Conducts on-site evaluations Validates the security requirements of the information system Verifies and validates that the system meets the security requirements Provides vulnerability assessment of the system Coordinates penetrationtesting Provides a comprehensive verification and validation report (certification report) for the information system Provides process improvement recommendations Assists the Government to draft standards and guidelines for usage More ❯
experience with network exploitation Nice If You Have : Experience with dataflow and signals intelligence architecture Experience with programming languages for scripting and automation, including Python or C++ Experience with penetrationtesting tools Knowledge of ports, protocols, and common network configurations Knowledge of IT logging best practices Network+, Security+, CEH, CCNA, or GPEN Certification Clearance: Applicants selected will be More ❯
as a Recruitment Agency Partner, it is essential and your responsibility to ensure that candidates applying to LSEG are aware of this privacy notice. Similar Jobs (2) Senior Manager, PenetrationTesting locations 2 Locations time type Full time posted on Posted 30+ Days Ago Senior Analyst, Technology and Cyber Security GRC locations London, United Kingdom time type Full More ❯
SOC, SIEM and log management technology). Good knowledge of IAM technologies and services. Good knowledge of Cloud Security Architecture and Technologies. Good knowledge of Cyber Security (Threat Modelling, Penetrationtesting, Risk Management, Cyber Defense Operations, Security Governance, Business resilience). Experience with or having a strong interest in the security of Industrial Control Systems is an extra More ❯
through all phases of the software development life cycle (SDLC). • Create and maintain continuous integration and deployment (CI/CD) pipelines. • Write scripts and configurations to automate software testing, deployment, and maintenance in a manner consistent with software engineering best practices • Proactively monitor build and deployment pipelines and infrastructure, apply patches, troubleshoot issues, and resolve errors. • Automate infrastructure … and/or cloud resource deployments and configuration using infrastructure-as-code tools. • Remediate findings from vulnerability scanning and penetration testing. • Informally mentor other staff in DevOps concepts and processes. • Work with peers and business partners to identify workflows or processes where automation can improve efficiency and or reduce costs. • Provide Application support, configuration, installation and troubleshooting • Troubleshoot technical More ❯
without a current clearance will not be considered. Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. Current experience with management of virtualized infrastructure, including multi More ❯
and market trends. Preferred Qualifications Bachelor's degree in Computer Science, Engineering, or a related technical discipline. Domain experience with security research/hacking as part of red teaming, penetrationtesting, and/or bug bounty programs, including methods, tools, and types of testing. Expertise in high-growth approaches to product discovery, planning, and development processes and tools More ❯
related work with small dynamic technical teams You will use open source tools such Metasploit, BurpSuite, nmap and Wireshark as well as proprietary tools to perform red teaming and penetrationtesting of the client's global network You will reverse engineer network layouts using data collected from the network itself to identify misconfigurations and to map out where More ❯
through all phases of the software development life cycle (SDLC). • Create and maintain continuous integration and deployment (CI/CD) pipelines. • Write scripts and configurations to automate software testing, deployment, and maintenance in a manner consistent with software engineering best practices • Proactively monitor build and deployment pipelines and infrastructure, apply patches, troubleshoot issues, and resolve errors. • Automate infrastructure … and/or cloud resource deployments and configuration using infrastructure-as-code tools. • Remediate findings from vulnerability scanning and penetration testing. • Informally mentor other team members in DevOps concepts and processes. • Work with peers and business partners to identify workflows or processes where automation can improve efficiency and or reduce costs. • Provide Application support, configuration, installation and troubleshooting • Troubleshoot More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it … on experience integrating third-party APIs and services into production systems - Proficiency in Python and at least one other backend language - Experience with modern development practices: CI/CD, testing, monitoring, and deployment - Experience taking ownership and driving projects to completion independently Benefits of becoming a Visionist: Your New Career - We are a 100% employee-owned company, so our More ❯
security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they cause. - Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. - Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. - Installing security measures and operating software to protect systems and information infrastructure, including More ❯
security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including More ❯
