topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
or signals intelligence analysis Nice If You Have: Experience with dataflow and signals intelligence architecture Experience with programming languages for scripting and automation, including Python or C++ Experience with penetrationtesting tools Knowledge of ports, protocols, and common network configurations Knowledge of IT logging best practices Bachelor's degree Network+, Security+, CEH, CCNA, or SANS Certification Clearance: Applicants More ❯
and procedures Experience with computer programming languages, including PhP, Python, SQL, C++, Perl, or Java Experience with SIEM and Endpoint tools, including Splunk, Defender, QRadar, and ArcSight Experience with penetrationtesting TS/SCI clearance with a polygraph CEH and Security+ or CSA+ Certification, and GIAC Cyber Threat Intelligence ( GCTI ) Certification Clearance: Applicants selected will be subject to More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
following areas as possible, and be able to demonstrate it: Security Detection and Monitoring Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) PenetrationTesting Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management (Qualys, Nessus, Nexpose) Anti-Malware More ❯
experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
assessments of applications supporting global mission activities. The ideal candidate will have: Demonstrated experience using Splunk to ingest and analyze network data Demonstrated experience in network vulnerability analysis and penetrationtesting with both open-source and commercial tools, such as Cobalt Strike, Nmap, Wireshark, Metasploit, Canvas, Kismet, BackTrack. Demonstrated experience providing in-depth holistic analysis of a technical More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
cyber related work with small dynamic technical teams • You will open-source tools such Metasploit, BurpSuite, nmap and Wireshark as well as proprietary tools to perform red teaming and penetrationtesting of the client's global network • You will develop technical requirements for new tools or enhancements to existing tools and become the tools "champion" throughout the tool More ❯
cyber related work with small dynamic technical teams • You will open-source tools such Metasploit, BurpSuite, nmap and Wireshark as well as proprietary tools to perform red teaming and penetrationtesting of the client's global network • You will develop technical requirements for new tools or enhancements to existing tools and become the tools "champion" throughout the tool More ❯
have skills, expertise, and experience in multiple areas including security requirements, security architecture views, threat assessment, networking, security technologies, hardware and software security, security test and evaluation, vulnerability assessment, penetrationtesting, and supply chain security risk assessment. This position works with Integrated Product Teams (IPTs), Mission Partner Teams (MPTs), and other stakeholders (internal and external) supporting ICBM weapon More ❯
the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard's environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work in preventing potential breaches that could lead to financial loss … until it's publicly disclosed and assigned a CVE. This combination of concepts is key in managing andmitigating security risks in any environment. This experience piqued my interest in penetrationtesting, leading me to my current role as a Pen Tester at Mastercard. My career path wasn't linear, but each step taught me something valuable and brought me closer to More ❯
multi vendor solutions, including Microsoft security, compliance and identity services. Managed SOC Managed XDR Cloud Security (M365, Azure, AWS) Managed SIEM (Sentinel + multi vendor) Security Professional Services Pen Testing Red Teaming ISO27001/Cyber Essential Plus Apps/Infra testing You role will be to drive sales across through a mix of marketing campaigns, events and direct More ❯
/7 shift-based role) Desirable Qualifications and Experience Experience in a client-facing technical or consulting role Background in one or more of the following areas: SOC, Pen Testing, InfoSec, Networking, Systems Administration Knowledge of cybersecurity concepts including BGP, WAF, and CDN Familiarity with cloud platforms (AWS, Azure, GCP) Scripting abilities (e.g., Python, Bash) for automation or data More ❯
security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they cause. - Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. - Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. - Installing security measures and operating software to protect systems and information infrastructure, including More ❯
applications and infrastructure, vulnerability research, and generation of assessment reports. The individual contributes to the selection of appropriate technical tests, network or vulnerability scan tools, and/or pen testing tools based on review of requirements and purpose; lists all steps involved for executing selected test(s) and coaches others in the use of advanced research, development, or scan More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
We are seeking a skilled and proactive Cloud Security Engineer to conduct white-hat security testing on our SaaS-based application, which is deployed across multiple cloud providers. You will be responsible for identifying vulnerabilities, assessing risks, and helping us implement secure practices, including the integration of Trusted Execution Environments (TEEs) . Key Responsibilities: Perform white-hat (ethical) penetrationtesting on our cloud-hosted SaaS appliance. Identify and report vulnerabilities across application layers, APIs, and infrastructure. Collaborate with development teams (Go and Node.js) to remediate security issues. Evaluate and Test TEE solutions (e.g., AWS Nitro Enclaves, Azure Confidential Computing and Google Confidential Computing.). Conduct threat modeling and risk assessments. Develop and maintain security testing tools … and automation scripts. Stay current with emerging security threats, vulnerabilities, and mitigation techniques. Proven experience in penetrationtesting and ethical hacking. Strong understanding of cloud security (AWS, Azure, GCP). Familiarity with Go and Node.js application security. Experience with TEE technologies or confidential computing. Knowledge of OWASP Top 10, CVEs, and secure coding practices. Proficiency with tools like More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
