client needs. Conduct technical risk assessments and recommend appropriate mitigations. Produce high-quality security documentation including RMADS, SyOPs, and Security Architecture Documents. Advise on suitable cyber assessment methods, including penetrationtesting and vulnerability analysis. Provide assurance on the effective implementation of cyber security controls and frameworks. Develop incident response plans and support clients during security breaches, including crisis More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Lockheed Martin
and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Basic Qualifications: Demonstrable knowledge of cyber concepts, penetrationtesting methods, vulnerabilities, information assurance, and security methodology Familiarity with Linux and Windows operating systems Must have a Secret clearance with the ability to obtain and maintain a More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Lockheed Martin
and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Basic Qualifications: Demonstrable knowledge of cyber concepts, penetrationtesting methods, vulnerabilities, information assurance, and security methodology Familiarity with Linux and Windows operating systems Must have a Secret clearance with the ability to obtain and maintain a More ❯
Information Assurance, or Computer Security). Relevant Experience Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
Information Assurance, or Computer Security). Relevant Experience Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
effectiveness of any plays created by emulating adversary tactics to trigger the necessary alerts (blue team). Demonstrate effectiveness by creating detection use cases that successfully detect Red Team (penetrationtesting) activity. Utilize the MITRE ATT&CK matrix and other threat frameworks to develop detection use cases. Continually refine these processes with the goal of automating their execution. More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetrationtesting - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. The Work: A CNO (Computer Network Operations) offensive cyber professional can More ❯
security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
facing migration, including service discovery, assessment, planning, execution, and operations. Experience with Google Cloud products. Experience with security concepts such as encryption, identity management, access control, attack vectors, and penetration testing. Experience with networking concepts such as software-defined networking, routing, virtual private networks, load balancers, and firewalls. Technical/Communication Skills: Ability to understand, debug, and contribute to More ❯
in developing robust systems, software, and cloud environments while overseeing operations and maintenance for essential systems. Your responsibilities will include offering technical expertise in the design, development, implementation, and testing of customer tools and applications. Operating within a DevOps framework, you will drive major project deliverables through the entire software development lifecycle, from scope and estimation to design, coding … designing and documenting microservice-based architectures Experience with relational and/or NoSQL databases Experience with distributed systems (services and databases) Strong background developing/debugging and/or testing of web applications and web services Experience with infrastructure as code (IaC) tools (e.g., Terraform, Ansible) Understanding of security best practices and tools (e.g., vulnerability scanning, penetrationtestingMore ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! Head of IT - Lead a Full-Stack Transformation More ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! CTO - Lead a Full-Stack Transformation More ❯
processes. Help proactively assess security risk through product deep dives, threat modeling, and design, architecture and implementation reviews. Review and improve existing security processes related to product assessments, pen testing, and bug bounty findings. Develop product security controls and supervising strategies to grow our threat detection capabilities. Seek opportunities for security tooling and automation. What You'll Bring 5+ … of common vulnerabilities and emerging threats. Experience with authentication and authorization standards, including OAuth and SAML, and their weaknesses. Detailed knowledge of system security vulnerabilities and remediation techniques, including penetrationtesting and the development of exploits. Experience with Cloud Computing providers like AWS, GCP, Azure. Problem solving skills to resolve problems effectively and creatively while maintaining a high More ❯
certification b. GIAC Open Source Intelligence (GOSI) c. Certified Threat Intelligence Analyst (CTIA) d. Certified Ethical Hacker (CEH) e. EC Council Certified Network Defender (CND) f. EC Council Licensed Penetration Tester- (Master) (LPT-Master) g. EC Council Certified Security Analyst (ECSA) h. EC Council Certified SOC Analyst (CSA) i. CompTIA Security+ j. EC Council Certified Cybersecurity Technician (CCT) k. … qualifying fields. Preferred Licenses and Certifications Current industry certification from one or more security organizations (for example CISSP, GIAC certifications, GPEN, C EH (M), OSCP, (or other vendor agnostic PenetrationTesting security certification), CHFI, SSCP, CND (or other vendor agnostic defensive security certification such as Security +), CSA (Certified SOC Analyst), CTIA, CCSP (ISC2, Cloud Security Alliance, or More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
Work: A CNO Software Expert does work that requires a highly skilled individual using their expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge … Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetrationtesting - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible More ❯
and potential attacks against the systems or missions being studied. The principal level System Vulnerability Analyst shall possess the following capabilities: Candidate must have relevant experience in vulnerability analysis, penetrationtesting, and/or computer forensics. Requirements Active TS/SCI w/Polygraph security clearance is required. Information Assurance Certification may be required A Bachelor's Degree More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
machines, and related technologies with proper security controls. Perform forensic analysis of OT devices to support cyber incident response and investigation. Develop consultative OT security solutions including attack emulation, penetrationtesting, threat hunting, and deception operations. Travel to project sites to provide support of ICS networks, including management and maintenance of converged platforms, virtualization environments, networks, security platforms More ❯
San Jose, California, United States Hybrid / WFH Options
Zscaler
stakeholders including engineering, security, business teams, external assessors, federal agencies, and leadership Working knowledge and experience with the various cloud computing services (e.g., IaaS, PaaS, SaaS) Coordinating 3PAO assessments, penetrationtesting, audits, and implementing continuous monitoring programs to ensure ongoing compliance and address security findings What We're Looking for (Minimum Qualifications) 8+ years of experience in federal More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
actors, and exploit techniques Mentor junior team members and contribute to tooling, methodology, and lab development Required Skills & Experience 3+ years' experience in red teaming, offensive security, or advanced penetrationtesting Strong knowledge of attacker frameworks (e.g., MITRE ATT&CK, NIST adversary simulation guidelines) Highly proficient with red team tools and techniques (e.g., Cobalt Strike, Mimikatz, Sliver, BloodHound More ❯