Contract Pen Tester – SC Cleared 🚨 I'm on the search for a INF/APP or CSTM certified consultants to deliver ITHCs and penetration testing. 🔹 £700 p/d (Outside IR35) 🔹 6 months (with extension) 🔹 Manchester & Newcastle (mix of on-site + remote) 🔹 SC clearance required If you’re a seasoned tester with these certifications and strong AWS/ More ❯
provided across the programme to ensure that the new technology is secure by design Support the teams to interpret security requirements of the project Conduct threat modelling and pen testing to identify threats and establish controls Support wider teams with security advice and guidance in both a verbal and written format Lead delivery of hands-on security engineering solutions … Crest/CHECK Strong understanding of shift left Proven experience with of working with development teams on security related topics Either hands on secure software development or applications security testing Likely come from a pen testing, SRE, or Software Development Background We invite individuals from underrepresented groups to apply for any of our roles and are committed to More ❯
provided across the programme to ensure that the new technology is secure by design Support the teams to interpret security requirements of the project Conduct threat modelling and pen testing to identify threats and establish controls Support wider teams with security advice and guidance in both a verbal and written format Lead delivery of hands-on security engineering solutions … Crest/CHECK Strong understanding of shift left Proven experience with of working with development teams on security related topics Either hands on secure software development or applications security testing Likely come from a pen testing, SRE, or Software Development Background We invite individuals from underrepresented groups to apply for any of our roles and are committed to More ❯
and review security-sensitive design decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and efficient, and that testing programmes - including pen testing, vulnerability scanning, and bug bounty - are delivering value. You'll triage vulnerabilities, support engineering teams with practical mitigations, and contribute to documentation that strengthens More ❯
Penetration Tester | CHECK CTL or CTM | Outside IR35 | Short Term Engagement My client is an exciting and growing consultancy based in London that requires a Pen Tester for a short-term contract. This role has been deemed as outside IR35 and will be remote-first, with the occasional trip into London required. Key Skills: Strong Pen Testing background More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
security solutions, with a team that lives and breathes security research and sassy exploitation techniques. If you're tired of mundane web audits, boring infrastructure reports, and repetitive pen-testing tasks, this is your opportunity to jump into something unique and thrilling. The Role: We are seeking a highly technical Cyber Security Pentester/Researcher with a 'hacker mindset … systems. This role is perfect for someone who is already deeply involved in the Bug Bounty scene or a seasoned 'old-school hacker' looking to break free from traditional penetration testing. What You'll Do: Identify and Exploit Vulnerabilities: Use your technical prowess to identify and exploit external, web-facing vulnerabilities. Understand how these vulnerabilities occur and how they More ❯
and reporting, with a focus on realism and impact Creating or modifying tools, exploits, and payloads as needed not relying solely on off-the-shelf frameworks Supporting threat-led testing programs and integrating threat intelligence into operations Maintaining strict operational security and professional discipline in all activities What were looking for: 34+ years of true red teaming experience (not … general pen testing) A deep skillset in one or more areas: evasions, custom malware, cloud red teaming, physical access, phishing infrastructure, or post-exploitation Strong scripting or development background (e.g., Python, Go, C#, or C) Experience with major red team frameworks (e.g., Sliver, Mythic, Cobalt Strike) and a willingness to go beyond them Familiarity with adversary emulation frameworks and More ❯
and reporting, with a focus on realism and impact Creating or modifying tools, exploits, and payloads as needed — not relying solely on off-the-shelf frameworks Supporting threat-led testing programs and integrating threat intelligence into operations Maintaining strict operational security and professional discipline in all activities What we’re looking for: 3–4+ years of true red teaming … experience (not general pen testing) A deep skillset in one or more areas: evasions, custom malware, cloud red teaming, physical access, phishing infrastructure, or post-exploitation Strong scripting or development background (e.g., Python, Go, C#, or C) Experience with major red team frameworks (e.g., Sliver, Mythic, Cobalt Strike) and a willingness to go beyond them Familiarity with adversary emulation More ❯
Business Development Representative (BDR) Compensation: £60k base + OTE The Client: An early-stage, high-growth offensive security vendor pioneering next-generation solutions that help organisations proactively identify and remediate vulnerabilities before they can be exploited. This is an exciting More ❯
of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and More ❯
Offensive Security Researcher/Security Consultant | Elite Cybersecurity Scale-Up | Fully Remote (Global) Ready to take your offensive security skills to the next level? This is your chance to join a fast-scaling cybersecurity innovator , backed by $29M funding, recognised More ❯
Offensive Security Researcher/Security Consultant | Elite Cybersecurity Scale-Up | Fully Remote (Global) Ready to take your offensive security skills to the next level? This is your chance to join a fast-scaling cybersecurity innovator , backed by funding, recognised by More ❯
Offensive Security Researcher/Security Consultant Elite Cybersecurity Scale-Up Fully Remote (Global) Ready to take your offensive security skills to the next level? This is your chance to join a fast-scaling cybersecurity innovator, backed by $29M funding, recognised More ❯
HackerOne is a global leader in offensive security solutions. Our HackerOne Platform combines AI with the ingenuity of the largest community of security researchers to find and fix security, privacy, and AI vulnerabilities across the software development lifecycle. The platform More ❯
of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and More ❯
TEE (Trusted Execution Environment) Integration: Implement secure pipelines where camera capture, CNN inference, encryption, and attestation all occur inside a TEE for maximum security. Presentation Attack Defence: Designing and testing methods to identify attempts to fool our biometric system. Next-Generation Imaging Methods: Explore alternative imaging approaches to reduce power consumption, enable device miniaturisation, and enhance image quality. Tamper … sensors, cryptographic modules, embedded deployment (Yokto) and secure data pipelines. Imaging System Innovation: Research and test imaging methods that reduce power draw while enhancing accuracy and reliability. Product Prototyping & Testing: Design, build, and evaluate hardware prototypes for accuracy, reliability, and security. We Are Looking For Machine Learning Engineers with expertise in computer vision, biometric recognition, 3D reconstruction, or anti … techniques. Embedded developers experienced with Yocto, deploying on embedded systems, or working with Trusted Execution Environments Electronics Engineers experienced with either sensor systems, power optimisation, PCB design, tamper prevention, penetration testing. Manufacturing Engineers with knowledge of secure manufacturing processes, or experience in component sourcing. MPC & ZKP Engineers skilled in designing privacy-preserving protocols for biometric verification or secure enclave More ❯