Manchester, Lancashire, England, United Kingdom Hybrid/Remote Options
4Square Recruitment Ltd
What You’ll Bring 2–5 years’ experience in ethical hacking or penetration testing. Strong understanding of OWASP, web, and infrastructure testing. Experience with Burp Suite, Nmap, Nessus, Qualys, Metasploit, Kali Linux. Familiarity with cloud security (AWS, Azure, or GCP). Confident communicator with client-facing experience. Bonus points for: Public sector testing experience. Code review skills (Python, Java More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Digital Waffle
Experience 3-5+ years' professional penetration testing/offensive security experience Strong understanding of enterprise infrastructure, AD security, networking, and protocols Proficiency with tools such as Nmap, Nessus, Metasploit, BloodHound, Burp Suite, Kali/Linux toolsets Solid track record of delivering infrastructure pentests end-to-end Excellent communication skills, including producing business-focused reporting Preferred Qualifications CHECK Team More ❯
Greater Bristol Area, United Kingdom Hybrid/Remote Options
Maxwell Bond
cybersecurity operations. Understanding of core security principles and common vulnerabilities (e.g. OWASP Top 10, network security, privilege escalation). Hands-on experience with security tools (Nmap, Wireshark, Burp Suite, Metasploit, etc.) or home lab environments. Motivation to develop towards professional certifications such as OSCP, CRT, or similar. Eligibility for SC and DV clearance – British citizenship is required. What’s More ❯
and test zero-day vulnerabilities, malware, and exploit techniques. Develop custom exploits, scripts, and tools for penetration testing. Reverse-engineer applications and analyze binary security flaws. Utilize frameworks like Metasploit, Burp Suite, Nmap, Kali Linux, and Cobalt Strike. Reporting & Compliance Document findings, risk levels, and remediation recommendations in penetration testing reports. Ensure compliance with security frameworks (OWASP, NIST, ISO … Experience: 3+ years in penetration testing, red teaming, or security assessments. Certifications (Preferred): OSCP, OSWE, GPEN, CEH, CRTP, or equivalent. Technical Proficiency: o Strong knowledge of offensive security tools (Metasploit, Burp Suite, Nessus, Wireshark, etc.). o Experience in web, API, network, mobile, and cloud penetration testing. o Proficiency in Python, Bash, PowerShell, or C for exploit development. o More ❯
of experience in at least one of the following areas: Incident detection and response Malware analysis Cyber forensics Experience with at least 3 of the following tools: Kali Linux Metasploit Burp Suite Nmap Cobalt Strike Tenable Nessus WebInspect Scuba AppDetective Must hold one or more certifications: GPEN, GWAPT, GISF, GXPN, OSCP, OSCE, OSWP, OSEE, CISSP, or CEH. Preferred Qualifications More ❯
tool development What You’ll Bring 2+ years’ experience in penetration testing or vulnerability assessment CHECK, CREST, or equivalent certification Strong technical understanding of networks, OS, and security tools (Metasploit, Burp Suite, Nmap, etc.) Excellent communication and problem-solving skills Nice to Have Coding/scripting (Python, Bash, C#) Web/mobile app testing, reverse engineering, or malware analysis More ❯
experience in software and/or firmware testing Engineering degree in Software, Computer Science, Cybersecurity or equivalent demonstrated knowledge. Proficiency with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Strong understanding More ❯
experience in software and/or firmware testing Engineering degree in Software, Computer Science, Cybersecurity or equivalent demonstrated knowledge. Proficiency with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Strong understanding More ❯
or more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and More ❯
or more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and More ❯
or more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and More ❯
or more of the following certifications: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) Offensive Security Exploit Developer (OSED) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and More ❯
Belfast, Northern Ireland, United Kingdom Hybrid/Remote Options
Cyber Guarded Ltd
Title of Practitioner, Principal or Chartered in the Security Testing Specialism. Strong working knowledge of networks, Linux/Windows, and web technologies Experience with tools such as Burp Suite, Metasploit, Kali Linux, and Nessus Excellent problem-solving, communication, and reporting skills What We Offer Hybrid working – home-based with 2 days per week in our Belfast office or based More ❯
