Our client is a specialised offensivesecurity company delivering high-impact red teaming, adversary simulation, and technical security assessments to global clients. Role: OffensiveSecurity Team Lead/Infrastructure Team Lead Location: Amsterdam Type: Permanent Workplace Type: Hybrid/Remote, 1-2 days in office Language: Dutch speaking role Role: Our client is looking for … Senior Security Consultants or Technical Security Leads to join as their Infrastructure Team Lead. Y ou will be responsible for designing, developing, and maintaining the infrastructure that powers their red team operations, adversary simulations, and tooling. Key Responsibilities: Act as a trusted advisor to clients, translating complex cybersecurity concepts into business-friendly language. You coordinate technical cyber security consultancy assignments with the client You will lead a range of assignments and technical security assessments Stay updated on emerging threats, security technologies, and regulatory requirements to provide informed recommendations. Collaborate with internal technical teams to ensure the seamless delivery of security solutions. Build and maintain strong relationships with stakeholders Key Requirements: Professional level of Dutch More ❯
Our client is a specialised offensivesecurity company delivering high-impact red teaming, adversary simulation, and technical security assessments to global clients. Role: OffensiveSecurity Team Lead/Infrastructure Team Lead Location: Amsterdam Type: Permanent Workplace Type: Hybrid/Remote, 1-2 days in office Language: Dutch speaking role Role: Our client is looking for … Senior Security Consultants or Technical Security Leads to join as their Infrastructure Team Lead. Y ou will be responsible for designing, developing, and maintaining the infrastructure that powers their red team operations, adversary simulations, and tooling. Key Responsibilities: Act as a trusted advisor to clients, translating complex cybersecurity concepts into business-friendly language. You coordinate technical cyber security consultancy assignments with the client You will lead a range of assignments and technical security assessments Stay updated on emerging threats, security technologies, and regulatory requirements to provide informed recommendations. Collaborate with internal technical teams to ensure the seamless delivery of security solutions. Build and maintain strong relationships with stakeholders Key Requirements: Professional level of Dutch More ❯
client emulate potential nation-state peer adversary cyber reconnaissance, exploitation techniques, and attack capabilities against a targeted mission, system, network, component, or capability. Successful candidates will be passionate about offensive cyber operations and the technical disciplines involved in emulating sophisticated adversarial activity to demonstrate cyber risk-to-mission. This position will be on-site at Fort Belvoir, VA due … to the nature of the classified work. Responsibilities include: - Plan and execute computer network operations against U.S. government organizations worldwide to strengthen information system security, identify intrusions and vulnerabilities, and recommend mitigation strategies. - Maintain operational, technical, and authoritative situational awareness during threat emulation-based exploitation and operations. - Perform advanced penetration tests against U.S. government organizations as required. - Perform remote … other Cyber Red Team Members. - Support the development of Cyber Red Team training modules, standard operating procedures, assessment planning, assessment reporting, white papers, briefs, and other technical documentation. Experience: - Offensivesecurity or significant penetration testing experience - Ability to communicate complex technical and programmatic information, often in the form of verbal and visual operational updates, situational awareness reports, and More ❯
for. Job Description: Parsons is looking for an amazingly talented Senior Red Cyber Operator to join our team! In this role you will get to conduct red team assessments, offensive cyber operations, and penetration testing. What You'll Be Doing: Penetration Testing Red Team Assessments Offensive cyber operations Will direct the activities of mid-level operators Antivirus evasion … of assessment Technical Lead. This assessment-specific leadership position guides the technical planning, execution, and reporting of a specific assigned assessment 3+ years' experience in conducting red team assessments, offensive cyber operations, or penetration testing and be prepared to direct the activities of mid-level operators. Special requirements: Professional Certification(s) required for this position are as follows: o … DCART senior operator aptitude test before joining DCART as an Operator. Must be willing to travel 15%- OCONUS/CONUS locations What Desired Skills You'll Bring: 5+ years Offensive Cyber experience, DoD Cyber Red Team Experience, or corporate Red Team experience. Red Team Apprentice Course (RTAC), Rogue Ops- Red Team 1 ROPS, Red Team Journeyman Course (RTJC), Certified More ❯
over 20 years of expertise in training, consulting, technology, and operational support, the company provides services to the military, government, and law enforcement. Committed to excellence, innovation, and national security, Oak Grove Technologies fulfills federal defense contracts and actively supports veterans through sponsorships and events. Driven by its mission-focused approach, the company seeks top talent to develop impactful … solutions. Oak Grove Technologies offers a competitive compensation and benefits package. Requirements What You'll Be Doing: Penetration Testing Red Team Assessments Offensive cyber operations Will direct the activities of mid-level operators Antivirus evasion, EDR evasion What Required Skills You'll Bring: Active TS/SCI Clearance Must be capable of meeting both apprentice operator requirements and journeyman … of assessment Technical Lead. This assessment-specific leadership position guides the technical planning, execution, and reporting of a specific assigned assessment 3+ years' experience in conducting red team assessments, offensive cyber operations, or penetration testing and be prepared to direct the activities of mid-level operators. Special requirements: Professional Certification(s) required for this position are as follows: Must More ❯
