South East London, London, United Kingdom Hybrid / WFH Options
4SQUARE RECRUITMENT LTD
operating systems (Windows, Linux), and common infrastructure vulnerabilities. Strong experience in web application penetration testing (OWASP Top 10). Proficiency with common penetration testing tools (e.g., Burp Suite Pro, Metasploit, Nmap, Cobalt Strike, etc.). Excellent written and verbal communication skills, with a proven ability to write detailed technical reports. A proactive and self-motivated attitude, capable of working More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
operating systems (Windows, Linux), and common infrastructure vulnerabilities. Strong experience in web application penetration testing (OWASP Top 10). Proficiency with common penetration testing tools (e.g., Burp Suite Pro, Metasploit, Nmap, Cobalt Strike, etc.). Excellent written and verbal communication skills, with a proven ability to write detailed technical reports. A proactive and self-motivated attitude, capable of working More ❯
technologies (AWS Platform, Azure Platform, Google Cloud) • Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerability assessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetration testing, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must meet ALL of the below criteria. The candidate must: • Have More ❯
in the above-mentioned areas of responsibility Advanced knowledge and experience in application, network, and cloud security testing Proven knowledge and experience with penetration testing tools (e.g., Burp Suite, Metasploit, Nmap, Kali Linux, Wireshark, etc.) and scripting experience for automation (Python, PowerShell, Bash, etc.) Strong knowledge and experience with the OWASP Top 10, the MITRE ATT&CK framework, and More ❯
At least 4 years of experience in offensive security roles, including penetration testing, red teaming, and application security testing. Hands-on experience with penetration testing tools (e.g., Burp Suite, Metasploit, Kali Linux, Cobalt Strike) and custom scripting for security testing. Proven expertise in identifying and exploiting vulnerabilities in applications, including web applications, mobile apps, APIs, and cloud platforms. Experience More ❯
. 2+ years as a CTL and 3+ years of penetration testing experience. Strong knowledge of Active Directory, infrastructure, and cloud security. Proficiency with tools like Burp Suite, Nmap, Metasploit, and Impacket. Excellent written and verbal communication skills. Desirable Certifications: OSCP, OSEP, CRTO. Scripting with Python, Bash, or PowerShell. Experience in red or purple teaming. Other Requirements UK residency More ❯
of relevant work experience. • Experience in penetration testing and/or red teaming. • Knowledge of tools used for offensive security testing such as Kali Linux, Cobalt Strike, NMAP, Wireshark, Metasploit, Burp suite, Bloodhound, PowerShell Empire, Sqlmap, etc. • Experience in shell scripting or automation of simple tasks using Perl, Python, or Ruby. • Experience developing, extending, or modifying exploits, shellcode, or More ❯
Experience in manual penetration testing, particularly in web and mobile applications.Strong understanding of security frameworks likeOWASP Top 10 and NIST Standards.Proficiency in using security tools like Burp Suite, ZAP, Metasploit, Checkmarx, andAppScan.Hands-on experience with DAST and SAST tools such as IBM AppScan, HP WebInspect, andAcunetix for vulnerability assessments.Practical experience with AWS services(EC2, S3, KMS, RDS) and security More ❯
integrated network solutions using Linux and traditional appliance network devices. DESIRED SKILLS: • Scripting including Python, Bash and Perl and frameworks like Ansible. • Understanding of Linux network security tools (e.g., Metasploit, Netcat, Nmap, iptables, BurpSuite, IDS, SELinux, etc.). • Experience monitoring threats via a SIEM console such as Solarwinds, Cisco Network Analysis Module (LogRhythm/Splunk preferred). • Experience performing More ❯
reports. REQUIRED SKILLS: • Working in Linux operating systems, including Debian and RedHat based distributions, such as CentOS, Rocky, Fedora, Ubuntu and Kali • Experience working Linux network security tools (i.e. Metasploit, Netcat, BurpSuite, NMAP, IPTables and SELinux, etc.) • A deep understanding of networking protocols and analysis using wireshark, tcpdump or other similar tools • Understanding of wireless (WiFi/Bluetooth) technology More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Marlin Selection
Security Gateway Menlo CASB Cisco Secure Access Cisco Umbrella Cisco ASA KnowBe4 Digicert Certificates and Microsoft Certificate Services Ivanti or Automox patching AppCheck or Tenable WAS Kali Linux (NMAP, Metasploit, BurpSuite, John etc) Desired Education: CISM, MS SC100, 200 and 900, OSCP or other penetration testing qualifications. Industry: Financial services, SOC, Pentesting is desirable Personal Skills: Excellent inter-personal More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Cyber Guarded Ltd
Title of Practitioner, Principal or Chartered in the Security Testing Specialism. Strong working knowledge of networks, Linux/Windows, and web technologies Experience with tools such as Burp Suite, Metasploit, Kali Linux, and Nessus Excellent problem-solving, communication, and reporting skills What We Offer Hybrid working – home-based with 2 days per week in our Belfast office or based More ❯
Rome, New York, United States Hybrid / WFH Options
Gridiron IT Solutions
security controls Knowledge of cyber threats and how to appropriately harden a system to prevent them Knowledge of vulnerability assessment tools, including Kali Linux, Wireshark, Tripwire, Burp Suite, and Metasploit TS/SCI clearance Master's degree OSCP, CISSP, CASP, Red Hat CSA, or GPEN Certification Clearance: Applicants selected will be subject to a security investigation and may need More ❯
or more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and More ❯
or more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and More ❯
or more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and More ❯
or more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and More ❯
experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and vulnerability analysis using both open-source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack. 4. Demonstrated experience analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cyber security vulnerabilities. More ❯
as OSCP, CEH, CISSP, or GPEN. Experience: Prior experience in a DoD or intelligence community environment is highly desirable. Knowledge: Familiarity with offensive security techniques and frameworks, such as Metasploit or Cobalt Strike. More ❯
Proactive interest in emerging technologies and techniques related to penetration testing. • Proven ability to perform computer network vulnerability assessment and penetration testing. • Proficient in tools such as Nmap, Wireshark, Metasploit, Canvas, Kismet, Burp Suite, Kali Linuxetc. • Understanding of operating systems (MaxOS, Windows, Linux) and how clients/servers are built and secured. • Ability to research, prioritize, problem solve, synthesize … security appliances Web Penetration Testing: • Common web application vulnerabilities like XSS, CSRF, Command Injection, SQLi, single sign-on limitations, etc. Tools: • Proficiency in any of the following: PowerShell Empire, Metasploit Framework, Cobalt Strike, Burp Suite, Canvas, Kali Linux, IPTables, Sysinternals, A/V evasion methodologies, exploit development. Certifications: • Advanced GIAC and/or (ISC)2 network/cyber security More ❯
. Strong understanding of TCP/IP, DNS, HTTP/S, and other core networking protocols. Experience with tools such as Splunk, Wireshark, IDS/IPS, Ghidra, IDA Pro, Metasploit, or similar. Preferred Qualifications: Prior experience supporting DoD or IC cyber missions. Certifications such as OSCP, GREM, GCIA, or CEH. Familiarity with SIGINT operations and legal/compliance frameworks. More ❯
Masters degree and 10 years of industry experience) OR equivalent combination of education and experience. In-depth knowledge of exploitation frameworks, reverse engineering tools, and offensive cyber techniques (e.g., Metasploit, Cobalt Strike, IDA Pro, Ghidra). Familiar with Scaled Agile Framework (SAFe). Facilitate interactions between all stakeholders and understand team needs, fostering constant engagement with stakeholders to understand More ❯