Job Title: Penetration Tester Role: An exciting opportunity for a mid-level Penetration Tester to join a dynamic and collaborative security consultancy based in London. This role is ideal for a proactive individual with a hacker’s mindset and broad security testing experience across applications, networks, cloud platforms, and more. You'll be a key player in … delivering high-quality penetration tests while also supporting client advisory, team development, and process improvement. What’s in it for you? Autonomy and ownership in conducting diverse penetrationtesting engagements. Ongoing professional development with access to industry events and training. A positively charged work environment with flexibility for hybrid working post-probation. Responsibilities: Conduct web, mobile, API … infrastructure, cloud, and wireless penetration testing. Create detailed technical reports and deliver test findings directly to clients. Provide remediation advice and post-assessment consultancy. Contribute to internal testing methodologies and Red Team/social engineering activities. Mentor junior team members and support collaborative delivery of projects. Occasionally support the creation of marketing materials such as research papers and More ❯
future for our shareholders. Join our team and discover why we are a top veteran employer and Certified Great Place to Work ASRC Federal is seeking an experienced Cyber Penetration Tester (Expert) to lead advanced security assessments and contribute to the development and execution of penetrationtesting strategies. This role combines hands-on testing with leadership … mentoring, and collaboration across cybersecurity disciplines. Responsibilities Lead and perform advanced security assessments, including hands-on penetrationtesting of systems and applications. Identify vulnerabilities, assess risks, and deliver clear, actionable remediation recommendations. Develop and maintain assessment plans aligned withNIST SP 800-53 and FedRAMP Cloud Security Controls. Execute security assessments per defined plans and document findings accurately and … promptly. Design, develop, and maintain tools/scripts to automate and enhance penetrationtesting activities. Manage and mentor a small team of junior penetration testers; provide technical guidance and training. Build and lead a Purple Team to perform joint red/blue team exercises with customer sites. Support secure systems operations and maintenance, including security validation and More ❯
Penetration Tester required for my client based in Leeds/London - visit office 2 x per month. This is a permanent opportunity. Salary approx. £50-80k. Are you a skilled ethical hacker with a passion for uncovering vulnerabilities? My client are a fast-growing cybersecurity reseller/MSP delivering cutting-edge security solutions across multiple sectors. The Role … As the Penetration Tester, you’ll simulate cyberattacks on client environments—testing networks, apps, cloud platforms, and more—to expose weaknesses and recommend fixes. You’ll work on red/purple team engagements, social engineering tests, and cloud security assessments, delivering high-impact reports that drive real security improvements. What You’ll Do: Perform infrastructure, web app, wireless … and cloud penetration tests Execute red team simulations and assumed breach scenarios Craft clear, actionable reports for both technical and executive audiences Stay ahead of emerging threats, exploits, and attack techniques Collaborate with cyber, managed services, and compliance teams Skills You’ll Need: 2-5+ years in penetrationtesting (network, web, cloud, etc.) Mastery of tools More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetrationtesting and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow professionally. Dionach by Nomios holds impressive … If you require accommodations during the application process, let us know, and we'll work to meet your needs. What You'll Do Lead and mentor a team of Penetration testers, fostering a collaborative and high-performance work environment. Lead and oversee complex infrastructure penetration tests ensuring that they are conducted thoroughly and in accordance with project requirement. … scoping. You will have the opportunity to work on a wide range of services: web and mobile application tests, internal tests, infrastructure tests, but also, social engineering. Ensure all testing activities comply with CHECK standards. What We're Looking For Experience : Significant experience in penetrationtesting, including network, web application and internal penetrationtesting as More ❯
Job Number: R Penetration Tester Key Role: Find possible vulnerabilities while using penetrationtesting tools and techniques, to ensure security of computer systems, applications, servers, and networks. Apply advanced skills and extensive technical expertise, including full industry knowledge. Develop innovative solutions to complex problems. Work without considerable direction, and mentor and supervise team members. Basic Qualifications: 5+ … years of experience with cyber penetrationtesting or developing risk and threat mitigation plans 5+ years of experience operating in Linux, Windows, and virtual platforms 5+ years of experience with computer attack methods and system exploitation techniques 5+ years of experience leveraging adversarial tactics to c ond uct hands-on security testing 5+ years of experience performing … or C, to find security issues Bachelor's degree in CS, Information Systems, Engineering, or a related field Certified Ethical Hacker ( CEH ) , Offensive Security Certified Professional ( OSCP ) , HTB Certified Penetration Tester Spe cia list ( CPTS ) , eLearnSecurity Junior Penetration Tester ( EJPT ) , GIAC Global Information Assurance Penetration Tester ( GPEN ) , or GIAC Cloud Penetration Tester Certification Clearance: Applicants selected More ❯
Cyber Security Engineer (Penetration Tester) Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: Secret Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US The Opportunity: CACI seeks a motivated, mid-level Cyber Security Engineer to support the C5ISR Center at Aberdeen Proving Ground, MD. You will join a … to perform security assessments in search of vulnerabilities and identify mitigations. Conduct vulnerability assessments on web applications, networked devices, standalone software products, and other technologies as assigned using the penetrationtesting life cycle . Maintain test efficacy by identifying and applying new testing tools and techniques. Conduct research and development efforts to explore current and emerging technologies. … on site at APG, MD. Telework is not available. DoD 8570 IAT Level II certification (Security+ or equivalent). Must have 5+ years of experience with offensive security/penetrationtesting tools and methodologies to assess technologies for vulnerabilities and exploits at the network and application levels. Intermediate knowledge of Linux and Windows internals. Thorough technical understanding of More ❯