3 of 3 Remote/Hybrid Social Engineering Jobs in the UK

SC cleared. pen tester

Hiring Organisation
PROCHECKUP LIMITED
Location
United Kingdom
across network infrastructure, web applications, and mobile platforms for enterprise clients Perform vulnerability assessments, threat modelling, and risk analysis across diverse technical environments Execute social engineering assessments and physical security testing Produce detailed scoping documents and executive-level penetration testing reports aligned with CREST and NCSC standards Lead … Advisory : PCI DSS, GDPR, ISO27001 implementations and certifications Incident Response & Forensics : 24/7 emergency response and digital evidence analysis Specialist Services : SCADA testing, social engineering, business continuity planning Based in Portsmouth and operating across the UK and internationally, ProCheckUp punches above its weight against larger consulting firms ...

Red Team Operator

Hiring Organisation
Searchability NS&D
Location
Gloucestershire, England, United Kingdom
full scope red team operations, simulating realistic threat actors across a range of environments. This includes network infrastructure, cloud, Active Directory, web applications, and social engineering campaigns. You will work across the full attack lifecycle, from initial access through to post exploitation, using advanced techniques to emulate real … processed in line with this vacancy. KEY SKILLS Red Team, Offensive Security, Penetration Testing, C2 Frameworks, Active Directory, EDR Evasion, Post Exploitation, Cloud Security, Social Engineering, CBEST, TIBER ...

Offensive Security Engineer

Hiring Organisation
Searchability NS&D
Location
Cheltenham, Gloucestershire, England, United Kingdom
Employment Type
Full-Time
Salary
£80,000 - £100,000 per annum
full scope red team operations, simulating realistic threat actors across a range of environments. This includes network infrastructure, cloud, Active Directory, web applications, and social engineering campaigns. You will work across the full attack lifecycle, from initial access through to post exploitation, using advanced techniques to emulate real … conjunction with this vacancy only. KEY SKILLS Red Team, Offensive Security, Penetration Testing, C2 Frameworks, Active Directory, EDR Evasion, Post Exploitation, Cloud Security, Social Engineering, CBEST, TIBER ...