Suite. • Ability to work collaboratively in a team environment while meeting deadlines in a fast-paced setting. • Experience recruiting for cyber security roles, including those requiring certifications like CISSP, CEH, or Security+. Preferred • Understanding of EEO and OFCCP compliance in recruitment processes. Physical and Mental Qualifications: • Be able to maintain awareness during scheduled working hours. • Prolonged periods sitting or standing More ❯
Associates degree with 10 years of relevant experience Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from accredited college or university. Certifications Required: CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification is required for Level 2 and 3 Position requires active Security Clearance with appropriate Polygraph Pay Range More ❯
experience that is clearly related to the position. Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, or related discipline from accredited college or university. Certifications Required: CISSP, CEH, Sec+, Net+, GIAC GREM and/or CREA Certification is required Clearance: Must Have an ACTIVE TS/SCI With Full Scope Poly. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
DGH Recruitment
Experience with network security and networking technologies. - Knowledge of database and operating system security. - Experience managing outsourced security/SOC services. - Preferably a Professional certification such as CISSP, GSEC, CEH, or CISM. Cyber Security Technical Lead/Engineer In accordance with the Employment Agencies and Employment Businesses Regulations 2003, this position is advertised based upon DGH Recruitment Limited having first More ❯
diverse organizations and teams. Active TS/SCI with Full Scope Polygraph clearance (CI within 6 years). Experience with Zero Trust architectures. Desired Qualifications: Cybersecurity certifications (Sec+, CISSP, CEH, etc.). Familiarity with NIST SP 800-160. Familiarity with INCOSE-defined lifecycle systems engineering processes. Experience with or knowledge of large-scale DOD systems. Benefits of the Systems More ❯
other documentation required for high-risk systems. • Demonstrated ability to lead cross-functional teams in high-security environments and collaborate with government leads and stakeholders. • Certifications such as CISSP, CEH, GPEN, or CNSS-related credentials. • In-depth knowledge of supply chain risk management and its impact on national security. • Experience with federal cybersecurity policies, including DHS 4300B. • Hands-on experience More ❯
Master's degree plus 6 years of relevant experience. Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university. CISSP, CEH, SEC+, NET+, GIAC GREM and/or CREA Certification is required OR completion of one or more of the Reverse Engineer/Intrusion Analyst Courses (SANS FOR610, GCIH, GIAC, GCIA More ❯
with industry security standards and frameworks, including NIST and OWASP. Preferred Qualifications: Experience in CJIS or other law enforcement/federal environments. Relevant certifications such as GREM, GXPN, OSCP, CEH, or similar. Experience with tools such as IDA Pro, Ghidra, Wireshark, Volatility, Burp Suite, and similar. Familiarity with cloud-based and virtualized environments. Experience managing and developing in diverse software More ❯
forensics, information assurance, and/or systems engineering. Foreign Language may count toward experience requirements. Desired: Relevant Certs or Specialized Training would include (but not limited to): JCAC graduate, CEH, CFR, CySA+, GCIH, CNDSP Security Clearance: A current government clearance, background investigation, and polygraph are required. The Swift Group and Subsidiaries are an Equal Opportunity/Affirmative Action employer. All More ❯
government-funded projects, with a solid understanding of compliance and security protocols. Expertise in operating in non-permissive environments and managing associated risks. Relevant certifications such as CISSP, CISM, CEH, or similar. Exceptional problem-solving and communication skills, with the ability to translate complex security concepts into actionable plans. Area of Selection We're committed to hiring a diverse workforce More ❯
and understanding of ethical hacking/security testing best practices and techniques (with hands-on experience valued). Relevant qualifications valued e.g. CertifiedEthicalHacker (CEH), Offensive Security Certified Professional (OSCP . Audit and/or risk and controls experience - Practical experience of assessing cyber risks and key controls, documenting appropriate test plans to deliver More ❯
and understanding of ethical hacking/security testing best practices and techniques (with hands-on experience valued). Relevant qualifications valued e.g. CertifiedEthicalHacker (CEH), Offensive Security Certified Professional (OSCP . Audit and/or risk and controls experience - Practical experience of assessing cyber risks and key controls, documenting appropriate test plans to deliver More ❯
