to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Threat Hunting … Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & ReverseEngineering Network & Endpoint Security Monitoring (EDR, IDS/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working More ❯
to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Willingness to … Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & ReverseEngineering Network & Endpoint Security Monitoring (EDR, IDS/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
Learn more at Experience and Skills Some information security experience working within a Security Operations Center or Cyber Security Incident Response Teams Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security or professional certification related to Digital Forensics, Incident Response, or Ethical Hacking (e.g., GCIH, CEH, GCFE, GCFA, and CFCE). Knowledge of main concepts related … using security tools including Defender for Cloud, GuardDuty, CloudTrail, or CloudWatch. System administration on Unix, Linux, or Windows Network forensics, logging, and event management Defensive network infrastructure (operations or engineering) Vulnerability assessment and penetration testing concepts Malware analysis concepts, techniques, and reverseengineering In-depth knowledge of network and host security technologies and products (such as firewalls More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malware analysis and reverseengineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity More ❯
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: ? Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
familiarity with SIEM platforms including Microsoft Sentinel and Splunk Knowledge and use of the MITRE ATT&CK Framework for detection and threat analysis Experience of static malware analysis and reverseengineering (desirable) Scripting or programming with Python, Perl, Bash, PowerShell or C++ (desirable but not essential) SIEM technologies knowledge such as QRadar (desirable but not essential) In-depth More ❯
and Linux operating systems, and encryption technologies. Experience analyzing and inspecting log files, network packets, and any other security tool information output from multiple system types. Familiar with basic reverseengineering principles and understand of malware, rootkits, TCP/UDP packets, network protocols. Knowledge and experience with scripting and programming (Python, PERL, etc.). Experience with technical analysis More ❯
technical guidance and support to junior engineers and analysts on the team, fostering an environment of continuous learning and professional growth. QUALIFICATIONS 1. Demonstrated expertise in network security analysis, reverseengineering, vulnerability assessment, and exploit development. 2. Proficiency in programming languages such as Python, C, C++, and scripting languages relevant to CNO tasks. 3. Strong knowledge of networking More ❯
Job Level: Junior, Mid, or Senior We are seeking a highly motivated and skilled CNO Developer/Computer Scientist/Reverse Engineer to join our team. This role involves designing, developing, and maintaining complex software systems that support Computer Network Operations (CNO). As a member of our team, you will work on mission-critical projects, providing innovative solutions … software. • Develop custom tools and scripts to automate tasks, analyze data, and improve system performance. • Write clean, efficient, and well-documented code that meets security and performance standards. o ReverseEngineering: • Analyze, decompile, and reverse-engineer software binaries to understand vulnerabilities and potential exploits. • Develop proof-of-concept exploits to demonstrate potential vulnerabilities in targeted systems. o … and accessible to team members and stakeholders. Required Qualifications: o Clearance: Active TS/SCI with Full Scope Polygraph is mandatory. o Education: Bachelor degree in Computer Science, Computer Engineering, Electrical Engineering, or a related technical field. Relevant experience may substitute for education. Experience o Junior Level: 1-3 years of experience in CNO development, software engineeringMore ❯
First approach - providing a fun and challenging environment that promotes innovation, creative thinking, and treating one another like family. Located in Columbia, Maryland, our small business develops cutting-edge engineering solutions to protect our nation's assets. Our team specializes in vulnerability analysis and research, system emulation, software engineering, reverseengineering, embedded development, and cyber security. … with polygraph is required - Due to these clearance requirements, US citizenship is also required Responsibilities Include: - Perform network analysis using tools, such as Wireshark, NetworkMiner, for captures and analysis - Reverse engineer network protocols and perform static and dynamic analysis of software binaries - Decompile, disassemble, or debug software binaries to understand internal workings and behavior - Analyze Windows and Linux binaries … and evaluate potential impact on systems Required Skills & Qualifications: - Must have at least 5 years of hands-on relevant technical experience - Must possess Bachelor's in Computer Science, Computer Engineering, Electrical Engineering or relevant discipline (In lieu of degree must have 8+ years of hands-on relevant technical experience) - Must understand communication protocols (TCP/IP, etc) and More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
Sentinel, or Elastic Experience with forensics tools, including Magnet Axiom and FTK Experience performing forensic imaging, remote collection, and forensic analysis Experience with malware analysis, including static, dynamic, and reverseengineering Experience performing root cause analysis and following through with all phases of the incident response lifecycle Top Secret clearance Bachelor's degree Additional Qualifications Experience acquiring memory More ❯
. Knowledge of security tools like firewalls, VPNs, AV, IDS/IPS, and log management. Experience analyzing log data and network security events. Understanding of static malware analysis and reverse engineering. Familiarity with SIEM tools such as QRadar. Additional benefits include 25 days of annual leave, with options to purchase more. #J-18808-Ljbffr More ❯