security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including More ❯
Godalming, Surrey, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
/365 escalation team by providing cover for network related issues managed by a on-call rota (every other week) Proactive security focus and remediation of tasks highlighted by penetration testing. Cloud Operations Networ k Engineer - Requirements : Minimum of 5 years in a Network role A good level of understanding of Fortinet or Cisco Experience in maintaining a security More ❯
analyse, and evaluate security threats, vulnerabilities, risks and solutions across the organisation. Develop, advise and implement risk mitigation strategies to minimise security threats. Conduct regular security assessments, audits, and penetration testing. Undertake security threat assessments on assets across the London portfolio. Support, collaborate, and undertake taskings aligned to the wider strategy and specialist frameworks overseen by the Director of More ❯
analyse, and evaluate security threats, vulnerabilities, risks and solutions across the organisation. Develop, advise and implement risk mitigation strategies to minimise security threats. Conduct regular security assessments, audits, and penetration testing. Undertake security threat assessments on assets across the London portfolio. Support, collaborate, and undertake taskings aligned to the wider strategy and specialist frameworks overseen by the Director of More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Apacheix
technical risk assessments, recommend mitigations and able to produce a security documentation including; Security Architecture Documents, RMADS and SyOPs Advising on suitable methods of assessing cyber security e.g. Pen Testing Providing assurance on effective cyber security implementation Developing incident response plans to security breaches, and provide crisis management support to help respond to incidents, including media handling Communicating clearly More ❯
Minimum of 5 years of experience in 2 or more of the following: Cryptanalytic work in military or intelligence community organization Experience with either/or: Vulnerability assessment, pen testing, incident response, analysis networks and/or host forensics Computer Network Exploitation, Computer Network Attack - Minimum of at least 3 years of experience in 3 or more of the More ❯
Praescient Analytics has an immediate opening for a PenetrationTesting Engineer, Mid to support a DoD contract in Arlington, VA. An active security clearance and U.S. citizenship is required for this position. As a PenetrationTesting Engineer, you need experience in the following: Key Role: Perform penetrationtesting, vulnerability management, and software/system … assurance. Conduct penetrationtesting activities (e.g., reverse shell, SQL injections, social engineering, buffer overflows, trojan horses, password cracking tools and techniques, and privilege escalation). Conduct assessments of threats and vulnerabilities, assess risk, and develop and recommend appropriate mitigation countermeasures. Develop attack vectors, conduct reconnaissance, collect open-source intelligence, enumeration, and foot-printing of target platforms, networks, and … services, and develop exploit payloads and system backdoors to identify vulnerabilities or weaknesses. Required Experience/Certifications: At least 3+ years of Cyber Security or relevant Penetrationtesting experience Active Top Secret clearance or higher (Must Have) Demonstrate comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for a PenetrationTestingMore ❯
is a privately held minority owned, small-business headquarter in Fulton, MD just outside of Baltimore and Washington D.C. About the role Strategic Analytix is looking for a skilled Penetration Tester who will serve as the Subject Matter expert providing testing expertise of the Risk Management Framework. The Penetration Tester will direct and/or participate in … the testing phase of security controls assessments using specialized knowledge of network protocols, operating systems, architectures, equipment, services, and standards. What you'll do Penetration Tester Requirements Perform vulnerability and penetrationtesting using a wide variety of tools. Research and evaluate emerging technologies relevant to information systems security; interpret agency specific and federal security regulations. Perform … both network and application-level testing using established testing protocols and methods. Qualifications Clearance Level TS/SCI level clearance with a Full Scope Polygraph. Skill Level 3: Experience: Eight (8) experience of related work experience as a Penetration Tester performing both network and application-level testing using established test protocols and methods. Education: A Bachelor More ❯
to work in a business where you stand to work alongside some very talented testers? CND are working with a boutique Cyber Security consultancy who are focused on the PenetrationTesting market. What makes them stand out? They are not interested in flashy marketing and would never be caught trying to pass off a Nessus scan as a … Penetration Test. The business has been built on delivering excellent testing and reports as well as ensuring that clients see the real benefits of their testing outputs. The company have an office in Cheltenham however you are welcome to work where is best for you. Key Responsibilities Lean into non-CHECK work where necessary. Work with the … team to flesh out technical input as needed. Deliver quality reports to customers. Stay up to date with industry trends and new attack methods. Take a broad approach to testing, working on INF, APP, Mobile, AD, or Cloud tests. Currently holds a CHECK equivalency certification. Eligibility to hold or currently hold clearance. Experience working with Linux and Windows OS. More ❯
