will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
will work collaboratively with Blue Team and Cybersecurity professionals to enhance overall cyber posture. Position is contingent upon award of contract, anticipated in December of 2025. Clearance: An ACTIVE Top Secret/SCI eligible clearance (IT Level I Tier 5/Special-Sensitive Position) is required for this position. Applicants selected will be subject to a security investigation … Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing ActiveDirectory Performing exploit development Identifying gaps in tools and development techniques Performing development with at least two scripting or programming languages (python, C++, Java, Rust, Assembly, C# More ❯
customers. You have 5+ years of experience contributing to Infrastructure security initiatives and building secure infrastructures in hybrid cloud/on-premise environments. You have experience with (Azure) ActiveDirectory and how to secure it. You have a strong understanding of cloud and on-premise network security (firewalls, routers, switches) and stay current on evolving threats … European ecosystem for fashion and lifestyle e-commerce. Help us offer an inspiring and quality multi-brand shopping experience for fashion and lifestyle products to about 52 million active customers in 26 markets. Or be part of our logistic infrastructure, software or service capabilities to help brands and retailers run and scale their entire e-commerce business, on More ❯
client is looking for an IT support assistant, to grow and develop their skills within their Business. Ideally you will have the following skills: Microsoft AD Network and ActiveDirectory Windows Environment First Line Desk Support This is a great opportunity offering training and progression opportunities. Excellent salary, plus monthly tax free vouchers and potential yearly More ❯
STIG, JAFAN, or JSIG information system environments Experience contributing to the architecture and design of new and current HPC systems Preferred Qualifications: Bachelor's degree in Information Technology Active Top Secret, TS/SCI, Polygraph, or SAP/SAR access would be nice to have 10 years of Server Administration to include ActiveDirectory … opportunities, exposure to a wide variety of projects and customers, and a very friendly team environment. Our Employee Resource Groups (ERGs) offer opportunities to be a friend, be active, be a volunteer, be a leader, be recognized, and to be yourself. At Northrop Grumman, we are on the cutting edge of innovation. Our diverse portfolio of programs means More ❯
operating systems and applications Manage client expectations and adhere to support SLA’s Your Skills and Experience 1+ years’ experience providing IT support Microsoft Desktops and Windows Server ActiveDirectory Office 365 Basic networking knowledge Driving license and own vehicle (highly desired) Any certifications are a bonus More ❯
expertise will be valued and your growth supported. Key Requirements: Proven experience in IAM architecture, with a focus on Microsoft Entra technologies Strong knowledge of Entra ID, Azure ActiveDirectory, and hybrid identity environments Hands-on experience with B2C and external identity scenarios Excellent stakeholder engagement and communication skills Experience in presales, including solution scoping and More ❯
Basingstoke, Hampshire, South East, United Kingdom
Spectrum It Recruitment Limited
skills - able to translate technical issues into clear explanations for customers and colleagues. Desirable skills (not essential): Exposure to Power Platform (Power Apps, Power Automate). Familiarity with ActiveDirectory/Entra ID user management. Basic knowledge of JavaScript (and an interest in developing skills in C#, HTML, CSS, React). This is an exciting role More ❯
specific, detailed recommendations for software/tools, implementation techniques, and long-term scalability. Skilled in secure software design and development. Experienced with system administration and enterprise deployment, including ActiveDirectory authentication. Capable of performing advanced technical analysis in planning, engineering, and designing web applications. Proactively identifies and implements efficient solutions to application issues. Additional Skills: Proficient More ❯
meet business needs, including present and future capacity requirements. Designing and developing with Information Security in mind System administration for Hosting and Deployment within an enterprise environment with ActiveDirectory authentication. Capable of performing technical analysis in web application planning, engineering, and design Proactively provides analysis for implementation techniques and tools for the most efficient solutions More ❯
meet business needs, including present and future capacity requirements. Designing and developing with Information Security in mind System administration for Hosting and Deployment within an enterprise environment with ActiveDirectory authentication. Capable of performing technical analysis in web application planning, engineering, and design Proactively provides analysis for implementation techniques and tools for the most efficient solutions More ❯
traditional/web/SaaS) Hybrid-Multi-Cloud workload (hosting/delivery) Enterprise Mobility Management Enterprise Security Solid understanding of supporting technologies such as Microsoft Azure, Microsoft Azure ActiveDirectory, Google Cloud Platform, AWS, and HCI solutions Role Requirements Bachelor's degree or equivalent experience required 5+ years of Sales Engineering or Consulting experience in high More ❯