is a hands-on role where you'll simulate advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethicalhacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce … executive reporting on cyber threats, risks, and remediation progress Collaborate with security and infrastructure teams to strengthen overall cyber resilience Skills & Experience 3+ years in penetration testing/ethicalhacking/red teaming Strong understanding of cyber threats, APTs, threat actor tactics, and exploit development Familiar with SIEM, defensive security monitoring, incident response, and detection engineering Deep knowledge … working model - 3 days in the London office. Competitive salary and benefits on offer. Apply now to take on a high-impact role in cyber security, penetration testing, and ethicalhacking at enterprise scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions
is a hands-on role where you'll simulate advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethicalhacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce … executive reporting on cyber threats, risks, and remediation progress Collaborate with security and infrastructure teams to strengthen overall cyber resilience Skills & Experience 3+ years in penetration testing/ethicalhacking/red teaming Strong understanding of cyber threats, APTs, threat actor tactics, and exploit development Familiar with SIEM, defensive security monitoring, incident response, and detection engineering Deep knowledge … working model - 3 days in the London office. Competitive salary and benefits on offer. Apply now to take on a high-impact role in cyber security, penetration testing, and ethicalhacking at enterprise scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead More ❯
London, Coleman Street, United Kingdom Hybrid / WFH Options
Deerfoot Recruitment Solutions Limited
is a hands-on role where you'll simulate advanced cyber attacks, test defences, and influence enterprise-level security strategy. Key Responsibilities Lead red team operations , penetration testing, and ethicalhacking engagements Plan and deliver cyber attack simulations, vulnerability assessments, and social engineering tests Work with SOC teams on purple team exercises to enhance detection and response Produce … executive reporting on cyber threats, risks, and remediation progress Collaborate with security and infrastructure teams to strengthen overall cyber resilience Skills & Experience 3+ years in penetration testing/ethicalhacking/red teaming Strong understanding of cyber threats, APTs, threat actor tactics, and exploit development Familiar with SIEM, defensive security monitoring, incident response, and detection engineering Deep knowledge … working model - 3 days in the London office. Competitive salary and benefits on offer. Apply now to take on a high-impact role in cyber security, penetration testing, and ethicalhacking at enterprise scale. This role could suit individuals who have held the following role titles: Penetration Tester, Red Team Specialist, Lead Red Team Operator, Red Team Lead More ❯
degree in computer science, Information Security, or a related field. Equivalent work experience may be considered in lieu of a degree. Certifications Preferred Offensive Security Certified Professional (OSCP) Certified Ethical Hacker (CEH) GIAC Penetration Tester (GPEN) Offensive Security Web Expert (OSWE) Certified Secure Software Lifecycle Professional (CSSLP) GIAC Web Application Penetration Tester (GWAPT) Experience At least 4 years of More ❯
to contribute to a growing and innovative academic program. Responsibilities: Instruction and curriculum Delivery Course Instruction: Teach undergraduate or graduate-level cybersecurity courses, including topics such as network security, ethicalhacking, digital forensics, risk management, cryptography, and incident response using blended learning techniques to include reverse learning objectives. Curriculum Development: Produce capstones, design and update course materials, including … world scenarios and hands-on practice in a safe, controlled environment. Industry Standards Alignment: Ensure that the course content aligns with industry-recognized certifications, such as CompTIA Security+, Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and others. Lab and Practical Component Oversight Cyber Lab Management: Oversee and manage the cyber lab environment, including setting up virtualized … Seminars: Organize or participate in cybersecurity workshops, boot camps, or industry-related seminars for student enrichment. Compliance: Ensure all instructional materials and lab activities comply with relevant legal and ethical standards, such as the Cybersecurity Framework (NIST) and other related regulations. Required Qualifications: Educational Background Minimum Education: Master's degree in Cybersecurity, Computer Science, Information Technology, or a related More ❯
incident response, and forensic investigation. Certifications: - Highly preferred certifications include Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Manager (CISM), or Certified Ethical Hacker (CEH). Experience Level: - 5+ years of experience in cybersecurity with a focus on incident response, SOC operations, or watchfloor management; - Demonstrated experience in shift-based or watchfloor More ❯
career path and learning budget to help set you up for success. Join a company that's making a real impact. In addition to our sustainability goals, we empower ethical hackers from all backgrounds to earn a living. Be yourself! Our international team celebrates individuality and places a strong focus on diversity and inclusion. We are the proud winners More ❯
Technology (NIST) Special Publication (SP) 800-37, SP 800-39, SP 800-53, SP 800-53A, SP 800-60. 7. Certifications: Certified Information Security Manager (CISM), Certified Ethical Hacker. 8. Software Development Support: 9. Demonstrated experience using Java or Java using Spring. 10. Demonstrated experience with Sponsor networks, systems, and services. 11. Demonstrated experience with the Sponsor More ❯
knowledge of threat detection, incident response, and cyber kill chain Familiarity with MITRE ATT&CK, NIST, and CIS frameworks Understanding of network traffic flows and vulnerability management Exposure to ethicalhacking and penetration testing Knowledge of ITIL disciplines (Incident, Problem, Change Management) Experience with ServiceNow Security Suite Cloud experience (AWS and/or Azure) Excellent communication, presentation, and More ❯