BluOmega is looking for a Top Secret Cleared Penetration Tester to join our Cyber Solutions Practice in Atlanta, Ga and support a federal customer. Qualified candidates should have experience in software assurance, penetrationtesting with a range of automated tools, security patch management, secure cloud, and hybrid engineering and possess an active Top Secret. Responsibilities: • Perform penetrationtesting, software assurance, and vulnerability assessment in support of HHS customers. • Interpret penetrationtesting results to identify and recommend corrective actions and/or mitigation strategies. • Produce and deliver reports on individual and enterprise software assurance efforts, working with service providers and individual programs/systems. Deliverable: Software Assurance Reports. • Identify and address security implications during … participants from other organizations to integrate information assurance and cybersecurity needs and practices on a continuous basis throughout Agile development activities including, but not limited to: requirements, design, implementation, testing, and delivery of new IT solutions, applications, services, and systems, or updating and enhancing existing ones. • Perform and document vulnerability assessments of Government-identified HHS systems (Deliverable: Vulnerability Assessment More ❯
This position is contingent upon funding with an expected start date of December 2025 Top Secret/SCI Clearance required SRG is seeking a Red Team Penetration Tester III, you will be responsible for leading and executing complex penetrationtesting events and conducting offensive cybersecurity operations for the U.S. Government and DoD systems. You will work collaboratively … or Offensive Security Certified Expert (OSCE), or Offensive Security Exploitation Expert (OSEE), or Offensive Security Wireless Professional (OSWP) certification. Experience: • Seven (7) years of full-time professional experience conducting penetrationtesting or offensive Cyber operations in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. o Mimicking threat behavior. … Cyber Networking Certifications Cisco Certified Network Professional (CCNP) certification CCIE (Cisco Certified Internetwork Expert) CISSP (Certified Information Systems Security Professional) Seven (7) years of full-time professional experience conducting penetrationtesting or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. Mimicking threat behavior. More ❯
has grown to employ elite technical experts who have contributed to some of the world's largest technology and digital security projects. The NCSC-approved CHECK company specializes in penetrationtesting and security assessment services under the government-accredited CHECK scheme. They are currently seeking for a skilled Penetration Tester to join the growing team. This role … combination of industry-standard and in-house developed tools for security testing. Conduct manual reviews to identify issues within customer infrastructure and web applications. Perform various types of security testing, including network penetration, web application, mobile security assessments, and social engineering. Participate in red team engagements, employing creative strategies to outsmart defenders. Explore various approaches to gain unauthorized … solving capabilities. Possesses a solid understanding and fascination with fundamental concepts in operating systems and networking. Displays a keen interest in security principles and protocols. Demonstrates proven experience in penetrationtesting and/or security surveillance. Exhibits eagerness to absorb new knowledge and technologies. Programming Exposure A relevant Cyber Security certification is advantageous, e.g. (OSCP, CRT, CTM, CTL More ❯
This position is contingent upon funding with an expected start date of December 2025 Top Secret/SCI Clerance required SRG is seeking a Red Team Penetration Tester IV, you will be responsible for leading and executing complex penetrationtesting events and conducting offensive cybersecurity operations for the U.S. Government and DoD systems. You will work collaboratively … following certifications: Offensive Security Certified Expert (OSCE), Offensive Security Exploitation Expert (OSEE), or Offensive Security Wireless Professional (OSWP) certification. Experience: • Ten (10) years of full-time professional experience conducting penetrationtesting or offensive Cyber operations including demonstrated experience in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. o … Cyber Networking Certifications Cisco Certified Network Professional (CCNP) certification CCIE (Cisco Certified Internetwork Expert) CISSP (Certified Information Systems Security Professional) Seven (7) years of full-time professional experience conducting penetrationtesting or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. Mimicking threat behavior. More ❯