security clearance is highly preferred MS and 8 years of experience as a professional Engineer One or more of the following cyber certifications: OSCP GIAC GSOC CompTIA CySA+ CISSP from ISC2 Clearance Information SRC IS A CONTRACTOR FOR THE U.S. GOVERNMENT, THIS POSITION WILL REQUIRE U.S. CITIZENSHIP AS WELL AS More ❯
or equivalent experience) in Cybersecurity, Computer Science, Software Engineering, or a related technical discipline. Recognised industry certifications in cybersecurity or application security (CompTIA, ISC2, GIAC, ISACA, or CREST). Highly desirable are certifications related to secure development and cloud security (CSSLP, AZ-500, SC-100/SC-200, AWS Security More ❯
Bolton, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Reed Technology
Customer focus to ensure internal stakeholder needs are met Project Delivery background CISSP, CISM or other equivalent foundational security qualifications or experience CEH, OSCP, GIAC or other penetration testing security qualifications or experience SABSA, SANS or other technical architecture qualifications SAFE, Scrum, or other Agile methodology experience Data Protection, Risk More ❯
Computer Engineering, Information Systems, or related discipline from an accredited college or university Relevant experience must be in malware reverse engineering Certifications Required: CISSP, GIAC GREM or CREA Certification is required InformationAssuranceCertification may be required Position requires active Security Clearance with appropriate Polygraph Pay Range More ❯
the positions. Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university. Certifications Required: CISSP, GIAC GREM or CREA Certification is required Position requires active Security Clearance with appropriate Polygraph Pay Range: COMPETITIVE The RealmOne pay range for this job level More ❯
Computer Engineering, Information Systems, or related discipline from an accredited college or university. Relevant experience must be in malware reverse engineering. Certifications Required: CISSP, GIAC GREM or CREA Certification is required Position requires active Security Clearance with appropriate Polygraph Pay Range: 133,000-264,000 The RealmOne pay range for More ❯
one of the following; COMPTIA Security+ with CE, Cyber Security Analyst certification (CySA), Cisco Certified Network Associate (CCNA), Global Industrial Cyber Security Professional (GICSP), GIAC Security Essentials (GSEC). Active Top Secret with eligibility to obtain Sensitive Compartmented Information Facility Clearance If you thrive on solving complex problems and building More ❯
of all US Military service and NATO weapons systems AFMAN 33-285 IAT Level II cybersecurity baseline certification. This includes one of the following: GIAC Security Essentials Certification (GSEC), Security+, Security+ Continuing Education (Security+ CE), System Security Certified Practitioner (SSCP), or Cisco Certified Network Associate-Security (CCNA-Security) National-Tactical More ❯
from an ABET-accredited or CAE-designated institution (if applicable). Certifications: At least one of the following is required): Security+ (CompTIA Security+) GSEC (GIAC Security Essentials) Clearance: Active TS/SCI clearance is required. Must be a United States Citizen and pass a background check. Maintain applicable security clearance More ❯
the positions. Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university. Certifications Required: CISSP, GIAC GREM or CREA Certification is requiredPosition requires active Security Clearance with appropriate Polygraph More ❯
GIAC GCFA Certification Required Job Duties: - Review all IDS/IPS alerts per AFCERT Operating Instruction (OI) and checklists at the AOL, COOP, or Ops Floor. - Conduct host security monitoring, alert review, and intrusion detection analysis for the AFIN SOC mission. - Develop, Review and Maintain procedures related to the overall More ❯
don't let it stop you from applying. BASIC QUALIFICATIONS - Associate's degree, or Cloud+ or GICSP (Global Industrial Cyber Security Professional) or GSEC (GIAC Security Essentials) or SSCP (Systems Security Certified Practitioner) - 3+ years Linux systems administration and technical troubleshooting/support experience - 2+ years of networking experience (TCP More ❯
System and/or U NIX Working knowledge database Administration and application development with Oracle, PostresSQL, SQL Server, and/or MySQL Desired : Advanced GIAC and/or (ISC)2 network/cyber security specialties Familiar with 802.11, Bluetooth and LTE protocols and technologies Experience with wired telephony technology (hardware More ❯
changing environment Qualification Broad technical knowledge of cyber security controls demonstrated by attainment of appropriate qualifications e.g. CISSP, ISO27001 Lead Implementor or relevant SANS GIAC or equivalent Knowledge of the NIST framework, PCI DSS, GDPR and NIS as well as NCSC cyber guidance. Experience working in an agile delivery environment More ❯
changing environment Qualification Broad technical knowledge of cyber security controls demonstrated by attainment of appropriate qualifications e.g. CISSP, ISO27001 Lead Implementor or relevant SANS GIAC or equivalent Knowledge of the NIST framework, PCI DSS, GDPR and NIS as well as NCSC cyber guidance. Experience working in an agile delivery environment More ❯
maintain Top Security/SCI clearance DoD 8140/8570 IAT Level II/III certifications required One or more certifications: CompTIA Security+ (Sec+) GIAC Certified Detection Analyst (GCDA) CompTIA Cybersecurity Analyst (CySA+) Certified SOC Analyst (EC-CSA) Required Skills: At least three (3) years minimum experience in software development More ❯
design and configuration Experience with firewalls, VPNs, network security monitoring, and vulnerability assessment tools Knowledge of software configuration management/version control tools Cisco, GIAC, CompTIA or other relevant network and cyber security certifications strongly preferred Education: As a minimum a Bachelor of Science Degree in engineering, computer science, or More ❯
writing clear and detailed technical reports . You have or are planning to pursue one or more of the following: OSCP, OSWE, eCPPTv2, CHFI, GIAC GPEN . Technical environment : Security standards: OWASP Top 10, MITRE ATT&CK Tools: Burp Suite Pro, Kali Linux, Nessus, Metasploit, Nmap DevSecOps principles and secure More ❯
CISSP, GIAC GREM or CREA Cert preferred. Degree in Comp Sci, Comp Eng, Info Sys or related discipline. Level 1 - AA + 4 years or BS + 2 years; Level 2 - AA + 7 years or BS + 5 years or MS + 3 years; Level 3 - AA + More ❯
CISSP, GIAC GREM or CREA Cert preferred. Degree in Comp Sci, Comp Eng, Info Sys or related discipline. Level 1 - AA + 4 years or BS + 2 years; Level 2 - AA + 7 years or BS + 5 years or MS + 3 years; Level 3 - AA + More ❯
Degrees or Certifications ● Preference on one or more of the following technical certifications: Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Reverse Engineering Malware (GREM), MCFE, EnCE or equivalent certifications ● Hands-on experience with Penetration Testing More ❯
Manager (CISM) Certified Authorization Professional (CAP) Certified Network Defender (CND) Information Systems Security Architecture Professional (ISSAP) Health Care Information Security and Privacy Practitioner (HCISPP) GIAC Certified Intrusion Analyst (GCIA) GIAC Security Leadership Certificate (GSLC) Information Systems Security Engineering Professional (ISSEP) Certified Ethical Hacker (CEH) Computer Hacking Forensics Investigator (CHFI) InformationMore ❯
and regulations to maintain the effectiveness of vulnerability management processes. Desired Skills/Experience Advanced certifications, such as the Offensive Security Certified Professional (OSCP), GIAC Certified Incident Handler (GCIH), or GIAC Vulnerability Assessment Professional (GVAP). Experience in Army, DoD, or IC environments with an emphasis on vulnerability management. Knowledge More ❯