standards, guidance, and processes Skillset & requirements Solid background in penetration testing, ethical hacking, or red teaming engagements Strong knowledge of frameworks such as OWASP Top 10 , MITREATT&CK , and risk-scoring methods like CVSS Practical use of tools such as Burp Suite, Nmap, Metasploit, Wireshark, Kali Linux Proficiency with scripting languages (e.g., Python, Bash More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Investigo
development of security policies and best practices Required Skills & Experience: Strong background in penetration testing, ethical hacking, or red teaming Deep knowledge of OWASP Top 10, MITREATT&CK, and CVSS scoring systems Proficiency with tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux Scripting experience with Python, Bash, or PowerShell Understanding of More ❯
to security policies and best practices development Required Skills & Qualifications Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITREATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating More ❯
to security policies and best practices development Required Skills & Qualifications Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITREATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating More ❯
to security policies and best practices development Required Skills & Qualifications Proven experience in penetration testing, ethical hacking, or red teaming Strong understanding of OWASP Top 10, MITREATT&CK, and CVSS scoring Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, Kali Linux Familiarity with scripting languages (Python, Bash, PowerShell) Knowledge of network protocols, operating More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
/CI/CD security and cloud-native architectures (containers, Kubernetes, Git). Strong knowledge of AI/ML-specific security vulnerabilities (adversarial attacks, data poisoning, prompt injection, MITRE ATLAS). Familiarity with global regulatory frameworks relevant to AI security. Excellent communication skills for engaging both technical and non-technical stakeholders. Esther Urtecho Senior Delivery Consultant London | Bristol More ❯