Experience must be in computer or info systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Strong knowledge of web/mobile security (OWASP Top 10, API security), cloud security (AWS), and CI/CD pipeline hardening Familiar with SAST/DAST tools, vulnerability scanners, penetrationtesting frameworks, and monitoring platforms (e.g. Splunk, ELK, Datadog) Understanding of GDPR and data privacy best practices Tremendous opportunity offering plenty of scope for career progression in a More ❯
must be in computer or information systems design/development/analysis, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC will be More ❯
in computer or information systems design/development/analysis roles may include may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Excellent communication and collaboration skills to interface across NSA Strong target and content discovery More ❯
analysis, and metadata analysis. Education and Training Qualifications: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Location: Annapolis Junction MD Salary: 125K-135K Background Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering Experience in network or system administration Requirements AA + 7 yrs or, B.A. + 5 yrs or Masters More ❯
cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Provides DevOps solutions enabling software quality assurance for vulnerability research, reverse engineering, penetrationtesting (red/blue teams), and develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge. of subject matter (hardware, software, networks, cloud, etc. More ❯
in computer or information systems design/development/analysis. In addition, it may also include: Engineering hardware and/or software Programming Computer/network security Vulnerability analysis Penetrationtesting Computer forensics Information assurance Systems engineering and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Leicester, Leicestershire, England, United Kingdom
Sanderson
life cycles, QA, CI/CD, and DevOps. Technical knowledge: Development : C#, JavaScript, JSON, GitHub workflows Platform : Azure, Microsoft stack Data : CRM data models & integration Infrastructure : Security, cyber, pen-testing, scalable environment If this role sounds of interest and you would like to know more, do not hesitate to contact me on Reasonable Adjustments: Respect and equality are core More ❯
life cycles, QA, CI/CD, and DevOps. Technical knowledge: Development : C#, JavaScript, JSON, GitHub workflows Platform : Azure, Microsoft stack Data : CRM data models & integration Infrastructure : Security, cyber, pen-testing, scalable environment If this role sounds of interest and you would like to know more, do not hesitate to contact me on Reasonable Adjustments: Respect and equality are core More ❯
Surrey, England, United Kingdom Hybrid / WFH Options
Ashdown Group
as you will inherit an existing client base and a busy order book. With over three decades of expertise, our client has grown into a trusted name in cybersecurity, penetrationtesting, compliance, cloud recovery, and enterprise-grade data protection. This is an exciting opportunity to join a business at the forefront of the industry, working with mid-market More ❯
New Malden, London, United Kingdom Hybrid / WFH Options
Ashdown Group
as you will inherit an existing client base and a busy order book. With over three decades of expertise, our client has grown into a trusted name in cybersecurity, penetrationtesting, compliance, cloud recovery, and enterprise-grade data protection. This is an exciting opportunity to join a business at the forefront of the industry, working with mid-market More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Kyrus Tech, Inc
/attack operations leadership experience (note this is distinct experience from the above and cannot overlap). Minimum 3 years of hands-on experience with using modifying and customizing penetrationtesting and red teaming software frameworks (Cobalt Strike, Kali, etc.) to meet operational requirements. Minimum 2 years of independently conducting every phase of a red team exercise on More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Claranet Limited
on meeting or exceeding sales-related KPIs (you may be required to provide evidence) Working knowledge of at least three of the following technology areas – PaaS, IaaS, SD-WAN, PenetrationTesting, MDR/EDR, PowerBI, Ethernet/Broadband, Private Cloud, Databases. More ❯
