London Jobs |
Manchester Jobs |
Liverpool Jobs |
Nottingham Jobs |
Birmingham Jobs |
Cambridge Jobs |
Glasgow Jobs |
Bristol Jobs |
Wales Jobs |
London Jobs |
Manchester Jobs |
Liverpool Jobs |
Nottingham Jobs |
Birmingham Jobs |
Cambridge Jobs |
Glasgow Jobs |
Bristol Jobs |
Wales Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Bristol |
Education | Not Mentioned |
Salary | Competitive salary |
Industry | Not Mentioned |
Functional Area | Not Mentioned |
Job Type | Permanent , full-time |
This is a highly rewarding and hands one role with exposure across both traditional and cutting edge enterprise IT as well as bespoke Operational Technology systems with a clear and defined pathway to achieve your work at will see you lead and deliver insolving customer problems in an agile, innovative and team centric manner.Skills, Qualification & Knowledge Required:Excellent report writing skills for both technical and non-technical audiences. At least one of the following certifications such as CREST CCSAS, CRTO, OSED.CRTO2, CRTP, CRTE.Broad understanding of various penetration specialties from infrastructure (inc Active Directory) to applications, cloud testing and ICS/SCADA platforms.Experience of and ability to manage multiple stakeholders and their needs with empathy Experience of using a C2 application such as Mythic, Posh C2, Havoc or COBALT SRIKE, Sliver.Solid understanding of current OPSec methodologies, and exploit development.Demonstrable experience within Red Team engagements, ideally with a year leading on engagements and contributing to team development.CHECK experience and ideally a CHECK Team Leader.Demonstrable ability in deriving security requirements from functional objectives with limited knowledge of the underlying solution and customer/team direction.Extensive ability leading in the breaking down, at pace of large functional solutions into simpler constituent parts.Confident ability in communicating why a large functional system requires a given security wrapper in a way best suited to a given stakeholder.Varied experience and technical depth in either network, application or system security controls in their design and the risks they mitigate.By clicking here you are agreeing to our T&Cs #J-18808-Ljbffr