We are currently seeking a highly skilled and results-oriented Penetration Tester/Ethical Hacker with at least 5 years of hands-on penetration testing/ethicalhacking experience . This role is office-based with occasional travel to client sites. Please do not apply if you don't have at least one of the following qualifications More ❯
that keep them resilient and ahead of cyber threats. The Role We are looking for an experienced Penetration Tester to join our team. You will conduct security assessments and ethicalhacking activities to identify vulnerabilities in client systems. This role requires a deep understanding of attack techniques, security frameworks, and risk mitigation strategies. Key Responsibilities Conduct penetration testing … Develop security testing methodologies and improve existing processes. Collaborate with clients to provide security recommendations and mitigation strategies. Stay up to date with the latest security threats, exploits, and hacking techniques. Assist in security awareness training and red team exercises. Provide clear and actionable reports to both technical and non-technical audiences. Requirements Proven experience in penetration testing and … ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP, OSCE, CEH, or similar are highly desirable. Understanding of regulatory compliance standards (ISO 27001, GDPR, NIST, etc.). Excellent problem-solving More ❯
Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of Vulnerability Scanning, Management, and EthicalHacking (Penetration Testing). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work in a 24/ More ❯
or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Education Requirements & Experience Minimum of More ❯
as well as policies and regulations. • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH) • General technical certifications such as CompTIA Network+, Security+, Linux+ More ❯
management, and encryption. Understanding of security frameworks such as NIST, CIS Controls, or ISO 27001. Formal industry recognised Cyber Security qualification such as ISC2 CISSP, ISC2 CISM or Certified Ethical Hacker (CEH) (desired). Security and Network technology experience. About us: We are an international engineering and construction company delivering state-of-the-art infrastructure and buildings projects for More ❯
Management Framework (RMF) process. • Possession of excellent customer service and organization skills. • Possession of excellent oral and written communication skills. Preferred Certifications: • Certified Information Systems Security Professional (CISSP) • Certified Ethical Hacker (CEH) • Certified SCADA Security Architect (CSSA) Related Control Systems. Abilities: • Exposure to computer screens for an extended period of time. • Sitting for extended periods of time. • Reach by More ❯
degree in Computer Science, IT, Cybersecurity, or Data Science from an accredited University; or Certifications: Certified Information Systems Security Professional (CISSP); or CompTIA Advanced Security Practitioner (CASP+); or Certified Ethical Hacker (CEH); or CompTIA Security+ CE Desired Qualifications: Professional project management certification, such as Project+, CAPM, PMP, or similar. Experience planning, designing, engineering, testing, deploying, and maintaining large-scale More ❯
tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we offer: At More ❯
findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers These Qualifications Would be Nice to Have: JCAC (Joint Cyber Analysis Course), Network+, Security+, Certified Ethical Hacker (CEH), Microsoft Networking, Computer Network Administrator (CNA), Certified Information Systems Security Professional (CISSP), Information Systems Security Engineering Professional (ISSEP), Certified EthicalHacking, and Certified Information Systems More ❯
experience with the ability to lead a team Proven expertise in Red Team operations, threat emulation, and offensive security. Strong understanding of adversary TTPs, MITRE ATT&CK framework, and ethicalhacking principles. Excellent communication skills with the ability to convey complex technical concepts to non-technical stakeholders. Certifications or equivalent advanced certification as recognized under DoD 8140, (one More ❯
years of practical, hands-on Cybersecurity experience Proven analysist in Red Team operations, threat emulation, and offensive security Strong understanding of adversary TTPs, MITRE ATT&CK framework, and ethicalhacking principles Excellent communication skills with the ability to convey complex technical concepts to non-technical stakeholders Certifications or equivalent advanced certification as recognized under DoD 8140, (one required More ❯
