you’ll simulate cyberattacks on client environments—testing networks, apps, cloud platforms, and more—to expose weaknesses and recommend fixes. You’ll work on red/purple team engagements, socialengineering tests, and cloud security assessments, delivering high-impact reports that drive real security improvements. What You’ll Do: Perform infrastructure, web app, wireless, and cloud penetration tests More ❯
penetration testing. Create detailed technical reports and deliver test findings directly to clients. Provide remediation advice and post-assessment consultancy. Contribute to internal testing methodologies and Red Team/socialengineering activities. Mentor junior team members and support collaborative delivery of projects. Occasionally support the creation of marketing materials such as research papers and articles. Skills/Must … and IoT security. Exposure to CI/CD security, Docker/container security, and AI/LLM testing. Hands-on experience with Red Teaming tools (e.g., Cobalt Strike) and social engineering. Familiarity with bug bounty platforms and vulnerability disclosure best practices. Benefits: Competitive salary with regular performance reviews Annual training and personal development plan Access to conferences and professional More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
penetration testing. Create detailed technical reports and deliver test findings directly to clients. Provide remediation advice and post-assessment consultancy. Contribute to internal testing methodologies and Red Team/socialengineering activities. Mentor junior team members and support collaborative delivery of projects. Occasionally support the creation of marketing materials such as research papers and articles. Skills/Must … and IoT security. Exposure to CI/CD security, Docker/container security, and AI/LLM testing. Hands-on experience with Red Teaming tools (e.g., Cobalt Strike) and social engineering. Familiarity with bug bounty platforms and vulnerability disclosure best practices. Benefits: Competitive salary with regular performance reviews Annual training and personal development plan Access to conferences and professional More ❯
security testing. Conduct manual reviews to identify issues within customer infrastructure and web applications. Perform various types of security testing, including network penetration, web application, mobile security assessments, and social engineering. Participate in red team engagements, employing creative strategies to outsmart defenders. Explore various approaches to gain unauthorized access to customer networks during red team exercises. Perform security assessments More ❯
client relationships We are seeking an enthusiastic Cyber Security Consultantto join our team. Working alongside ourexperienced team of specialists, you'll be delivering offensive securityservices including digital footprint reconnaissance, socialengineering,penetration testing and vulnerability assessments and more to high profileclients across all industries. The purpose of this role is to deliver our offensivesecurity services including digital footprint reconnaissance, socialengineering, vulnerability assessments, penetration testing, threat modelling,cyber-attack simulation exercises, and more to high profile clients across allindustries. The purpose of this role is to deliver our Cyber Security services More ❯
or statistical models to increase signal quality and reduce noise. Incident Management & Root Cause Analysis Lead real-time incident response for payments-related issues and fraud escalations. Work with engineering, information security, and compliance teams to investigate root causes and implement permanent fixes. Document incidents, develop playbooks, and participate in post-mortems to strengthen operational resilience. Data-Driven Risk … Detection Use SQL and Python to investigate transaction flows, analyze alert logs, and uncover underlying fraud patterns. Collaborate with data and engineering teams to iterate on fraud models and contribute to detection logic and alert effectiveness. Provide reporting and insights to stakeholders on fraud patterns, attack vectors, and system gaps. Internal Collaboration & Stakeholder Communication Act as the payments monitoring … SME for internal teams, including Customer Relations, Compliance, Engineering and Product. Coordinate with third parties like processors, acquirers and card schemes to resolve incidents and implement scheme-required controls. Support go-to-market operational readiness for new geographies (e.g., US launch) by defining fraud detection standards and monitoring capabilities. WHAT YOU'LL BRING 3+ years in payments monitoring, fraud More ❯
by joining us, you'll be at the forefront of this ever-evolving landscape. The field is rapidly changing, as threat actors employ AI to scale up phishing and socialengineering operations. Why Join Our Team? "You'll have the chance to build large-scale data pipelines moving billions of data points daily in real-time, and develop … Mentor and guide junior members of the team, establish and champion best practices and introduce fresh ideas and concepts Experience 10+ years of experience working on data processing and engineering for ML models, with 6+ years developing large-scale data and ML systems twhich receive billions of requests per day Expert level know-how of designing and implemention synchronous More ❯
subsequent remediation. Design, manage and deliver specialist assurance activities over first-line and the wider business including, Red & Purple Team assessments, Data Leakage, and Disinformation & Dark-Web Assessments and SocialEngineering exercises. Requirements: Experience as a 'Head of Information Security' or Senior Information Security Management role. Leading teams and enterprise risk remediation programmes. Designing and delivering enterprise Information More ❯
to attain a unique perspective of the Internet, and every persona connected to it. On top of driving innovation projects, you'll be continually collaborating with internal product and engineering teams, customer-facing account teams, and external business leaders and risk managers. The comprehensive models you build will go head-to-head against some of the most motivated attackers … attention to detail and ability to craft a story through data, delivering industry-leading presentations for external and executive audiences Building an extensive knowledge of cybercrime - account takeover, scams, socialengineering, Card Not Present (CNP) fraud, money laundering and mule fraud etc Employing your multi-tasking and prioritisation skills to excel in a fast-paced environment with frequently More ❯