and output risk assessments and vulnerability assessments to identify potential weaknesses in the organisation's systems, processes, infrastructure, supply chain and employee susceptibility to socialengineering techniques. Collaborate with internal teams to develop and implement appropriate controls and measures to mitigate identified risks and vulnerabilities. Conduct thorough and more »
communication, presentation and writing skills. Expertise in both offensive and defensive security concepts. Bachelor’s degree or higher with a concentration in computer science, engineering, maths, IT, or equivalent skills and experience. Demonstrable knowledge in the following areas: Windows and/or *nix administration within client and server architecture. … application layer protocols, HTTP/S, DNS, SSH, etc. Active Directory, Microsoft Entra and related authentication/authorization technologies. Modern attack strategies that use socialengineering and technological abuse primitives. Utilizing and customizing a variety of C2 frameworks and offensive toolkits used to deliver Red Team Operations as more »
cloud services, APIs, wireless, and mobile applications. You will engage in leading end-to-end client projects, employing your expertise in red teaming and socialengineering to identify and mitigate potential threats. Your daily activities will involve the adept use of leading penetration testing tools such as Kali more »
development and implementation of Azure security related technologies An excellent understanding of security approaches: ISMS, risk analysis and assessments, CIA triad, attack vectors including socialengineering, confidentiality and cyber security Dedicated and responsible with a strong commitment to the assigned task with the ability to work under pressure more »
out! https://www.nccgroup.com/uk/The Opportunity The successful candidate will be involved in each aspect of the attack chain from socialengineering and initial access, evading best-in-class EDR products, through lateral movement and achieving objectives set by the client. Operational Security and more »
planning, development and implementation of Azure security related technologiesAn excellent understanding of security approaches: ISMS, risk analysis and assessments, CIA triad, attack vectors including socialengineering, confidentiality and cyber securityDedicated and responsible with a strong commitment to the assigned task with the ability to work under pressure, to more »
and output risk assessments and vulnerability assessments to identify potential weaknesses in the organisation's systems, processes, infrastructure, supply chain and employee susceptibility to socialengineering techniques. Collaborate with internal teams to develop and implement appropriate controls and measures to mitigate identified risks and vulnerabilities. Conduct thorough and more »
rewards for outstanding performance. Responsibilities: Perform regular penetration tests on web applications, infrastructure, cloud, API, wireless, and mobile applications. Contribute to Red Team and socialengineering testing. Write detailed reports and present test findings to clients. Consult clients on required remedial actions. Assist with the development of junior … with programming languages, databases, and IoT. Knowledge of containerisation technologies such as Docker. Experience with Attack & Threat Modelling. Familiarity with Red Team testing and socialengineering attack methodologies. Working knowledge of CobaltStrike. Experience with bug bounty programs and vulnerability disclosure policies. Education, Training, and Experience: Bachelor's degree more »
Greater London, Grange, United Kingdom Hybrid / WFH Options
Remarkable Jobs
Testing Consultant (Pen Tester) Responsibilities: Perform regular penetration tests on web applications, infrastructure, cloud, API, wireless, and mobile applications Contribute to Red Team and socialengineering testing Write reports and present test findings to clients Consult clients on required remedial actions Assist in developing junior team members Help … Hands-on experience with programming languages, databases, and IoT Knowledge of containerization technologies (e.g., Docker) Experience with Attack & Threat Modeling Red Team testing and socialengineering methodologies Working knowledge of CobaltStrike Experience with bug bounty programs and vulnerability disclosure policies Security Testing Consultant (Pen Tester) Education, Training, and more »