requirements, and crew progression. Instruct students on identifying, analyzing, and mitigating cyber threats, including strategies for protecting networks, data, and critical infrastructure. Offer training in offensive cyber operations, including penetrationtesting, ethical hacking, and vulnerability assessment techniques. Prepare students for effective incident response by providing hands-on training in detecting, analyzing, and mitigating cyber incidents Qualifications Minimum Bachelors More ❯
cyber related work with small dynamic technical teams • You will open-source tools such Metasploit, BurpSuite, nmap and Wireshark as well as proprietary tools to perform red teaming and penetrationtesting of the client's global network • You will develop technical requirements for new tools or enhancements to existing tools and become the tools "champion" throughout the tool More ❯
on current platform(s). Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. Develop and maintain security incident response plans and procedures. Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. Deploy and manage machines More ❯
security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they cause. - Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. - Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. - Installing security measures and operating software to protect systems and information infrastructure, including More ❯
security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including More ❯
security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including More ❯
on current platform(s). - Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) - Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. - Develop and maintain security incident response plans and procedures. - Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. - Deploy and manage machines More ❯
Full Scope Polygraph Clearance Status: Must be Current JOB DESCRIPTION: We are looking for someone who is well versed in devops, linux system administration and has a background in penetrationtesting and/or systems engineering to assist penetration testers with automating tasks, creating virtual infrastructure and assisting in performing tests in a virtual environment. JOB SUMMARY More ❯
Terraform, Ansible, Infrastructure as Code (IaC), DevOps, Kubernetes, Docker, Pen Testing, Splunk, Nutanix, Linux, Windows Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI clearance w/active polygraph. At least eight (08) years … customer requirements. These Qualifications Would be Nice to Have: Experience operating in an agile development environment and DevOps. Experience with container technologies such as Kubernetes and Docker. Knowledge of penetrationtesting or red team operations. Experience utilizing and development with Splunk. Experience with Nutanix. Defensive Cyber Security Operations. $175,000 - $200,000 a year The pay range for More ❯
Terraform, Ansible, Infrastructure as Code (IaC), DevOps, Kubernetes, Docker, Pen Testing, Splunk, Nutanix, Linux, Windows Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI clearance w/active polygraph. At least eight (08) years … customer requirements. These Qualifications Would be Nice to Have: Experience operating in an agile development environment and DevOps. Experience with container technologies such as Kubernetes and Docker. Knowledge of penetrationtesting or red team operations. Experience utilizing and development with Splunk. Experience with Nutanix. Defensive Cyber Security Operations. $175,000 - $200,000 a year The pay range for More ❯
will support multiple RMF accreditation efforts and will perform tasks that include determining DoD requirements, hardware/software configuration management (to include baseline configuration), risk assessments/vulnerability assessments, testing and documenting security controls, and ensuring overall compliance with DoD Cybersecurity policies. The ideal candidate will have experience working as an ISSO or security relevant field and must be … vulnerability, non-compliance with established cybersecurity standards and regulations, and recommend mitigation strategies to maintain operational security posture for the boundary systems • Conduct risk analyses from vulnerability, compliance scans, penetrationtesting results, and/or other audit activities • Create and maintain Plan of Action and Milestones (POA&Ms), System Security Plans (SSPs), Security Control Traceability Matrices (SCTMs), Standard More ❯
e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security). Relevant experience must be in vulnerability analysis, penetrationtesting, and/or computer forensics. In addition, may include computer of information systems design/development, programming, information/cyber/network security, systems engineering, and/ More ❯
Engineer will have first-class scoping and planning skills. The IT Project Engineer will host security consultations and conduct vulnerability assessments. The IT Project Engineer will oversee and direct PenetrationTesting exercises. The IT Project Engineer will be familiar with Cyber Essentials, Microsoft Copilot and PCI-DSS. The IT Project Engineer will be network-savvy. Think firewalls, switches More ❯
Engineer will have first-class scoping and planning skills. The IT Project Engineer will host security consultations and conduct vulnerability assessments. The IT Project Engineer will oversee and direct PenetrationTesting exercises. The IT Project Engineer will be familiar with Cyber Essentials, Microsoft Copilot and PCI-DSS. The IT Project Engineer will be network-savvy. Think firewalls, switches More ❯
Engineer will have first-class scoping and planning skills. The IT Project Engineer will host security consultations and conduct vulnerability assessments. The IT Project Engineer will oversee and direct PenetrationTesting exercises. The IT Project Engineer will be familiar with Cyber Essentials, Microsoft Copilot and PCI-DSS. The IT Project Engineer will be network-savvy. Think firewalls, switches More ❯
Engineer will have first-class scoping and planning skills. The IT Project Engineer will host security consultations and conduct vulnerability assessments. The IT Project Engineer will oversee and direct PenetrationTesting exercises. The IT Project Engineer will be familiar with Cyber Essentials, Microsoft Copilot and PCI-DSS. The IT Project Engineer will be network-savvy. Think firewalls, switches More ❯
london (city of london), south east england, united kingdom
Mongoose Gray
Engineer will have first-class scoping and planning skills. The IT Project Engineer will host security consultations and conduct vulnerability assessments. The IT Project Engineer will oversee and direct PenetrationTesting exercises. The IT Project Engineer will be familiar with Cyber Essentials, Microsoft Copilot and PCI-DSS. The IT Project Engineer will be network-savvy. Think firewalls, switches More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom Hybrid / WFH Options
Tank Recruitment
initiatives. Key Responsibilities Develop and execute an information security strategy and roadmap aligned with business goals. Lead on governance, compliance, and audit processes across the organisation. Manage incident response, penetrationtesting, and risk assessments. Support secure software development and supplier risk management. Promote security awareness and report regularly to senior leadership on risk posture. Skills & Experience Required Previous More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
security breaches and other cybersecurity incidents Document security breaches and assess the damage they cause Work with the security team to perform tests and uncover network vulnerabilities, such as penetrationtesting Fix detected vulnerabilities to maintain a high-security standard As a Cyber Threat Intel Analyst, you will recommend best practices for IT security Installing security measures and More ❯
Defense Analyst. CNDAs must have experience in network or system administration. Experience with Computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Foreign Language may count toward experience requirements. Desired: Relevant Certs or Specialized Training would include (but not limited More ❯
Chippenham, Wiltshire, England, United Kingdom Hybrid / WFH Options
Artis Recruitment
both technical teams and senior stakeholders. Desirable Skills 3CX VoIP solutions Email security and filtering (Mimecast, Barracuda) SonicWALL appliances Azure Site Recovery SQL Server, Power BI, and Data Visualisation Penetrationtesting or vulnerability scanning experience Project management appreciation Qualifications Required: Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Azure Solutions Architect Expert (AZ-305) Preferred: Azure Network More ❯
and the hardware and software that support it all. CNDA Requirements Experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, CNDAs must have experience in network or system administration. Qualifications Clearance Level TS/SCI level clearance More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