Cyber Security Trainer / Pen Testing Trainer

A Penetration Testing / Pen Testing / Cyber security trainer role with one of the UK’s leading Cyber Security Consultancies.

The right candidate will either be a former penetration tester looking to move into a penetration testing / ethical hacking trainer position or be a cyber security trainer / cyber security course instructor / leader with a strong understanding of the penetration testing / ethical hacking space.

The role will see the appointed trainer be responsible for delivering training courses to this cyber security consultancies client booked, you will have excellent interpersonal skills and a clear passion for cyber security.

Gold futures trading blog


Our motto is; No job is too big or too small. Our customers know that we will go the extra mile in order to satisfy their needs and wants. Our long-term customer relationships are a reliable proof.


We take great pride in delivering the exact quality our customers ask for and we handpick the best products.

Delivery reliability

Knowing the importance of our customers’ requirements, we work actively to ensure speed and reliability in our deliveries.


Sustainability is a top priority. We are fully aware of the impact on nature and future generations, our activities may have and we work actively to keep the oceans’ balance.

The SecurityOrb Show – An Interview with vThreat Founder Marcus J. Carey

Cyber-attack simulation is the practice of testing an organization’s network security and incident response preparedness on-demand and without exploits to determine an organization’s security posture.

Cyber-attack simulation differs from many of the current and already practiced security controls such as Penetration Testing (pentesting), security assessment and table-top exercises. For example, pentesting makes use of exploitation code whereas cyber-attack simulation does not. In addition, cyber-attack simulation differs from a security assessments since the breach method used may not be from an actual vulnerability, it maybe in policy deficiencies or human-error. While in a table-top exercise a rehearsal of what your organization will do in the case of an emergency is conducted, but in a cyber-attack simulation it replicates the actions of an attacker. had the opportunity to interview Marcus j. Carey, the founder of vThreat, a cyberattack simulation start-up that offers its cyberattack simulation as a software-as-a service (SaaS) application on The SecurityOrb Show. Carey stated, “Vthreat offers its service on-demand, you can conduct an attack simulation anytime. You do not have to wait annually or quarterly as with some of the other services.”

vThreat has a free tier as well as paid tier delivery for its cyber-attack simulation service. One key attribute of vThreat’s cyber-attack simulation offering pertains to the non-use of software agents on organizational assets, instead they make use of the cloud or java-script snippets.

Listen to the full interview with vThreat Founder, Marcus J. Carey here.

If you will like to meet Marcus to obtain more information about his Cyber-Attack Simulation service, he will be attending the upcoming ShmooCon 2016 on Jan. 15 to 17 at the Washington Hilton Hotel in Washington, DC.

OSSEC-Security Engineer-Java, Penetration Testing/Strong Coder.

Join an Exciting and Rapidly Growing Enterprise Security Technology Company.  Our company started with a vision to revolutionize data processing. We formed a great team and built a great product.  We always strive to make it better and we are working across the industry to build our capacity to serve our customers and partners.

Candidates will work alongside experienced innovators who have run massive scale systems in highly critical production environments. The position includes conducting external & internal penetration testing, social engineering assessments, web application assessments, and other security assessments.

Job Responsibilities

  • Work directly with our personnel to perform penetration tests of their systems/applications to identify vulnerabilities and flaws and classify the risk of items found<span
  • Create and conduct social engineering assessments using various techniques and delivery methods
  • Produce thorough reports detailing the findings of the services-rendered and provide recommendations to meet information security and compliance standards

Desired Skills and Experience

  • Network penetration testing methodologies
  • Web application penetration testing methodologies
  • Penetration testing tools (NMAP, burp, Metasploit, Netcat, w3af, etc.)
  • Functional pen test coding/scripting skills
  • Social engineering techniques
  • Password cracking
  • Wireless security testing
  • Exploit payload creation/customization
  • Information security principles, procedures, and controls.
  • Information technology including OS (Linux), network technology, and network administration, Amazon Web Services (AWS)
  • Possesses excellent verbal and written communication skills
  • Is comfortable working autonomously as well as in a group environment
  • CISSP, GPEN, GWAPT, CEH, and/or other information security-/penetration testing-related certifications are a plus but not a requiremen
  • Work with internal software developers
  • Develop write and support testing and penetration code
  • Develop security blogs for internal and external communities
  • Speak at security conferences

Security Engineer – Penetration Testing – Singapore


job type
S$ 5,000 per month
reference number

apply now

job description

in addition, you will:

  • Will be involved in the penetration testing of products across thick clients, internet, mobile tablets, web applications and such
  • For infrastructure, it will involve standard vulnerability testing , stress resistance

skills & experience required

To ensure the success of the role, you should have the following:

  • 5+ years of experience in Application or Infrastructure penetration testing
  • Security certification such as GPEN, GWAPT, GXPN and related is highly preferred but not mandatory
  • Experience working around pen testing tools such as NMAP, SSLmap, SQLmap
  • At least a degree in IT and relevant fields

Don’t miss the chance to obtain an attractive remuneration package of up to S$150K depending on your seniority and experience.

To apply online, please click on the appropriate link. Alternatively please email CV to Kenneth at



Penetration Testing, Vulnerability Assessment
apply now

Make counterfeit money pass pen test

Services for Constituents


Parliament Hill Tours

To arrange a Parliament Hill Tour, you can call our Ottawa office at 613-992-9723 click here to request a tour online.


Question Period Tickets

If you are planning to visit Parliament Hill and would like to attend Question Period, please contact our office at 613-992-9723 or click here to request tickets online.


Celebratory Greetings

If you would like to receive a celebratory message on the occasion of a birthday, anniversary, or other celebration, please click here to request a greeting online.


Send Feedback

Feel free to leave feedback on our website, our services, or things we can do to help you in the community through our online feedback form or by calling 705-941-2900.


Canadian Flags and Pins

If you would like to receive a Canadian flag or pins, please contact the constituency office at 705-941-2900.


Join the Discussion

See our Facebook page for more updates and to leave feedback!

Pen Test Hackfest Summit & Training

Summit Days: Nov 2 – Nov 3, 2016
Course Days: Nov 4 – Nov 9, 2016

Special Offers for All Attendees!
This offer reduces the Summit registration fee from $1,595 to $1,095 when purchased in conjunction with a full price 4-6 day course a savings of $500! The discount is automatically applied when the Summit and a qualifying course are both selected during registration.

NoteEarly bird course discounts do not apply with this bundle offer.