specific leadership position guides the technical planning, execution, and reporting of a specific assigned assessment. Senior Red Cyber Operators shall have 3+ years' experience in conducting red team assessments, offensive cyber operations, or penetration testing and be prepared to direct the activities of mid-level operators. Special requirements: Professional Certification(s) required for this position are as follows: - Must … DCART senior operator aptitude test before joining Defense Threat Reduction Agency (DTRA) Cyber Assessment Red Team (DCART) as an Operator. In addition, desired skills/certifications are: - 5+ years Offensive Cyber experience, DoD Cyber Red Team Experience, or corporate Red Team experience. - Red Team Apprentice Course (RTAC), Rogue Ops- Red Team 1 ROPS, Red Team Journeyman Course (RTJC), Certified … Red Team Operator (CRTO) certification, OffensiveSecurity, Certified Professional (OSCP), Global Information Assurance Certification, (GIAC) Exploit Researcher & Advanced Penetration Tester (GXPN), GIAC Penetration Tester (GPEN), and/or GIAC Web Application Penetration Tester (GWAP). - Expertise in antivirus evasion, EDR evasion, and/or penetration testing TS/SCI Required US Citizenship Required Amentum is proud to be More ❯
energy services teams. The Offices are located on the river Tees with close access to walks, shops and restaurants. The Opportunity We are now recruiting for an ICT Information Security Manager our Head Office. This is an exciting opportunity to join the team as you will take responsibility for delivering a broad range of key ICT Information Security … Plan to business growth initiatives such as site transitions/acquisitions in the UK and Abroad. In this role, you will serve as a pillar of px's Information Security program by driving and managing InfoSec activities, ensuring success through collaboration with internal and external partners. You'll be supported with personalised on the job training, coaching, mentoring and … twice-yearly development and performance reviews to help maintain & develop your contributions and competence. Degree in relevant ICT subject Previous experience as an Information Security Manager leading cyber/data security & compliance teams in a similar sized organisation(s). Experience managing an enterprise risk register. Experience managing InfoSec gathering and reporting metrics. Experience spearheading offensivesecurityMore ❯
Do you have a passion for high scale services and working with some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerability management and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and … leading efforts to increase security posture. In this key role, you will critically assess security architecture decisions, and lead the charge in secure planning, development, and coordination. Your expertise will guide the team through intricate cloud security challenges, ensuring our defences are both robust and adaptable. Who We Are We are a world-class team of high … calibre application security researchers and engineers who thrive on new challenges. We are an inclusive and diverse team with a full spectrum of experience distributed globally. We have the resources of a large enterprise and the energy of a start-up, working on a critical Greenfield software assurance project collaboratively with our cloud and mobile engineering teams. The Software More ❯
London, England, United Kingdom Hybrid / WFH Options
Oracle
Do you have a passion for high scale services and working with some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerability management and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and … leading efforts to increase security posture. In this key role, you will critically assess security architecture decisions, and lead the charge in secure planning, development, and coordination. Your expertise will guide the team through intricate cloud security challenges, ensuring our defences are both robust and adaptable. Who We Are We are a world-class team of high … calibre application security researchers and engineers who thrive on new challenges. We are an inclusive and diverse team with a full spectrum of experience distributed globally. We have the resources of a large enterprise and the energy of a start-up, working on a critical Greenfield software assurance project collaboratively with our cloud and mobile engineering teams. The Software More ❯
with Polygraph REQUIRED EXPERTISE: • Master's degree or PhD in computer science, mathematics, or relevant field. • 1 + years post-graduate experience in cyber operations; operational experience supporting a security operations center (SOC), Computer Emergency/Incident Response team, or Intelligence Community/DoD Computer Network Defense (CND) mission is highly desired but not required. • 2+ years project management … cybersecurity experience. • 2+ years of experience in system integration and software development. • Experience designing or participating in Capture-the-Flag, or Hack-the-Box events. • Ethical Hacking certification (e.g., OffensiveSecurity Certified Professional (OSCP , or equivalent experience or training. • Technical expertise and professional work in three or more of the following areas within the past five years (post More ❯
