Management Framework (RMF) process. • Possession of excellent customer service and organization skills. • Possession of excellent oral and written communication skills. Preferred Certifications: • Certified Information Systems Security Professional (CISSP) • Certified Ethical Hacker (CEH) • Certified SCADA Security Architect (CSSA) Related Control Systems. Abilities: • Exposure to computer screens for an extended period of time. • Sitting for extended periods of time. • Reach by More ❯
application security • Excellent verbal and writing skills Required Education: • BS Intelligence, Cybersecurity or related degree, or High School Diploma and 7 years of directly relevant experience. Desired Certifications: • Certified Ethical Hacker (CEH) • CompTIA's Security Plus (SEC+) • Intelligence Analyst Certified (IAC) • Certified Threat Intelligence Analyst (C TIA) OPPORTUNITY Join an ELITE Cyber Team protecting the nation's critical infrastructure More ❯
analysis experience. Provide information and documentation that enables malware detection, signature creation, and mitigation. These Qualifications Would be Nice to Have: JCAC (Joint Cyber Analysis Course), Network+, Security+, Certified Ethical Hacker (CEH), Microsoft Networking, Computer Network Administrator (CNA), Certified Information Systems Security Professional (CISSP), Information Systems Security Engineering Professional (ISSEP), Certified EthicalHacking, and Certified Information Systems More ❯
Skills: Familiarity with federal security compliance frameworks (e.g., NIST 800-53, FISMA) Exposure to GRC platforms, scripting, or ticketing systems Interest in certifications such as Security+, CISSP, or Certified Ethical Hacker (CEH) Education: Bachelor's Degree Salary More ❯
related roles with responding actioning on security incidents. Eligibility to obtain UK Developed Vetting (DV) security clearance; British Citizenship is required for this role. Preferred qualifications Certification in Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC) or Computing Technology Industry Association Security+ (CompTIA Sec+). Experience in responding to security incidents on Kubernetes. Experience in analyzing, triaging, and More ❯
Domain Solutions Experience with system accreditation and operational support for CDSs. Experience developing systems, products, and/or processes based on a total systems perspective. Preferred Certifications: CEH - Certified Ethical Hacker (EC-Council) CASP+ - CompTIA Advanced Security Practitioner (CompTIA) Preferred Education: N/A Preferred Experience: N/A Supervisory Responsibilities: None Work Environment: Professional Office Environment; must be More ❯
field and must hold one of the following certifications: a. Open Source Intelligence (OSINT) certification b. GIAC Open Source Intelligence (GOSI) c. Certified Threat Intelligence Analyst (CTIA) d. Certified Ethical Hacker (CEH) e. EC Council Certified Network Defender (CND) f. EC Council Licensed Penetration Tester- (Master) (LPT-Master) g. EC Council Certified Security Analyst (ECSA) h. EC Council Certified More ❯
to communicate effectively, both orally and in writing. Desired Qualifications: Bachelor's Degree in any Computer Science - related degree DIA - CMP- 2045: Privileged User Cybersecurity Responsibilities CEH (v10)- Certified Ethical Hacker Joint Network Attack Course (JNAC) OSINT Awareness "AGILE" Course SAN: GCIH SANS: Penetration+ (PEN+) Red Hat Certified Professional OSCP/E: Offensive Security Certified Professional/Expert Cisco More ❯
MS Excel, Word, PowerPoint, and Visio Skills Ability to travel internationally 10% Desired/Advantageous Qualifications CompTIA Security+ CompTia Cybersecurity Analyst (CySA+) Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) Systems Security Certified Practitioner (SSCP) GIAC Security Essentials Certification (GSEC) Experience programming/administrating Access Control Systems More ❯
to work independently and as part of a team - Excellent communication skills - Experience with USMC is preferred but not required Certifications Required: Security+ Continuing Education (CE) CompTIA and Certified Ethical Hacker (CEH) EC-Council Security Clearance Required: Top Secret/SCI Education Level requirement: Bachelor's Degree in the following Area(s) of Study; Computer Science, Cybersecurity, Information Technology More ❯
individually evaluated Technical Certification: Possess industry recognized technical certifications relevant to the field of Cyber Analysis and/or Cyber Investigations (i.e, GIAC GCIH, GIAC GCFA, GIAC GCTI, Certified Ethical Hacker (CEH), CySA+, DC3 Cyber Analysis Course, etc) Desired Qualifications: Bachelor's Degree from an accredited school in a related discipline Completion of Defense Cyber Investigations Training Academy (DCITA More ❯
make technical concepts accessible. Excellent written communication skills. Interest in cybersecurity and a willingness to research/apply cybersecurity concepts through programming tasks. Desirable Familiarity with cybersecurity topics (cryptography, ethicalhacking, digital forensics). Experience designing or running Capture the Flag challenges . Knowledge of UK secondary Computing curricula (GCSE, T-Level, CyberFirst). Experience working with collaborative More ❯
language SAFe certification SAFe Product Owner/Product Manager Certifications Scrum PO Certification Additional Information: Cyber Security Experience: A background in cyber security is a must, specifically for the ethicalhacking product and compliance survey tools. Agile/Scrum Experience: Solid experience with Agile methodologies, including Scrum or Agile Coaching. Previous experience as a Product Owner (PO) or More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
Glasgow, Glasgow City, City of Glasgow, United Kingdom
ITOL Recruit
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