and written English communication skills. Excellent interpersonal and presentation skills. Strong analytical skills. Good understanding of network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and EthicalHacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work More ❯
required for my client based in Leeds/London - visit office 2 x per month. This is a permanent opportunity. Salary approx. £50-80k. Are you a skilled ethical hacker with a passion for uncovering vulnerabilities? My client are a fast-growing cybersecurity reseller/MSP delivering cutting-edge security solutions across multiple sectors. The Role: As the More ❯
Excellent communication skills both written and verbal. Desirable Knowledge/Qualifications: IBM QRadar, LogRhythm and/or Splunk, or other SIEM. Linux, Mac, Windows admin skills. Programming skills. Certified Ethical Hacker. CISSP. IT Security products. MSc Computer Science. Any vendor qualifications would be advantageous. Benefits of the role include: Vendor Training. Cross training to new platforms. Vendor Certification. On More ❯
communicate complex technical and programmatic information, often in the form of verbal and visual operational updates, situation reports and briefings. - Certifications Required: Security+ Continuing Education (CE) CompTIA AND, Certified Ethical Hacker (CEH) EC-Council Clearance Required: DoD Secret Security Clearance. PLEASE NOTE: The position will require a Top Secret clearance, so the ability to be processed and granted a More ❯
Bachelor's degree in Computer Science , IT, Cybersecurity, or Data Science; OR one of the following certifications: Certified Information Systems Security Professional (CISSP), CompTIA Advanced Security Practitioner (CASP+), Certified Ethical Hacker (CEH), or CompTIA Security+ CE 5+ years of hands-on experience architecting, engineering, administering, or managing enterprise IT projects in areas such as endpoints, networks, servers, virtualization, storage More ❯
Master's Degree in Cyber Security or IT-related field Certifications that demonstrate firsthand Information technology knowledge specific to the Army and OT environments are highly desirable, including: Certified Ethical Hacker (CEH) GIAC Security Essentials (GSEC) Certified SCADA Security Architect (CSSA) Information Technology Infrastructure Library (ITIL) The ideal candidate brings expertise in: Zero Trust architecture, Identity, Credential, & Access Management More ❯
analysis and recommendations. Strong understanding of compliance with Information Security laws, regulations, and policies. Preferred Certifications: CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker) CompTIA Security+ Security Qualifications: No security clearance required; Secret Clearance Preferred Must be a US Citizen Must pass a Federal Law Enforcement Background Investigation All qualified applicants will More ❯
field and must hold one of the following certifications: a. Open Source Intelligence (OSINT) certification b. GIAC Open Source Intelligence (GOSI) c. Certified Threat Intelligence Analyst (CTIA) d. Certified Ethical Hacker (CEH) e. EC Council Certified Network Defender (CND) f. EC Council Licensed Penetration Tester- (Master) (LPT-Master) g. EC Council Certified Security Analyst (ECSA) h. EC Council Certified More ❯
and Technology (NIST) Special Publication (SP) 800-37, SP 800-39, SP 800-53, SP 800-53A, SP 800-60. Certifications: Certified Information Security Manager (CISM), Certified Ethical Hacker. Pay Range: Competitive The RealmOne pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Our approach to crafting More ❯
complex networks. - Prior experience influencing internal stakeholders across organizational boundaries PREFERRED QUALIFICATIONS - Experience with programming languages such as Python, Java, C++ - CCSP (Certified Cloud Security Professional) or CEH (Certified Ethical Hacker) or CFR (CyberSec First Responder) or Cloud+ or CySA+ (CompTIA Cybersecurity Analyst) or GCED (GIAC Certified Enterprise Defender) or GICSP (Global Industrial Cyber Security Professional) or PenTest+ - Knowledge More ❯
to communicate effectively, both orally and in writing. Desired Qualifications: Bachelor's Degree in any Computer Science - related degree DIA - CMP- 2045: Privileged User Cybersecurity Responsibilities CEH (v10)- Certified Ethical Hacker Joint Network Attack Course (JNAC) OSINT Awareness "AGILE" Course SAN: GCIH SANS: Penetration+ (PEN+) Red Hat Certified Professional OSCP/E: Offensive Security Certified Professional/Expert Cisco More ❯
experience in working in CND. • Global Information Assistance Certification (GIAC) and GIAC Certified Incident Handler (GCIH). • Certification in one or more of the following: Certified Intrusion Analyst, Certified EthicalHacking (CEH) or Certified Information Systems Security Professional (CISSP) • DoD 8570.01 Information Assurance Technical 3 (IAT Level 3) certified • Foundational Cloud Certification • Must be familiar with RMF and More ❯