Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience with web application and network pen testing methodologies. Proficiency in using penetration testing tools such as BurpSuite Pro, Nmap, and Nessus. Familiarity with Kali Linux and the associated penetration testing tool suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag. Excellent communication and technical More ❯
Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong experience with web application and network pen testing methodologies. Proficiency in using penetration testing tools such as BurpSuite Pro, Nmap, and Nessus. Familiarity with Kali Linux and the associated penetration testing tool suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag. Excellent communication and technical More ❯
a similar role within cybersecurity ️ Strong knowledge of common vulnerabilities (OWASP Top 10, CVEs) and attack techniques ️ Familiarity with penetration testing tools such as Burp Suite, Metasploit, Nessus, and Nmap ️ Certifications such as OSCP, CEH, or equivalent are highly desirable ️ Strong communication skills to present findings to both technical and non-technical stakeholders More ❯
work collaboratively with Blue Team and Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … Experience: • Seven (7) years of full-time professional experience conducting penetration testing or offensive Cyber operations in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. o Mimicking threat behavior. o Utilizing various operating systems (examples include Linux, Windows, MAC OS, etc.); o Utilizing Active Directory. o Performing exploit development. o Identifying … Seven (7) years of full-time professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. Mimicking threat behavior. Utilizing various operating systems (Linux, Windows, MAC OS); Utilizing Active Directory. Performing exploit development. More ❯
work collaboratively with Blue Team and Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … years of full-time professional experience conducting penetration testing or offensive Cyber operations including demonstrated experience in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. o Mimicking threat behavior. o Utilizing various operating systems (examples include Linux, Windows, MAC OS, etc.); o Utilizing Active Directory. NR3006 Attachment J.6 o Exploit development. … Seven (7) years of full-time professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. Mimicking threat behavior. Utilizing various operating systems (Linux, Windows, MAC OS); Utilizing Active Directory. Performing exploit development. More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Task Force Talent LLC
clearance. Cloud environments (AWS/Azure/Google Cloud Platform) Developing security test plans Linux/Windows as well as virtual and wireless platforms Infosec policies Tools such as nmap, Wireshark, Metasploit, IDA Pro, Encase, etc. Network security technologies (firewalls, proxies, iptables, VPN, IDS/IPS, etc.) Further details will be provided to qualified candidates after an initial interview. All More ❯
of the external threat environment and attacker tactics, techniques, and procedures Your skills and experiences: Demonstrable experience in penetration testing Proficient in penetration testing tools such as Burp Suite, Nmap, Metasploit etc CREST Registered Penetration Tester (CRT) The ability to clearly communication both verbally and written Practical Penetration Certifications such as PNPT/eCPPT Offensive Security Certified Professional (OSCP) CHECK More ❯
performance characterization (e.g. Wireshark, TCPdump, etc.). Understanding of network/cyber security, penetration testing, and information security best practices Understanding of Linux network security tools - (e.g. Metasploit, netcat, nmap, etc.). Experience building virtual infrastructure - (e.g. vSphere). Experience using scripting languages for automation, parsing data sets, and network monitoring (e.g. bash, Perl, Python, etc.). Experience in either More ❯
to work in a collaborative team environment utilizing agile methodologies Must be U.S. Citizen and willing and able to obtain a DoD Secret clearance. Preferred Qualifications. Proficient in Kali, Nmap, Wireshark, Metasploit Experience performing research for the DoD or IC Experience with one or more of the following source code analysis, red teaming, blue teaming, reverse engineering, advanced networking, cyber More ❯
will work onsite with the client doing high-end and cutting edge cyber related work with small dynamic technical teams You will use open source tools such Metasploit, BurpSuite, nmap and Wireshark as well as proprietary tools to perform red teaming and penetration testing of the client's global network You will reverse engineer network layouts using data collected from More ❯
3. Demonstrated experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and vulnerability analysis using both open-source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack. 4. Demonstrated experience analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cyber security More ❯