of cybersecurity principles, theories, practices, and techniques, including offensive security is essential. Technical proficiency with Defender, Intune, Azure, and D365 is required. Certifications such as CISSP, CISM, CISA, or CEH are preferred. Experience in implementing and adhering to controls within a growing organization, especially in new territories, would be beneficial. Additionally, experience in security architecture would be valuable. This is More ❯
support secure system access. Preferred Qualifications Active or eligible TS clearance with SCI eligibility. Hands-on experience with Air Force or DoD cyber sensor platforms. Relevant certifications such as CEH, CySA+, CISSP, GCIA, or GCTI. Prior exposure to SIPR/JWICS environments and classified cyber operations. More ❯
s Degree or 4+ years of additional experience in a cyber role in lieu of a degree • 5+ years of experience in cyber role • CSSP-IR certification required (e.g. CEH, CySA+) • IAT Level II (GSEC, Security+, SSCP, or CCNA-Security) certification required • Experience with Windows and Linux operating systems. • Experience working in a Cybersecurity Operations Center environment desired • Experience with More ❯
Exploitation Analyst. Level 4: At least 11 years of demonstrated experience within the Department of Defense (DoD) as an Exploitation Analyst. Technical Bachelor's Degree Relevant Certifications: Sec+, Net+, CEH, JCAC course Security Clearance: A current government clearance, background investigation, and polygraph are required. The Swift Group and Subsidiaries are an Equal Opportunity/Affirmative Action employer. All qualified applicants More ❯
related degree. 5 years of demonstrated experience designing and implementing Wired and Wireless Technology. 5 years of demonstrated experience with securing emerging cloud and hybrid cloud environments and technologies. CEH certification More ❯
Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Certifications preferred: Sec+, Net+, CEH Relevant TDNA experience includes: Conducting advanced analysis of collection and open-source data to generate insights and leads, ensure target continuity, profile targets and their activities, and develop techniques to More ❯
modern technologies and the OT Security product space and assess technology from vendors. Knowledge of security industry regulations and standards NIST, EU NIS Directive, IEC 62443. Industry qualifications (CCSK, CEH, CCSP, GICSP, CISM, CISA, SABSA) would be desirable. Knowledge on any of the platforms such as Nozomi Network, Claroty, Armis, PAS, Dragos Mandatory Skills: OT SECURITY.Experience: 8-10 Years.Reinvent your More ❯
Strong knowledge of common vulnerabilities (OWASP Top 10, CVEs) and attack techniques ️ Familiarity with penetration testing tools such as Burp Suite, Metasploit, Nessus, and Nmap ️ Certifications such as OSCP, CEH, or equivalent are highly desirable ️ Strong communication skills to present findings to both technical and non-technical stakeholders More ❯
practice in a safe, controlled environment. Industry Standards Alignment: Ensure that the course content aligns with industry-recognized certifications, such as CompTIA Security+, CertifiedEthicalHacker (CEH), Certified Information Systems Security Professional (CISSP), and others. Lab and Practical Component Oversight Cyber Lab Management: Oversee and manage the cyber lab environment, including setting up virtualized networks, attack … in Cybersecurity or a related discipline or significant industry experience. Certifications Required: At least one industry-recognized cybersecurity certification, such as CompTIA Security+, CertifiedEthicalHacker (CEH), CISSP, GIAC, or equivalent. Preferred: Multiple certifications demonstrating expertise across various areas (e.g., CISM, CISA, OSCP, GPEN). Experience Industry Experience: Minimum of 3-5 years of professional experience in More ❯
security clearance. • One of the following certifications: Red Hat Certified System Administrator (RHCSA); Splunk Certified Administrator; SolarWinds Certified Professional (SCP); Arcsight; Elastic Stack; RedSeal; ACAS; Linux+; CEH; Microsoft365 Fundamentals, SolarWinds NetFlow Traffic Analyzer Secondary Skills - Nice to Haves Data analysis Job Description . Our Analysis Team conducts network research and network analysis through AFNet monitoring and performance More ❯
TEE technologies or confidential computing. Knowledge of OWASP Top 10, CVEs, and secure coding practices. Proficiency with tools like Burp Suite, Metasploit, Nmap, Wireshark, etc. Certifications such as OSCP, CEH, or GIAC are a plus. Nice to Have: Experience with Kubernetes and container security. Familiarity with CI/CD security integration. Familiarity with Snowflake and Databricks Red Team experience As More ❯
testing tools ️ Experience with SAST, DAST, and security code review tools (e.g., Fortify, Veracode, Checkmarx) ️ Familiarity with secure software development frameworks (e.g., OWASP, NIST) ️ Relevant certifications such as CSSLP, CEH, or CISSP are highly desirable More ❯