our development processes. What you'll be doing: Leading cybersecurity initiative delivery across game and platform development teams. Managing … third-party penetrationtesting, red teaming, and security assessments. Driving the integration of secure development practices and automation within CI/CD workflows. Supporting compliance and audit activities through structured documentation and reporting. Coordinating vulnerability management and helping teams meet security SLAs. Collaborating with cross-functional stakeholders to embed security into engineering culture and processes. Owning and improving … . Strong examples of cross-functional stakeholder management, being a knowledgeable bridge between technical cyber security teams and non-cyber security colleagues. Proven track record of leading third-party testing efforts, red teaming and security tool implementations. Strong knowledge and experience of integrating security into agile development environments and workflows. Experience with tools like Jira, Confluence, SharePoint or similar More ❯
Experience must be in the design/development of computer or information systems, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, and/or systems engineering. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Pardoe Wray
Join a leading Cyber Security provider, established in early 2018 and rapidly growing in the UK. They specialize in a wide array of security services including PenetrationTesting, Cloud Security, Continuous Security Testing, Adversarial Emulation, End Point Detection and Response, Backup & Restore solutions, and more. Role: Graduate Sales Development Representative Location: Newcastle or Leeds Responsibilities: Learn and More ❯
Maidstone, Kent, United Kingdom Hybrid / WFH Options
Rocketsourcers B.V
solutions. You'll write, test, and maintain high-quality software in collaboration with your colleagues. You'll help improve test processes, identify and resolve issues, and create tools for testing performance, security, and system integration. Promoting a strong testing culture across the team will also be part of your role. What makes this job unique? This is your … of integration. At Payter, you'll find an open and dynamic environment where your work has real impact. Job requirements Technical skills: Programming Languages : Golang (training provided if needed) Testing Types : Unit, integration, regression, end-to-end, performance, load, and security testingTesting Methodologies : Test-Driven Development (TDD), Behaviour-Driven Development (BDD) Test Techniques : Black-box, white … box testing, mocking, stubbing, and test data management Software Practices : Git workflows, Object-Oriented Programming (OOP), SOLID principles, use of design patterns DevOps & Infrastructure : Infrastructure as Code (IaC) Configuration management tools Containerisation (e.g., Docker) Security : Secure coding, vulnerability scanning, penetrationtesting, and general software security principles Debugging : Working with logs, databases, and root cause analysis Soft skills More ❯
in-depth architecture against known vulnerabilities. TASKS: Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives. Conduct and/or support authorized penetrationtesting on enterprise network assets. Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions. Maintain knowledge of applicable … security systems and designs. Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort). Skill in mimicking threat behaviors. Skill in the use of penetrationtesting tools and techniques. Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.). Skill in using network analysis tools to identify vulnerabilities. (e.g. More ❯
risk and usability. Knowledge of security standards and regulations (e.g. NCSC, ISO, SoC, NIST, PCI, GDPR). Experience in application architecture, software development and/or infrastructure architecture. Experience testing the security of software and infrastructure using appropriate security tools. Experience with Continuous Security, Continuous Integration and Continuous Delivery techniques. Experience of network security (e.g. OSI, TCP/IP … of Identity management and authentication/authorisation products and patterns. End-to-end security involvement, including governance, risk and compliance, operational security, supply chain security and secure user management. Penetrationtesting qualifications (e.g. OSCP, CREST, TIGER or equivalent) Experience leading security engineers and other junior members of staff More ❯
West London, London, England, United Kingdom Hybrid / WFH Options
Ashdown Group
you will need the following skills and experience: - Experience in either a Cyber Analyst or Cyber Engineer role - Knowledge on SIEM and EDR tools - Experience in network audits and penetrationtesting - Infrastructure support experience - Knowledge on security frameworks More ❯
and potential attacks against the systems or missions being studied. The principal level System Vulnerability Analyst shall possess the following capabilities: Candidate must have relevant experience in vulnerability analysis, penetrationtesting, and/or computer forensics. Requirements Active TS/SCI w/Polygraph security clearance is required. Information Assurance Certification may be required A Bachelor's Degree More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
recovery plans Establish and improve vulnerability management processes Requirements Experience in a Cyber Analyst or Cyber Engineer role Knowledge of SIEM and EDR tools Experience with network audits and penetrationtesting Infrastructure support experience Understanding of security frameworks Create a job alert and receive personalized job recommendations directly to your inbox. More ❯
deployment and upkeep of various platforms that support multiple applications. Responsibilities of the Linux Platform Engineer: Monitor and enhance platform performance, applying corrective measures as needed Conduct vulnerability assessments, penetrationtesting, and develop security-based incident response plans Configure and manage host-based security systems and utilize monitoring tools such as Prometheus, Grafana, ELK, IBM NetCool, and Solarwinds More ❯