Identity Management solutions 7+ years experience in the field of identity and access management Technical experience in the following: Identity & Access Management systems (Okta, Sailpoint, Azure), Salesforce CRM, ActiveDirectory, PowerShell, Group Policy maintenance Strong knowledge of IT systems architecture and design principles Demonstrated risk assessment and mitigation expertise in IT or IS Preference given to … Genesis10 puts thousands of consultants and employees to work across the United States every year-in contract, contract-for-hire, and permanent placement roles. With more than 300 active clients, Genesis10 provides access to many of the Fortune 100 firms and a variety of mid-market organizations across the full spectrum of industry verticals. Benefits of Working with More ❯
Qualifications Clearance/Citizen Type: Applicants selected will be subject to a government security investigation and must meet eligibility requirements, including U.S. Citizenship, for access to classified information; Active SECRET Clearance is REQUIRED Education/Requirements: Education: BS degree and 0+ Years of progressive experience or HS Diploma or Equivalent and 6+ Years of progressive experience Requires system … type desired. Experience with installation, troubleshooting, and testing of security electronics equipment desired. Requires an understanding of Windows patching and vulnerability remediation. Requires a basic knowledge of Windows activedirectory hierarchy and implementation. What we offer: A collaborative team inspired by the way engineering and innovation enhance customer outcomes, improve lives, and change the world for More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI Eligible Clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI Eligible Clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI Eligible Clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI Eligible Clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