Cyber Security Consultant - North East

Penetration Tester (PenTest) - IT
Ref: 242 Date Posted: Friday 03 May 2024

Description: Our client is looking for enthusiastic security consultants to join their fast-growing consultancy, based in the North East.

 

A typical day in the life of a security consultant would involve testing applications/infrastructures and assisting sales with scoping and writing reports. They cover a wide range of services from applications (web, mobile, API), infrastructure, social engineering (phishing, vishing, physical intrusion) and cloud testing. We offer consultants the opportunity to test over all areas but typically specialise in one.
Bonus points for bringing vulnerable applications or virtual machines that you have created yourself.

 

Responsibilities:

  • Performing Penetration Tests
  • Writing High Quality Reports
  • Scoping Work
  • Client Interaction

Cultural & work environment

  • Your diary will be constantly changing in a high paced work environment. In non-covid times, infrastructure testers are likely to be travelling regularly around the UK and sometimes abroad.
  • Some travel is also required for application specialists.
  • You will be offered support from all consultants, and you will be expected to do the same once you have experience.

Profiles: Experience in one, or both of the following areas:

Application Testing

  • Fluent with burp suite professional
  • An understanding of core networking protocols (TCP/IP, UDP, SSH, FTP etc.)
  • Confident with creating basic CRUD (create, read, update, delete) style applications using HTML, CSS, Javascript and any preferred backend language.
  • Ability or willingness to learn scripting in one or more of the following languages: Ruby, Python, Go
  • Excellent written skills
  • CTM/CTL desirable

 

Infrastructure Testing

  • Proven experience with Windows/Linux Operating systems and applications
  • Experience with specific testing tools such as nmap/metasploit/kali Linux suite of tools etc
  • Understanding of networking including subnets
  • Willingness to learn enumeration and exploitation techniques as part of a network security assessment
  • Excellent written skills
  • CTM/CTL desirable

 

To register your interest, click below. All suitable candidates will be contacted to arrange a meeting.



Download Job Profile