incident response, and forensic investigation. Certifications: - Highly preferred certifications include Certified Information Systems Security Professional (CISSP), GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Manager (CISM), or Certified Ethical Hacker (CEH). Experience Level: - 1+ years of experience in cybersecurity with a focus on incident response, SOC operations, or watchfloor management; - Demonstrated experience in shift-based or watchfloor More ❯
San Gabriel, California, United States Hybrid / WFH Options
Superbtech Inc
related field. 4-6 years of experience in cybersecurity, IT administration, or a related role. Relevant certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) preferred. Valid California Driver's License and acceptable driving record. Benefits: Vacation Sick Leave 12 Paid Holidays One Floating Holiday Group Medical Insurance Dental Insurance Vision Insurance More ❯
Management Framework (RMF) process. • Possession of excellent customer service and organization skills. • Possession of excellent oral and written communication skills. Preferred Certifications: • Certified Information Systems Security Professional (CISSP) • Certified Ethical Hacker (CEH) • Certified SCADA Security Architect (CSSA) Related Control Systems. Abilities: • Exposure to computer screens for an extended period of time. • Sitting for extended periods of time. • Reach by More ❯
Proven experience with Python, GitLab CI/CD, and Kubernetes. Familiarity with cloud platforms such as AWS or Azure. Certifications: AWS Solutions Architect or Security Specialty (preferred). Certified Ethical Hacker (CEH) or similar. Linux Foundation Certified Kubernetes Administrator (preferred). Skills: Strong expertise in Linux and Windows environments. Proficient in scripting/programming (Python, Bash, C++). Knowledge More ❯
/Network Administration background Quickly identify vulnerabilities and come up with real-time security solutions to address them. Proficient in documenting and maintaining configuration and process information. Certifications in EthicalHacking, CISA or CISSP PHYSICAL REQUIREMENTS The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions More ❯
Technology, Cybersecurity, Data Science, Information Systems, or Computer Science, from an ABET accredited or CAE designated institution. Certification (Preferred one of the following in lieu of Required Degree): • Certified Ethical Hacker (CEH). • CompTIA Cloud+ • CompTIA PenTest+ • CompTIA Security+ • Cisco Certified CyberOps Associate • CompTIA Cybersecurity Analyst (CySA+) • CyberSec First Responder (CFR) • Federal IT Security Professional-Operator-NG (FITSP-O More ❯
findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers These Qualifications Would be Nice to Have: JCAC (Joint Cyber Analysis Course), Network+, Security+, Certified Ethical Hacker (CEH), Microsoft Networking, Computer Network Administrator (CNA), Certified Information Systems Security Professional (CISSP), Information Systems Security Engineering Professional (ISSEP), Certified EthicalHacking, and Certified Information Systems More ❯
analysis experience. Provide information and documentation that enables malware detection, signature creation, and mitigation. These Qualifications Would be Nice to Have: JCAC (Joint Cyber Analysis Course), Network+, Security+, Certified Ethical Hacker (CEH), Microsoft Networking, Computer Network Administrator (CNA), Certified Information Systems Security Professional (CISSP), Information Systems Security Engineering Professional (ISSEP), Certified EthicalHacking, and Certified Information Systems More ❯
Hanover, Maryland, United States Hybrid / WFH Options
ICS Nett, Inc
and Or Splunk you will be at the forefront of ensuring the highest standards of information security operations for the Department of Defense. Red Team activity Defensive or Offensive Ethicalhacking This role encompasses a wide range of responsibilities including compliance, policy development, accreditation, and continuous monitoring of our corporate network and secure IT systems. Why Join Us More ❯
delivery of their Cyber Security Sub Strategy in line with the Cyber Assessment Framework, and contribute to the design and operation of threat intelligence, incident response, vulnerability management, and ethicalhacking capabilities. You'll work closely with internal stakeholders and external partners to ensure compliance with ISO27001, Cyber Essentials+, and other regulatory frameworks. This role also involves reporting More ❯
VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). Knowledge of vulnerability management, monitoring/alerting, and automation/orchestration platforms. Certifications such as Microsoft SC-200, Certified Ethical Hacker and CBCP or CBCI equivalent DR/resilience credentials. We welcome applications irrespective of race, colour, ethnic or national origin, disability, sex, gender identity, sexual orientation, age, religion More ❯
VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). Knowledge of vulnerability management, monitoring/alerting, and automation/orchestration platforms. Certifications such as Microsoft SC-200, Certified Ethical Hacker and CBCP or CBCI equivalent DR/resilience credentials. We welcome applications irrespective of race, colour, ethnic or national origin, disability, sex, gender identity, sexual orientation, age, religion More ❯
VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). Knowledge of vulnerability management, monitoring/alerting, and automation/orchestration platforms. Certifications such as Microsoft SC-200, Certified Ethical Hacker and CBCP or CBCI equivalent DR/resilience credentials. We welcome applications irrespective of race, colour, ethnic or national origin, disability, sex, gender identity, sexual orientation, age, religion More ❯
VMWare, Commvault and hybrid cloud infrastructure (Azure or similar). Knowledge of vulnerability management, monitoring/alerting, and automation/orchestration platforms. Certifications such as Microsoft SC-200, Certified Ethical Hacker and CBCP or CBCI equivalent DR/resilience credentials. We welcome applications irrespective of race, colour, ethnic or national origin, disability, sex, gender identity, sexual orientation, age, religion More ❯