Position Overview Support mission-critical operations by designing, developing, and executing automated testing solutions for secure continuous operations systems. You will play a pivotal role in validating and verifying functionality, performance, and security of both IT and operational technology (OT) components under strict compliance standards. Key Responsibilities Develop comprehensive test plans, automated test scripts, and test cases to validate … system requirements across SCOR platforms. Conduct functional, integration, regression, performance, and security testing-including vulnerability and compliance checks. Integrate automated tests within CI/CD pipelines; support DevOps workflows. Hire for Belonging+1Jobed.ai+1 Log, track, and manage defects; collaborate with stakeholders to drive timely resolution. Maintain and enhance automation frameworks in tools like Selenium, TestNG, JMeter, Appium, Postman, or Robot … Framework. Prepare reports, dashboards, and documentation aligned with FBI governance and compliance standards. Participate in User Acceptance Testing (UAT) and feedback coordination. Required Qualifications Bachelor's degree in Computer Science, Engineering, or related technical field-or equivalent experience. Minimum 5-8 years of experience in automation testing within complex IT/OT environments. Expertise in scripting languages such More ❯
Security, SPAA, incident response, cyber security, insider threat, computer forensics, vulnerability assessment and management, network data capture, intrusion detection, log management, auditing, security incident and event management (SIEM), and penetration testing. Personnel assigned to this role will serve primarily on the Operations & Response (O&R) Team; however, this role may also support the Vulnerability Assessment and Penetration Test … and mitigation; analyzing security system logs, security tools, and data; network monitoring, and intrusion detection using host-based and network-based intrusion detection systems (IDS) and log management applications; testing, installing, patching, and upgrading computer hardware and operating systems (Windows, and UNIX) in an enterprise environment; identifying, collecting, processing, documenting, reporting, cyber security/incident response events; architecting, engineering … developing and implementing cyber security/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software applications. • 3 years' experience using one or more of the following security tools: SourceFire, Arcsight, Splunk, NetWitness, Guidance Software, Digital Guardian, SureView, Intelliview, Nessus, and Foundstone. • 3 years' experience with Federal cybersecurity standards, industry best practices More ❯
develop, and deliver cutting-edge solutions in a scientific framework. You will work on a variety of mission-critical tasks, such as forensics, attack attribution, critical network protection, and penetration testing. Using your expertise in computer science, you will apply advanced techniques and tools, covering areas like operating systems, algorithms, and data structures, to tackle complex issues. You'll … computer science problems within a scientific framework. The solutions may arise in the forms of forensics and attack attribution, protection of critical networks, active systems warnings and indicators, active penetration into target systems, knowledge discovery of passive and active systems, or other cryptologic computer science mission support. Requisite computer science skills (operating systems, compiler theory, database theory, algorithm analysis More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Profectus Recruitment
are hiring for an experienced Business Development Manager for our market leading Cyber Security client. Our client specialises in offering Cyber Security Solutions, including but not limited to Pen Testing, Incident Response, Investigative Services and accreditations. If you have a passion for Cyber Security and a minimum of 2 years in Cyber Security sales then this could be the … to target clients. Essentials: A minimum of 2 years exceeding targets in a Business Development role specifically within Cyber Security. Knowledge of Cyber Services, such as incident response, Pen Testing or Digital Forensics. A competitive and Goals driven mindset. Well versed in the use of CRM software and additional sales software tools. Minimum of 5 years continual residency in More ❯
Business Development Representative (Cyber Security) - UK Wide Up to 80k (DOE) + Bonus A very exciting and unusual role. Our client is a fast-growing cyber security and compliance provider, and we're on the hunt for a Business Development More ❯
Business Development Representative (Cyber Security) - UK Wide Up to 80k (DOE) + Bonus A very exciting and unusual role. Our client is a fast-growing cyber security and compliance provider, and we're on the hunt for a Business Development More ❯
Business Development Representative (Cyber Security) - UK Wide Up to 80k (DOE) + Bonus A very exciting and unusual role. Our client is a fast-growing cyber security and compliance provider, and we're on the hunt for a Business Development More ❯
Good skills with Python & Jupyter, as well as HTML to help maintain previous web page build. Evaluate and help enhance content analytics for machine translation systems using modern methods. Evaluate Natural Language Processing software to see which works best on More ❯
Business Development Representative (Cyber Security) - UK WideUp to 80k (DOE) + Bonus A very exciting and unusual role. Our client is a fast-growing cyber security and compliance provider, and we're on the hunt for a Business Development Representative More ❯