Click here to download our latest salary guide

THREAT RESEARCH AND PENETRATION TESTING

RECRUITING THREAT INTELLIGENCE AND PENETRATION TESTERS TO SECURE YOUR BUSINESS

As cyber threats continue to evolve, businesses are increasingly relying on threat intelligence and penetration testing to protect themselves against potential attacks. Recruiting for these specialist roles in-house can be challenging due to the complex nature of their work.

PEN TESTERS AND THREAT RESEARCHERS IN SHORT SUPPLY

Recruiting for these specialised roles requires a nuanced approach given the shortage of candidates. A successful threat intelligence analyst or penetration tester must possess a unique combination of technical expertise and analytical skills and the ability to communicate complex information to non-technical stakeholders. To recruit for these roles, a thorough understanding of the technical and non-technical requirements of the position is needed.

XCEDE’S EXPERIENCE AND RECRUITMENT CREDENTIALS IN THIS MARKET PLACE

Xcede is a reputable specialist recruiter that can assist corporations in need of permanent, contract and temporary Pen Testers and Threat Intelligence personnel. We aim to become an extension of your talent acquisition team to support you in sourcing and supplying the finest talent from the private, non-profit, and public sectors to meet the demands of your project.

XCEDE’S THREAT INTELLIGENCE AND PEN TESTING JOB VACANCIES

Our leading cyber security team offers a wide variety of Threat Research and Penetration Testing jobs at all levels including Penetration Testers, Security Analysts, Vulnerability Analysts, Cyber Threat Hunters, Incident Response Analysts, Malware Analysts, Cyber Threat Intelligence Analysts, Security Engineers and many more.

Explore our newest job openings below to see how we can help you advance your career.

Scroll to discoverscroll down

LATEST CYBER JOBS

MEET THE CYBER TEAM
Alex Candeland
Alex Candeland
Specialisms: Cyber, Threat Research & Penetration Testing, InfoSec, GRC & Vulnerabilities, Network Security & Operations
Angela Evans
Angela Evans
Specialisms: Data, Product, Software, Cloud, Cyber
Bao Trinh
Bao Trinh
Specialisms: Data, Cloud, Cyber, AI & Machine Learning, Software
Brett Marsh
Brett Marsh
Specialisms: Data Science, AI Product Management, Generative AI, AI Engineering, Product Management, UX, Software, Cyber
Connor Elliott-Grout
Connor Elliott-Grout
Specialisms: Cyber
Daniel Klein
Daniel Klein
Specialisms: Cyber, Data, Cloud
Daniel Mills
Daniel Mills
Specialisms: Cloud, Cyber, DevOps
Jamaine Agyepong
Jamaine Agyepong
Specialisms: Cyber, Data & Access Management
James Bull
James Bull
Specialisms: Networks, Cloud Engineering & Architecture, DevOps , Product Management, Cyber, InfoSec, GRC & Vulnerabilities, Network Security & Operations
Jonathan Malone
Jonathan Malone
Specialisms: Cyber, InfoSec, GRC & Vulnerabilities, Security Architecture & Engineering, Network Security & Operations
Luke Caselle
Luke Caselle
Specialisms: Cyber, InfoSec, GRC & Vulnerabilities, Network Security & Operations, Data & Access Management, Security Architecture & Engineering, Threat Research & Penetration Testing, Commercial & Support
Luke Davis
Luke Davis
Specialisms: Cyber, InfoSec, GRC & Vulnerabilities, Security Architecture & Engineering, Network Security & Operations
Maria Ioannou
Maria Ioannou
Specialisms: Data, Product, Software, Cloud, Cyber
Matt O'Hare
Matt O'Hare
Specialisms: Cyber, Networks, Network Security & Operations
Mouna Kaess
Mouna Kaess
Specialisms: Cyber, InfoSec, GRC & Vulnerabilities, Security Architecture & Engineering, Network Security & Operations
Oliver Thomas
Oliver Thomas
Specialisms: Data & Access Management, Cyber
Shakir Muhammad
Shakir Muhammad
Specialisms: Cloud, Cyber, Network Security & Operations, Networks