the development of threat intelligence products, technical reports, and briefings for senior government officials and technical stakeholders, and will be expected to stay abreast of the latest trends in offensivesecurity research, reverse engineering tools and techniques, and emerging exploit methodologies. Required Experience: - Demonstrated skill in conceiving, planning and conducting research in problem areas of considerable scope and … techniques. - Technical experience in reverse engineering techniques, identification and exploitation of vulnerabilities in critical systems, and development of mitigation strategies. - Experience with exploit development techniques, shellcode writing, and bypassing security mitigations. - Demonstrated experience with modern software development methodologies (e.g., Agile, DEVOPS/DEVSECOPS). - Demonstrated experience in the use of advanced techniques, theories, precepts, and practices for end to … rapidly gaining insights into current and next-generation research and prototyping, preferably with hands-on leadership of research and development programs in the defense sector. - Contributed to open-source security tools or research publications. - DARPA experience preferred Strategic Analysis, Inc. is an Equal Opportunity employer and is committed to non-discrimination in employment. All qualified applicants will receive consideration More ❯
Hi All, I'm currently recruiting for multiple pentesting, red team and other offensivesecurity positions for a scale up based in Ghent who specialise in OT and offensive security. They have a culture emphasising collaboration, joint success and technical excellence and work on a variety of projects across the European market. Offer: If this could be More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
General Dynamics Information Technology
Red Team assessments provide customers with actionable information to implement risk management strategies for mission assurance to prevent, protect, and mitigate threats to assets and operations critical to national security and the National Military Strategy HOW A SOFTWARE DEVELOPER WILL MAKE AN IMPACT: Host-based computer forensics, network-based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/… analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or software exploit development. WHAT YOU'LL NEED TO SUCCEED: Required Experience … 5+ years of related experience Required Technical Skills: OffensiveSecurity Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM) Security Clearance Level: TS/SCI US Citizenship Required Location: Hybrid-Ft. Belvoir, VA Required Skills and Abilities: Must be proficient in offensive capability development for Windows environments. More ❯
Our client is a renowned health care provider across the Netherlands and is looking to mature their Cyber and Information Security operations. As a Technical Security Officer : You make proposals for the continuous improvement of ICT security. You work closely with the information security officer to translate information security policy into specific technical security guidelines … which can be used by management and development teams. You coordinate security-related processes and actively monitor the design and operation of security measures. With your experience in the field of Azure, M365, networks, NEN7510 and NIS2 you are able to identify important concrete technical security measures. You draw up security policies and describe them in … clear language. You understand that there must be a healthy balance between security and user-friendliness. That is why you work pragmatically and carefully consider each security measure. You guide the implementation of the measures and monitor their design. In addition, you guide the external support and management teams and advise management on technical issues regarding information security. More ❯
client is a multi-international transportation technology company, and they are looking for a Pen tester here in Toronto. If you'd like to grow your skill set in OffensiveSecurity, this is the place. You'll be able to gain hands-on experience. Contract Duration: 6 Months (Possible Extension) What You Will Be Doing Tech Breakdown … Automation 50% Manual Daily Responsibilities SQL Injection & Cross-site scripting Grey box penetration testing, and perform access control Identify and exploit vulnerabilities to assess security risks. Communicate with clients about security issues and provide tailored solutions. Collaborate with developers and security teams to remediate discovered vulnerabilities. Develop detailed reports with findings and recommendations. Assist/Create rules More ❯
years of experience in professional software development. Strong programming skills. Great skills in data engineering and big data technologies. Highly skilled with object-orientation and software development best practices. OffensiveSecurity Certified Professional (OSCP) . Certified Information Security Manager (CISM) . Information Systems Security Architecture Professional (ISSAP) is essential. Certified Authorization Professional (CAP) . Information Assurance … listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30+ YEARS EXPERIENCE PSYCHOLOGIST STAGE 3: PRE-SCREENING (verification checks & DV security clearance) STAGE 4: INTERVIEW WITH THE CEO, CTO & GC More ❯
of Data Processing and Governance, and V.P of Software Engineering and Advanced Analytics to determine technical requirements and will undergo a formal approval, review, and voting by representatives for security impact analysis (the Change Approval Board). WHAT ARE WE LOOKING FOR: A proven record of implementation of method transformers. The technical ability to convert one data-frame into … Python, R, Scala, SQL, JAVA, C++, and C#. 10+ years of experience as a Software Engineer. Extensive experience in AI-powered software development management and advanced analytics. Certified Information Security Manager (CISM) is essential. OffensiveSecurity Certified Professional (OSCP), Certified Information Security Manager (CISM) is essential. Certified Authorization Professional (CAP) Information Assurance System Architecture and Engineer … the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: Cognitive Ability Test STAGE 2: Cognitive Assessment Screening with a 30+ years experienced psychologist STAGE 3: Pre-Screening (verification checks & security clearance) STAGE 4: Interview with the CEO, CTO & GC More ❯