and/or firmware testing Engineering degree or equivalent experience in Software, Computer Science, Cybersecurity, or equivalent proven knowledge. Proficiency with tools such as Burp Suite, OWASP ZAP, Nessus, Metasploit, Wireshark, Nmap, Fortify, Checkmarx. Knowledge of scripting languages such as Python, JavaScript, Bash, or PowerShell. Understanding of encryption algorithms, key management, and secure protocols (TLS, SSH, etc.) Detailed understanding More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Digital Waffle
penetration testing Strong knowledge of attacker frameworks (e.g., MITRE ATT&CK, NIST adversary simulation guidelines) Highly proficient with red team tools and techniques (e.g., Cobalt Strike, Mimikatz, Sliver, BloodHound, Metasploit etc.) Hands-on experience with Active Directory attacks , privilege escalation , lateral movement , and stealth operations Ability to conduct social engineering and phishing campaigns Strong understanding of networking, Windows/ More ❯
z2bz0 years in penetration testing, red teaming, or offensive security across networks, cloud, AD, and web apps. Offensive security tooling - expertise with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITRE ATT&CK mapping for both technical and executive stakeholders. Contract Details More ❯
z2bz0 years in penetration testing, red teaming, or offensive security across networks, cloud, AD, and web apps. Offensive security tooling - expertise with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap, ScoutSuite, Pacu, etc. Reporting expertise - ability to produce professional pentest reports with CVSS scoring and MITRE ATT&CK mapping for both technical and executive stakeholders. Contract Details More ❯
Troy, Michigan, United States Hybrid/Remote Options
N1 Discovery, LLC
certifications such as MCSA, CCNA, Net+, Security+, or equivalent Experience with variety of cybersecurity tools and vendors (i.e., CrowdStrike, TrendMicro, Velociraptor, Splunk, Elastic, Tenable Nessus, security-based Linux distros, Metasploit, Burp Suite, etc.) Experience with varied network environments and critical infrastructure solutions (i.e., FortiGate firewalls, Cisco switches, Palo Alto, Microsoft servers, VMware, Hyper-V, Azure, Microsoft 365, AWS, Duo More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
Hands-on experience in penetration testing or IT Health Check delivery Eligibility to obtain and maintain UK security clearances. Familiarity with common tools such as Burp Suite, Nmap, Nessus, Metasploit, etc. Understanding of network protocols (TCP/IP, OSI model) and common web application Current penetration testing qualification such as CREST Practitioner Security Analyst (CPSA), Crest Registered Tester (CRT More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitmen
Hands-on experience in penetration testing or IT Health Check delivery Eligibility to obtain and maintain UK security clearances. Familiarity with common tools such as Burp Suite, Nmap, Nessus, Metasploit, etc. Understanding of network protocols (TCP/IP, OSI model) and common web application Current penetration testing qualification such as Crest Practitioner Security Analyst (CPSA), Crest Registered Tester (CRT More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
Hands-on experience in penetration testing or IT Health Check delivery Eligibility to obtain and maintain UK security clearances. Familiarity with common tools such as Burp Suite, Nmap, Nessus, Metasploit, etc. Understanding of network protocols (TCP/IP, OSI model) and common web application Current penetration testing qualification such as CREST Practitioner Security Analyst (CPSA), Crest Registered Tester (CRT More ❯
Attack Simulation (BAS) platforms Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modelling Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing threat reports and briefings Business level fluency in English Japanese, Cantonese, Mandarin language would be advantageous due to the culture More ❯
Attack Simulation (BAS) platforms Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modelling Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing threat reports and briefings Business level fluency in English Japanese, Cantonese, Mandarin language would be advantageous due to the culture More ❯
Attack Simulation (BAS) platforms Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modelling Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing threat reports and briefings Business level fluency in English Japanese, Cantonese, Mandarin language would be advantageous due to the culture More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Vanquish Technologies Limited
and validate threat scenarios. Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetration testing tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8+ years of experience in threat intelligence, cybersecurity More ❯