to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications: Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of WAN technologies including MPLS, SD WAN. Knowledge of cloud providers security (AWS, GCP or Azure). Prior More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Experian Ltd
Center or Cyber Security Incident Response Teams Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security or professional certification related to Digital Forensics, Incident Response, or EthicalHacking (e.g., GCIH, CEH, GCFE, GCFA, and CFCE). Knowledge of main concepts related to the Incident Response Life Cycle, MITRE ATT&CK Framework, Cyber Kill Chain, and More ❯
s degree in Computer Science, Information Security, or a related field. A master's degree is a plus. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM) are highly desirable. Scripting experience. FlexTrade Systems, Inc. is an equal opportunity employer and makes employment decisions without regard to race More ❯
effectively with a variety of stakeholders from different technology and business teams. Strong verbal and written communication skills. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). Strong knowledge of Operating System security and system hardening concepts such as CIS Benchmarks. Experience in working with information security More ❯
hybrid networking, container/serverless security and DevSecOps tooling Demonstrable experience hardening corporate business platforms (ERP, CRM, HR, finance, M365, identity providers, SaaS) Working familiarity with offensive-security/ethical-hacking techniques; able to think like an attacker, interpret red-team reports and translate findings into architectural controls Strong grasp of OT protocols (Modbus/TCP, IEC … with Data Protection Officer, Risk and Compliance, Security Operations. CISSP, CISM, SABSA, TOGAF (Security), or Azure Security Speciality (desirable) ISA/IEC 62443 Cybersecurity Specialist or GIAC GICSP, demonstrating ethical-hacking capability (desirable) Experience navigating ISO 27001/27019 certification, NIS2 readiness, or TSO cybersecurity codes (desirable) The right to work in the UK. WHAT WE OFFER A More ❯
City of London, London, United Kingdom Hybrid / WFH Options
NextEnergy Group
hybrid networking, container/serverless security and DevSecOps tooling Demonstrable experience hardening corporate business platforms (ERP, CRM, HR, finance, M365, identity providers, SaaS) Working familiarity with offensive-security/ethical-hacking techniques; able to think like an attacker, interpret red-team reports and translate findings into architectural controls Strong grasp of OT protocols (Modbus/TCP, IEC … with Data Protection Officer, Risk and Compliance, Security Operations. CISSP, CISM, SABSA, TOGAF (Security), or Azure Security Speciality (desirable) ISA/IEC 62443 Cybersecurity Specialist or GIAC GICSP, demonstrating ethical-hacking capability (desirable) Experience navigating ISO 27001/27019 certification, NIS2 readiness, or TSO cybersecurity codes (desirable) The right to work in the UK. WHAT WE OFFER A More ❯
skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Circle Group
advanced offensive roles , including Red Team and Adversarial Simulation Exposure to a broad range of real-world security challenges in varied environments Keywords: Penetration Tester, OSCP, OSEP, Offensive Security, EthicalHacking, Red Team, Web Application Security, Cyber Security Jobs UK, Cloud Security, Infrastructure Testing, Adversarial Simulation, Ethical Hacker, InfoSec, Application Security, UK Cyber Jobs, Security Testing, Cyber More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Circle Group
advanced offensive roles , including Red Team and Adversarial Simulation Exposure to a broad range of real-world security challenges in varied environments Keywords: Penetration Tester, OSCP, OSEP, Offensive Security, EthicalHacking, Red Team, Web Application Security, Cyber Security Jobs UK, Cloud Security, Infrastructure Testing, Adversarial Simulation, Ethical Hacker, InfoSec, Application Security, UK Cyber Jobs, Security Testing, Cyber More ❯
on cloud security (AWS, Azure, or GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with MoJ and NCSC guidelines. Essential Criteria Penetration testing, ethicalhacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security, IaC More ❯
attention to details. Certified Authorization Professional (CAP) Certified Network Defender (CND) Information Systems Security Architecture Professional (ISSAP) Certified Information Security Manager (CISM) Information Systems Security Engineering Professional (ISSEP) Certified Ethical Hacker (CEH) Computer Hacking Forensics Investigator (CHFI) Information assurance system architecture and engineer (IASAE) It is prerequisite to be certified in one of the listed DoD 8570 Certifications. More ❯
Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of Vulnerability Scanning, Management, and EthicalHacking (Penetration Testing). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work in a 24/ More ❯
or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Education Requirements & Experience Minimum of More ❯
or equivalent experience Demonstrable skills and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions Understanding of common frameworks More ❯
management, and encryption. Understanding of security frameworks such as NIST, CIS Controls, or ISO 27001. Formal industry recognised Cyber Security qualification such as ISC2 CISSP, ISC2 CISM or Certified Ethical Hacker (CEH) (desired). Security and Network technology experience. About us: We are an international engineering and construction company delivering state-of-the-art infrastructure and buildings projects for More ❯
tools and building security into existing SDLC processes Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP) Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps Excellent oral, written communication and presentation skills What we offer: At More ❯
tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we offer: At More ❯
tools. Strong verbal and written English communication skills. Interpersonal and presentation skills. Strong analytical skills. Understanding network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and EthicalHacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines (Incident, Problem, Change Management). Ability to work independently. Willingness More ❯
awareness training Requirements Demonstrable skills and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions Understanding of common frameworks More ❯
seeking a talented and motivated Penetration Tester to join our clients growing cybersecurity team on a fully remote basis (mainland UK only). You will be responsible for conducting ethicalhacking and security testing engagements to identify vulnerabilities in client systems, applications, and infrastructure. This is an exciting opportunity to work across a range of industries while further More ❯
London, England, United Kingdom Hybrid / WFH Options
Lorien
seeking a talented and motivated Penetration Tester to join our clients growing cybersecurity team on a fully remote basis (mainland UK only). You will be responsible for conducting ethicalhacking and security testing engagements to identify vulnerabilities in client systems, applications, and infrastructure. This is an exciting opportunity to work across a range of industries while further More ❯
London, King's Cross, United Kingdom Hybrid / WFH Options
Vector Recruitment
Senior Penetration Tester – Must be eligible to obtain security clearance We are looking for a Senior Penetration Tester/Ethical Hacker to work freelance for a company who delivers high-quality security solutions for an array of different clients from varied industries. Due to an unprecedented increase in workload, we are looking for a reliable Penetration Tester to work … and client base, all applicants but be able to obtain SC clearance. Day rate: £400 - £500 per day, London – remote/hybrid Requirements Proven experience in Penetration Testing/EthicalHacking Strong knowledge of network and cloud infrastructure security. Up-to-date on the latest cybersecurity threats and technologies. Strong knowledge in pen testing tools ( Metasploit, Nmap, Wireshark More ❯
Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps … validation in data pipelines. Works with SQL, Informatica, Talend, SSIS, Snowflake. AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing More ❯
Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps … validation in data pipelines. Works with SQL, Informatica, Talend, SSIS, Snowflake. AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing More ❯
Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps … validation in data pipelines. Works with SQL, Informatica, Talend, SSIS, Snowflake. AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing More ❯