next, right now. We've got what you're looking for. Job Description: Parsons is seeking highly skilled Software Engineers to develop cyber solutions in support of critical national security operations and collaborate with a multidisciplinary team of hardware and RF engineers. This role involves deep technical work across reverse engineering, vulnerability assessments, and mobile and embedded systems development. … cryptographic capabilities and steganography techniques to enhance software resilience. Support hardware-based software development, including modification of physical devices. Perform penetration testing on custom and commercial systems to validate security posture. Provide rapid prototyping and field-ready tools in support of mission operators. Qualifications: Bachelor's or Master's degree in Computer Science, Electrical Engineering, or related field. Minimum … in reverse engineering tools (IDA Pro, Ghidra, Radare2). Strong knowledge of mobile OS internals (Android/iOS) and Windows internals. Hands-on experience with pen testing frameworks and offensivesecurity tools (e.g., Metasploit, Cobalt Strike). Proficiency in low-level programming languages (C, C++, Assembly) and scripting (Python, Bash). Familiarity with secure coding practices, cryptography, and More ❯
Stockport, Lancashire, United Kingdom Hybrid / WFH Options
zyncgroup.io
impactful results while contributing to their vision of shaping a better future. In this role, you will be responsible for: Contributing to the setup and ongoing enhancement of the Security Operations Center (SOC). Investigating security incidents and implementing effective countermeasures. Utilizing SOC tools such as SIEM, vulnerability scanners, and incident response solutions. Performing threat hunting by analyzing … and assessing security events on central platforms. Documenting incidents thoroughly in ticketing and SIEM systems, and generating detailed reports. Monitoring systems for attacks or unusual behavior and taking appropriate action. Running automated vulnerability scans, interpreting results, and reporting findings to clients. This role is hybrid in Schleswig-Holstein. Essential qualifications: At least one year of professional experience working in … a SOC or similar role (working student experience is acceptable). Experience working with EDR/XDR. Strong knowledge of IT networks and operating systems. Basic knowledge of offensivesecurity concepts. Experience with programming languages such as Python and SQL. Minimum C1 level in German with good knowledge of English. Desirable skills: Experience working with Sophos. Incident response More ❯
Senior Digital Forensic & Incident Response Analyst - Remote - Circa £80,000 My client is a DFIR and offensivesecurity specialist consultancy looking to expand their DFIR capabilities by onboarding an experienced technical DFIR analyst. This position will be remote, with occasional attendance at client sites to provide containment and remediation services to a range of clients. Responsibilities of a More ❯
Senior Digital Forensic & Incident Response Analyst - Remote - Circa £80,000 My client is a DFIR and offensivesecurity specialist consultancy looking to expand their DFIR capabilities by onboarding an experienced technical DFIR analyst. This position will be remote, with occasional attendance at client sites to provide containment and remediation services to a range of clients. Responsibilities of a More ❯
Senior Digital Forensic & Incident Response Analyst - Remote - Circa £80,000 My client is a DFIR and offensivesecurity specialist consultancy looking to expand their DFIR capabilities by onboarding an experienced technical DFIR analyst. This position will be remote, with occasional attendance at client sites to provide containment and remediation services to a range of clients. Responsibilities of a More ❯
City of London, London, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
Senior Digital Forensic & Incident Response Analyst - Remote - Circa £80,000 My client is a DFIR and offensivesecurity specialist consultancy looking to expand their DFIR capabilities by onboarding an experienced technical DFIR analyst. This position will be remote, with occasional attendance at client sites to provide containment and remediation services to a range of clients. Responsibilities of a More ❯
East London, London, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
Senior Digital Forensic & Incident Response Analyst - Remote - Circa £80,000 My client is a DFIR and offensivesecurity specialist consultancy looking to expand their DFIR capabilities by onboarding an experienced technical DFIR analyst. This position will be remote, with occasional attendance at client sites to provide containment and remediation services to a range of clients. Responsibilities of a More ❯
Bury, Greater Manchester, United Kingdom Hybrid / WFH Options
LT Harper - Cyber Security Recruitment
Senior Digital Forensic & Incident Response Analyst - Remote - Circa £80,000 My client is a DFIR and offensivesecurity specialist consultancy looking to expand their DFIR capabilities by onboarding an experienced technical DFIR analyst. This position will be remote, with occasional attendance at client sites to provide containment and remediation services to a range of clients. Responsibilities of a More ❯