Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems … including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in offensive tools and development techniques Perform development with at least two scripting or programming languages (Python, C++, Java, Rust, Assembly, C#, etc.) in support of exploit development … time professional experience conducting penetration testing or offensive Cyber operations in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. o Mimicking threat behavior. o Utilizing various operating systems (examples include Linux, Windows, MAC OS, etc.); o Utilizing Active More ❯
Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems … including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in offensive tools and development techniques Perform development with at least two scripting or programming languages (Python, C++, Java, Rust, Assembly, C#, etc.) in support of exploit development … conducting penetration testing or offensive Cyber operations including demonstrated experience in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. o Mimicking threat behavior. o Utilizing various operating systems (examples include Linux, Windows, MAC OS, etc.); o Utilizing Active More ❯
and execute complex Red Team penetration tests and cyber adversary emulation operations. Design, develop, and employ offensive tools using platforms such as Metasploit, NMAP, KaliLinux, and Cobalt Strike. Emulate threat actor TTPs based on MITRE ATT&CK, APT profiles, and emerging threat intelligence. Conduct assessments and attacks … across various platforms, including Linux, Windows, and macOS. Exploit and manipulate Active Directory environments to assess internal and external threat postures. Perform exploit development and vulnerability research to identify and validate security flaws. Identify limitations in existing toolsets and develop custom techniques to improve effectiveness and stealth. Script and … years of full-time professional experience in Red Team operations and penetration testing, including: Developing and leveraging offensive tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike. Simulating adversary behavior and TTPs. Operating across Linux, Windows, and macOS environments. Utilizing and exploiting Active Directory infrastructures. Performing More ❯
RESPONSIBILITIES Plan, execute, and document full-scope penetration tests and adversary emulation exercises. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike. Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK. Conduct assessments across multiple operating systems … including Linux, Windows, and macOS. Perform exploit development and identify zero-day or previously unknown vulnerabilities. Analyze, identify, and remediate gaps in offensive tools and Red Team methodologies. Perform scripting and programming tasks in support of custom exploit development and automation. Work collaboratively with Blue Team, tool developers, and … full-time professional experience in each of the following: Conducting penetration testing or offensive cyber operations. Developing and using tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike. Mimicking threat behavior and adversary simulation. Working across Linux, Windows, and macOS environments. Utilizing and exploiting Active Directory More ❯
obtain the ISTQB Certified Tester Advanced Level-Test Analyst (CTAL-TA) certification within 2 years of hire. Advanced experience with Windows (Power Shell) and Linux (Kali and Ubuntu) command line interface. Intermediate ability to interface effectively with customers, end-users, technical leads, and program management throughout the full … the Agile mindset and methodologies, including Agile project management. DESIRED QUALIFICATIONS/SKILLS Knowledgeable on various Software Development Lifecycles. Advanced experience working in Windows, Linux (Kali and Ubuntu), and VMware environments. Intermediate experience with Agile/Scrum Framework and Issue Management Tools (e.g., Confluence, Jira, Azure DevOps). More ❯
Must obtain the ISTQB Certified Tester Advanced Level-Test Analyst (CTAL-TA) certification within 2 years of hire. Experience with Windows (Power Shell) and Linux (Kali and Ubuntu) command line interface. Intermediate ability to interface effectively with customers, end-users, technical leads, and program management throughout the full … and executing test plans, procedures, reports, and technical documentation. DESIRED QUALIFICATIONS/SKILLS Knowledgeable on various Software Development Lifecycles. Advanced experience working in Windows, Linux (Kali and Ubuntu), and VMware environments. Intermediate experience with Agile/Scrum Framework and Issue Management Tools (e.g., Confluence, Jira, Azure DevOps). More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Risk Crew
processes. Your mandatory technical skills: Ability to perform black box, grey box and white box tests with an attacker's mindset. Expertise in using Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit and other security tools. Strong knowledge of the OWASP Testing Methodology. Strong understanding of security protocols, such as More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Risk Crew
processes. Your mandatory technical skills: Ability to perform black box, grey box and white box tests with an attacker's mindset. Expertise in using Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit and other security tools. Strong knowledge of the OWASP Testing Methodology. Strong understanding of security protocols, such as More ❯
and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike Mimicking threat behavior Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Exploit development Identifying gaps in More ❯
professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike; Mimicking threat behavior; Utilizing various operating systems (Linux, Windows, MAC OS); Utilizing Active Directory; Performing exploit development; Identifying gaps More ❯
and non-technical audiences. Requirements Proven experience in penetration testing and ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP More ❯