enterprise-grade security tools such as firewalls, VPNs, antivirus, IDS/IPS, and log management. Experience analyzing log data and network security events. Understanding of static malware analysis and reverse engineering. Familiarity with additional SIEM tools such as QRadar. Additional benefits include 25 days of annual leave, with the option to purchase more. #J-18808-Ljbffr More ❯
enterprise-grade security tools such as firewalls, VPNs, AV, IDS/IPS, and log management. Experience analyzing log data and network security events. Understanding of static malware analysis and reverse engineering. Familiarity with additional SIEM tools such as QRadar. Note: The original description mentions 25 days annual leave with the option to purchase more. #J-18808-Ljbffr More ❯
enterprise-grade security tools such as firewalls, VPNs, antivirus, IDS/IPS, and log management. Experience analyzing log data and network security events. Understanding of static malware analysis and reverse engineering. Familiarity with additional SIEM tools such as QRadar. Additional benefits include 25 days of annual leave, with the option to purchase more. #J-18808-Ljbffr More ❯
security tools such as firewalls, VPNs, AV, IDS/IPS, and log management. Experience analysing log data and network security events. Desirable Skills: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst certification. Familiarity with additional SIEM tools such as QRadar. Benefits: 25 days annual leave, with the option to purchase more Health cash plan Life More ❯
understanding of network protocols (TCP/IP, HTTP, SMTP, etc.), firewalls, VPNs, AV products, and enterprise infrastructure. It would be great if you had: Skills in malware analysis or reverse engineering. Experience with scripting or programming (Python, PowerShell, Bash, etc.). Exposure to additional SIEM tools such as QRadar. 25 days annual leave (plus option to purchase more). More ❯
Internet protocols). Knowledge of enterprise security tools (firewalls, VPNs, AV, IDS/IPS, logs). Experience analyzing log data and network security events. Understanding of malware analysis and reverse engineering. Familiarity with SIEM tools like QRadar. Additional benefits include 25 days of annual leave, with an option to purchase more. #J-18808-Ljbffr More ❯
skills. Good understanding of network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work independently with minimal supervision. Willingness to work in a 24/7 or More ❯
you! Set of X is looking for a software engineer who can develop software in C/C++, Python and Assembly language for operating system internals, network programming and reverse engineering. You will work on projects that involve virtualization, kernel modules, network devices and test frameworks. You will also have the opportunity to lead a team of engineers and … in a team It would be great if you also have: Experience writing software in Modern C++ (stdcpp17 and later) Experience with virtualization tools (e.g. VMWare, HyperV) Experience with reverseengineering tools (e.g. Ghidra, IDAPro, Binary Ninja, Radare2) Experience with version control systems (e.g. Git, Svn) Agile development skills Prior experience leading a team Experience writing kernel modules More ❯
London, England, United Kingdom Hybrid / WFH Options
Damco Spain SL
applications like web applications and databases is desirable An understanding of malware behaviour, persistence mechanisms, and the ability to perform static and dynamic analysis, including sandbox report interpretation and reverse engineering. Purple Teaming Knowledge of various cyber-attacks, simulations, and identification methods. Keen to participate in purple teaming activities, helping to develop scenarios and engage in both blue and … in query languages like KQL and Logscale for investigations and log analysis is highly desirable Managing Relationships: Develop and maintain key relationships with forensics, security operations governance, cyber defence engineering, risk and compliance, IT, and other business units. Soft Skills: Report Writing: Ability to write reports that convey highly technical information whilst remaining accessible to a non-technical audience … GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF is desirable. Bonus Points: Knowledge of reverseengineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) is desirable Some programming experience for example, C, Python, Go, and/or other languages More ❯
you! Set of X is looking for a software engineer who can develop software in C/C++, Python and Assembly language for operating system internals, network programming and reverse engineering. You will work on projects that involve virtualization, kernel modules, network devices and test frameworks. You will also have the opportunity to lead a team of engineers and … in a team It would be great if you also have: Experience writing software in Modern C++ (stdcpp17 and later) Experience with virtualization tools (e.g. VMWare, HyperV) Experience with reverseengineering tools (e.g. Ghidra, IDAPro, Binary Ninja, Radare2) Experience with version control systems (e.g. Git, Svn) Agile development skills Prior experience leading a team Experience writing kernel modules More ❯
creating proof-of-concept exploits. Assessing cloud security risks across AWS, Azure, and GCP environments, including IAM misconfigurations, container security, and lateral movement strategies. Collaborating with internal security and engineering teams to provide remediation guidance, enhance security monitoring, and improve detection and response capabilities. Researching emerging threats in cloud security, web applications, and infrastructure, sharing findings internally and contributing … infrastructure. Strong understanding of modern attack techniques, including phishing, persistence mechanisms, privilege escalation, and lateral movement. Knowledge of security tooling (e.g., C2 frameworks, EDR evasion, malware development, fuzzing, and reverseengineering). Excellent problem-solving skills and the ability to think like an adversary. Strong communication skills, with the ability to document findings clearly and present them to More ❯