We believe in code reviews, pair programming, hack time, code katas, attending conferences and investing in developers to make them better. * We emphasise quality over quantity and aim to build great ...
Work in a team where we believe in code reviews, paired programming, continuous integration, hack time and investing in developers to make them better. * Operate in an environment that is fun ...
Work in a team where we believe in code reviews, paired programming, continuous integration, hack time and investing in developers to make them better. * Work in partnership with the product team to ...
The client is looking for a Senior Consultant who lives and breathes hacking and information security. You will have earned your stripes doing CHECK work in data centres and be ready to, or already ...
Certified Ethical Hacker
We are looking for an experienced growth marketeer/growth hacker to join a client of ours who are a brand activation agency. A role has come up where you will be working with one of their clients who ...
Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you ...
Company-wide Hack Days and team outings * In-house bike storage * We offer a hybrid working approach. We will discuss the latest updates with regard to remote working as part of our interview process
Be the first line of defense against any malware or hacking incidents in the organisation. * Lead and take part in various ad-hoc projects for the IT department. * Any other reasonable duties to meet ...
Professional Growth Hacker: A great social media manager knows there is so much more to success than posting and iterating. You must be a professional growth hacker who obsesses over the details
Working on high profile phone hacking litigation cases * Researching and drafting documents * Providing excellent customer care * Managing different projects and files Candidate specification: * 3 - ...
... hackers, malware, data leakage and other malicious activity. As a Software Engineer you will focus on enabling the core product, written in C / C++ for Windows and Linux to run on Apple Mac software ...
Imagine working on a diverse array of cases, including high-profile phone hacking litigation, and making a significant impact in matters of defamation, privacy, and harassment. The position also ...
Key responsibilities include working with high-profile individuals involved in phone hacking litigation and other cases involving defamation, privacy, and harassment. The role also extends to ...
Do have the ability to think like a hacker with a hands on forward thinking approach to cyber security? This is an exceptional opportunity for a technically minded Cyber Security leader to join a ...
Manage and mitigate threats to the data security, including intentional damage, deletion, unavailability, hacking and unauthorised disclosure. * Have good use of encryption and masking. * Manage ...
APIs, infrastructure, and simulate real-world hacking attempts and identify potential entry points for attackers. This involves utilizing various techniques, tools, and methodologies to exploit ...
Now with that, new methods and means of accessing data from hackers is an ever present and growing issue. Our client supplies Europe's first line of tech defense, placing cyber security professionals ...
Certified Ethical Hacker (CEH) * CompTIA Security+ * Certified Information Security Manager (CISM) What We Offer: * Competitive salary and benefits package. * Opportunities for professional ...
Review CISO's strategies to identify and address risks of hacking, cyber-attacks, and data breaches. With additional focus on data protection, risk assurance, and eradicating system vulnerabilities ...