to obtain before start date: CCNA Cyber Ops, CCNA-Security, CEH, CFR, Cloud+, CySA+, GCIA, GCIH, GICSP, SCYBER, Security+ CE, SSCP Demonstrated experience with Kali Linux. Demonstrated penetration testing tools experience with Nmap, Burp Suite, Metasploit, etc. Demonstrated ability in evaluating vulnerabilities, performing root cause analysis, and reporting findings More ❯
or network penetration testing with track record of end to end testing of complex systems. Advanced knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong expertise with web application and network pen testing methodologies. Proficiency … in using penetration testing tools such as BurpSuite Pro, Nmap, Nessus, and Metasploit. Experienced in using KaliLinux and the associated penetration testing tool suite. Advanced completion of penetration testing simulations like Hack the Box or Capture the Flag or ideally one of the following certifications: CSTL/ More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
and penetration testing. Demonstrable experience in infrastructure and web application testing; experience in API testing is desirable. Demonstrable experience using common pentesting tools including KaliLinux, Burpsuite, Nessus and other industry standard tools. Hold or working towards an industry recognised certification including CompTIA PenTest+; CHECK, CREST; Offensive Security More ❯
activities, and current Cyber updates while adhering to 319CTS instructions, security classification guides, and other guidance as identified in lesson plans. Fully versed in LINUX OS Fundamentals, administration, processes, services, command shells, networking, scripting, partitions, and surveying Interface with internal and external Cyber agencies as required to update and … Ethical Hacker (CIEH) (Optional) Skills, including, but not limited to, using any of the following tools, capabilities: NMAP Endpoint Detection and Response (EDR) tools Linux CLI, Powershell, Windows CLI Metasploit KaliLinux Protocol Analyzers, Password Crackers, Vulnerability Assessment Command Line Tools: netstat, nslookup, netcat etc Pyhton, Bash More ❯
exploiting vulnerabilities in complex systems and applications. Experience with vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and penetration testing tools (e.g., Metasploit, Burp Suite, KaliLinux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR, PCI-DSS) Relevant certifications (e.g., CEH, OSCP, CISSP More ❯
Injection, SQLi, single sign-on limitations, etc. Must be proficient in any of the following: PowerShell Empire, Metasploit Framework, Cobalt Strike, Burp Suite, Canvas, KaliLinux, IPTables, Sysinternals, A/V evasion methodologies, Exploit Dev. Must have solid working experience and knowledge of Windows operating systems (incl. Active … Directory), Linux operating systems; ESXi or similar; mobile platforms are a plus. Solid understanding of networking, TCP/IP, virtualization and cloud/data center architecture. Strong familiarity with some of the following: OWASP top 10, DoD and NSA Vulnerability and Penetration Testing Standards. Knowledge of exploitation concepts including More ❯
cybersecurity operations, digital forensics, or large-scale data analysis. Strong understanding of internet protocols, network infrastructure, and system security. Proficient in both Windows and Linux environments. Familiarity with scripting (e.g., Python, Bash) and cybersecurity tools (e.g., Wireshark, SIEM, KaliLinux). Ability to convey technical findings clearly More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
HS diploma or GED and 7+ years of experience in Information Technology, or Bachelor's degree and 3+ years of experience in Information Technology Linux Computing Environment (CE) Certification Windows CE Certification Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN) Certification DoD Approved 8570 Information Assurance Technician … IAT) Level III Certification, including CASP+ CE, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP Certification Additional Qualifications Experience with Cobalt Strike, Metasploit, and KaliLinux Python Certification Completion of the Red Team Apprentice, Offensive Methodology Analysis, or Red Team Operations Training Clearance: Applicants selected will be subject More ❯
access management Advanced, hands-on experience with manual vulnerability testing and static code analysis Advanced experience with tools including, but not limited to, the KaliLinux platform and its built-in tools Advanced experience performing manual testing with Burp Suite, OWASP ZAP, or similar tools Advanced understanding of More ❯
North Chicago, Illinois, United States Hybrid / WFH Options
AbbVie
access management Advanced, hands-on experience with manual vulnerability testing and static code analysis Advanced experience with tools including, but not limited to, the KaliLinux platform and its built-in tools Advanced experience performing manual testing with Burp Suite, OWASP ZAP, or similar tools Advanced understanding of More ❯
to identify gaps in tools and development techniques. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike Mimic threat actor behavior using Tactics, Techniques and Procedures (TTPs) aligned with frameworks like MITRE ATT&CK Conduct assessments … across multiple operating systems including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in offensive tools and development techniques Perform development with at least two scripting or programming languages (Python, C+, Java, Rust, Assembly, C#, etc.) in More ❯
to travel approx. 10% each year if necessary (typically within the Continental United States) Desired (but not required) Qualifications: Experience with RUST Familiarity with Linux/POSIX platforms Familiarity with fundamental networking implementations and concepts, including basic LAN and WAN networking skills Familiarity with virtualization and containerization technologies Familiarity … with the following tools, concepts, and products are a plus: Ubuntu, Red Hat, similar Linux Distributions Networking Protocols Software Reverse Engineering tools (Ida Pro, Ghidra, Boofuzz, Frida) Wireshark KaliLinux proficiency Scanning/Analysis Tools (nmap, nikto, etc) Exploitation Tools (Metasploit, Cobalt Strike, etc) Required Education: Candidates More ❯