skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and More ❯
Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps … validation in data pipelines. Works with SQL, Informatica, Talend, SSIS, Snowflake. AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing More ❯
Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (EthicalHacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps … validation in data pipelines. Works with SQL, Informatica, Talend, SSIS, Snowflake. AI/ML Model Testing Test models for accuracy, bias, and performance. Involves validating model predictions, fairness, and ethical AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
Glasgow, Glasgow City, City of Glasgow, United Kingdom
ITOL Recruit
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
Aberdeen, Aberdeen City, City of Aberdeen, United Kingdom
ITOL Recruit
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