. Experience in scoping penetration testing assessments. Strong knowledge of security testing methodologies and frameworks (eg, OWASP, NIST). Proficiency with industry-standard tools (eg, Burp Suite, Nmap, Metasploit, KaliLinux). Excellent written and verbal communication skills. O ne of the following qualifications is essential: OSCP, Crest CRT, ECPPT, GPEN, CRTO or equivalent. Experience with red teaming More ❯
At least 2+ years of experience in penetration testing. Demonstrable skills in the Penetration Testing/Ethical Hacking field. In-depth knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience with web application and network pen testing methodologies. Proficiency in using penetration testing tools … such as BurpSuite Pro, Nmap, and Nessus. Familiarity with KaliLinux and the associated penetration testing tool suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag. Excellent communication and technical report writing skills. Eligibility to live and work in the UK (please note we are unable to provide VISA sponsorship). Nice to More ❯
least 1-2 years of experience in penetration testing. Demonstrable skills in the Penetration Testing/Ethical Hacking field. In-depth knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience with web application and network pen testing methodologies. Proficiency in using penetration testing tools … such as BurpSuite Pro, Nmap, and Nessus. Familiarity with KaliLinux and the associated penetration testing tool suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag. Excellent communication and technical report writing skills. Eligibility to live and work in the UK (please note we are unable to provide VISA sponsorship). Nice to More ❯
people who have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g. … AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, KaliLinux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in designing or adapting course material More ❯
people who have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g. … AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, KaliLinux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in designing or adapting course material More ❯
CWE, CVSS scoring etc.) Strong experience communicating to stakeholders of varying technical skill levels Your experience should include: Using offensive security tooling, including tools such as Burp Suite, Kali, Metasploit and such Scripting including the use of python, Powershell, bash or Javascript Securing networks, hosts, web applications and cloud native deployments Working with toolsets such as: vulnerability management, firewalls More ❯