cyber security vulnerabilities. Developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and vulnerability analysis using both open-source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack. Analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cyber security vulnerabilities. Communications protocols More ❯
or Nessus Palo Alto Firewalls, InTune, Entra ID, Active Directory Desirable: Imperva WAF, Menlo Security, Cisco Secure Access/Umbrella, KnowBe4, AppCheck Ivanti or Automox patching Kali Linux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetration testing preferred Strong interpersonal and More ❯
or Nessus Palo Alto Firewalls, InTune, Entra ID, Active Directory Desirable: Imperva WAF, Menlo Security, Cisco Secure Access/Umbrella, KnowBe4, AppCheck Ivanti or Automox patching Kali Linux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetration testing preferred Strong interpersonal and More ❯
System Security Architecture Professional (ISSAP). Familiarity with the use and operation of security tools including: Tenable Nessus and/or Security Center, IBM Guardium, HP WeblInspect, NetworkMapper (NMAP), and/or similar applications. Experience working in a cloud environment, Amazon Web Services (AWS) or Microsoft Azure, Oracle Cloud Platforms, Google Cloud Platforms, ect. Preferred Qualifications: Degree in Computer More ❯
Associate Google - Professional Cloud Security Engineer Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, NetworkMapper (NMAP), and/or similar applications. BENEFITS OST is an Equal Opportunity Employer and has been operating since 1996 providing support on various contracts with Government agencies. We offer a comprehensive More ❯
environments (e.g., SIEM, intrusion detection/prevention systems, endpoint monitoring) Scripting experience using languages like Python, PowerShell, or Bash Familiarity with open-source diagnostic and assessment tools such as Nmap, Wireshark, and Kali Linux Solid understanding of established security frameworks and models (e.g., MITRE ATT&CK, NIST, and related methodologies) Comfortable using general productivity and communication software for remote collaboration More ❯
and enhancement of information systems security programs; infrastructure; application; Security Assessment and Authorization (SAA), IA policy directives (PD) and guides (PG); and IA Security tools (e.g., Tenable.io, Nessus Pro, NMap, etc.). The Contractor shall: Have excellent verbal and written communication skills to be able to accurately relate requirements and document all within the appropriate security document and/or More ❯
s easy to understand at all levels. Desired Qualifications: Previous ISSE experience directly supporting the customer Various security tools and reports such as GreenLight, Xacta, RoadRunner, Illuminate, Rapid 7, NMAP, WebInspect, App Detective, and Splunk Public, private and hybrid Cloud experience (AWS, Microsoft Azure, etc.) Basic knowledge is helpful, but not required for the following general topics: Cloud security control More ❯
Washington, Washington DC, United States Hybrid / WFH Options
ShorePoint, Inc
Who we are: ShorePoint is a fast-growing, industry recognized, and award-winning cybersecurity services firm with a focus on high-profile, high-threat, private and public-sector customers who demand experience and proven security models to protect their data. More ❯
z2ez0 • Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP WebInspect, NetworkMapper (NMAP), and/or similar applications. • Hold At least one of the following certifications: o Certified Information Systems Security Professional (CISSP), or o CISM or o Global Information Security Professional (GISP), or o the CompTIA Advanced More ❯
and DoD systems and be able to identify gaps in tools and development techniques. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using Tactics, Techniques and Procedures (TTPs) aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux More ❯
testing tools and techniques. Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.). Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.). Skill in reviewing logs to identify evidence of past intrusions. Skill in conducting application vulnerability assessments. Skill in performing impact/risk assessments. Skill to develop insights about More ❯
publications, and other Risk Management Framework (RMF) processes. Experience providing continuous monitoring support for information systems to include expertise in USG security compliance processes, scan tools and systems (NESSUS, NMAP, Rapid7, WebInspect, AppDetective, Nipper, ICD-503 RMF, SNOW) Advanced problem solving skills: able to use prior experience and knowledge to address new situations; especially during interactions with clients. Experience providing More ❯
publications, and other Risk Management Framework (RMF) processes. Experience providing continuous monitoring support for information systems to include expertise in USG security compliance processes, scan tools and systems (NESSUS, NMAP, Rapid7, WebInspect, AppDetective, Nipper, ICD-503 RMF, SNOW) Advanced problem solving skills: able to use prior experience and knowledge to address new situations; especially during interactions with clients. Experience providing More ❯