City of London, London, United Kingdom Hybrid / WFH Options
Matchtech
EC2, S3, SQS, etc.) Desirable Skills & Experience Experience with SIEM convergence from legacy platforms Familiarity with tools such as JIRA, Confluence, Git Background in EthicalHacking, IDAM, PKI, or broader information security disciplines A team-oriented, adaptable mindset with a problem-solving approach Required Qualifications Splunk Cloud Administrator … Splunk SOAR Administrator Splunk Certified Cybersecurity Defence Analyst Cloud Security Architecture (CSA) Microsoft Azure Infrastructure Solutions Desirable Certifications Certified Information Systems Security Professional (CISSP) EthicalHacking & Intrusion Prevention Information Security Management Systems (ISMS) Identity Access & Management (IDAM More ❯
london, south east england, united kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Pentester ) with extensive hands-on experience to join an IT consultancy for a 6-month contract role. The role will involve you leading in ethicalhacking processes, analysing and identifying vulnerabilities, and reporting on opportunities to increase defence strength, and actionable recommendations. Key Responsibilities Threat modelling and simulation … Vulnerability assessments Ethicalhacking of networks, operating systems, and web application Utilise tools for SIEM, Data Loss Prevention, and endpoint detection Collaborate with third-party vendors The role is open for applications from 19/05 and the application period will close on 02/06. Interviews will More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Pentester ) with extensive hands-on experience to join an IT consultancy for a 6-month contract role. The role will involve you leading in ethicalhacking processes, analysing and identifying vulnerabilities, and reporting on opportunities to increase defence strength, and actionable recommendations. Key Responsibilities Threat modelling and simulation … Vulnerability assessments Ethicalhacking of networks, operating systems, and web application Utilise tools for SIEM, Data Loss Prevention, and endpoint detection Collaborate with third-party vendors The role is open for applications from 19/05 and the application period will close on 02/06. Interviews will More ❯
london (west end), south east england, united kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Pentester ) with extensive hands-on experience to join an IT consultancy for a 6-month contract role. The role will involve you leading in ethicalhacking processes, analysing and identifying vulnerabilities, and reporting on opportunities to increase defence strength, and actionable recommendations. Key Responsibilities Threat modelling and simulation … Vulnerability assessments Ethicalhacking of networks, operating systems, and web application Utilise tools for SIEM, Data Loss Prevention, and endpoint detection Collaborate with third-party vendors The role is open for applications from 19/05 and the application period will close on 02/06. Interviews will More ❯
identified vulnerabilities in the infrastructure. Desired Qualifications: Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of WAN technologies including MPLS, SD WAN. Knowledge of cloud providers security (AWS More ❯
Information Security, or a related field. A master's degree is a plus. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM) are highly desirable. Scripting experience. FlexTrade Systems, Inc. is an equal opportunity employer and makes employment More ❯
stakeholders from different technology and business teams. Strong verbal and written communication skills. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). Strong knowledge of Operating System security and system hardening concepts such as CIS Benchmarks. Experience More ❯
tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber/Information Security, Digital Forensics, EthicalHacking Computer Science, Software Development, Network Engineering Mathematics, Physics and other STEM subjects Other desirable certifications include : CISSP/CEH, CREST, OSCP/ More ❯
Due to the service of the role, it will now be based on an Umbrella solution. Essential skills/experience required: Experience penetration testing, ethicalhacking, or completing vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g. … DV, Security, Cyber, Cybersecurity, Infosec, Cloud, AWS, Amazon Web Services, Azure, Python, Bash, Script, Scripting, Automate, Automation, Penetration, Pentest, Pentesting, Pen-Test, Pen-Testing, Hacking, Vulnerability, Threat, Engineer #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent #recruitment #job Circle Recruitment is acting as an Employment Agency in relation to this More ❯
and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM More ❯
to help set you up for success. Join a company that's making a real impact. In addition to our sustainability goals, we empower ethical hackers from all backgrounds to earn a living. Be yourself! Our international team celebrates individuality and places a strong focus on diversity and inclusion. More ❯
or GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with MoJ and NCSC guidelines. Essential Criteria Penetration testing, ethicalhacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode More ❯
and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM More ❯
existing SDLC processes Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP) Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps Excellent oral, written communication and presentation More ❯
london, south east england, United Kingdom Hybrid / WFH Options
G&L Consulting
per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems … SQL, Informatica , Talend , SSIS , Snowflake . AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing More ❯
south west london, south east england, United Kingdom Hybrid / WFH Options
G&L Consulting
per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems … SQL, Informatica , Talend , SSIS , Snowflake . AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing More ❯
west london, south east england, United Kingdom Hybrid / WFH Options
G&L Consulting
per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems … SQL, Informatica , Talend , SSIS , Snowflake . AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing More ❯
Network & Security Specialist: Strong expertise in cybersecurity, networking and wider infrastructure. Ability to manage and resolve security issues. Penetration testing experience. Red team/Ethicalhacking/real time security defence experience is an added bonus. Skilled in security tools such as Zscaler (ZIA & ZPA), Splunk, and general More ❯
Network & Security Specialist: Strong expertise in cybersecurity, networking and wider infrastructure. Ability to manage and resolve security issues. Penetration testing experience. Red team/Ethicalhacking/real time security defence experience is an added bonus. Skilled in security tools such as Zscaler (ZIA & ZPA), Splunk, and general More ❯
collaboratively with Engineering and IT teams to investigate, resolve, and prevent security issues Familiarity with application security principles, with exposure to penetration testing or ethicalhacking (CEH or similar certification is a plus) Awareness of industry frameworks like ISO 27001, CIS, or similar, and ideally holding a CISMP More ❯
Network & Security Specialist: Strong expertise in cybersecurity, networking and wider infrastructure. Ability to manage and resolve security issues. Penertration testing experience. Red team/Ethicalhacking/real time security defence experience is an added bonus. Skilled in security tools such as Zscaler (ZIA & ZPA), Splunk, and general More ❯
Network & Security Specialist: Strong expertise in cybersecurity, networking and wider infrastructure. Ability to manage and resolve security issues. Penertration testing experience. Red team/Ethicalhacking/real time security defence experience is an added bonus. Skilled in security tools such as Zscaler (ZIA & ZPA), Splunk, and general More ❯
west london, south east england, United Kingdom Hybrid / WFH Options
Harrington Starr
r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability assessment and More ❯
south west london, south east england, United Kingdom Hybrid / WFH Options
Harrington Starr
r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability assessment and More ❯
Mid-Market across various industries. At least 2 years of experience as an SDR. Proven background in a SaaS company; familiarity with software security, ethicalhacking, or bug bounty platforms is a plus. Excellent communication skills, curiosity, question-asking ability, and confidence in handling objections. Strong time management … Join a fast-growing cybersecurity industry with a clear career path and learning opportunities. Be part of a company making a real impact, empowering ethical hackers globally. Celebrate diversity and individuality in our international team. Recognized with awards like Deloitte Rising Star (2020) and Deloitte Fast 50 (2021). More ❯