Relevant experience must be in computer or information systems design/development. Experience may also include hardware and/or software engineering, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance and/or system engineering. Compensation Range: $81,583.84 - $179,484.45 _ Compensation ranges encompass a total compensation package and are a general guideline More ❯
security breaches and other cybersecurity incidents Document security breaches and assess the damage they cause Work with the security team to perform tests and uncover network vulnerabilities, such as penetrationtesting Fix detected vulnerabilities to maintain a high-security standard Recommend best practices for IT security Installing security measures and operating software to protect systems and information infrastructure More ❯
equivalent to an associate's degree. Specific Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering Completion of military training in a relevant area such as Joint Cyber Analysis Course (JCAC), Undergraduate Cyber Training More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Cybersecurity experience Strong analytical and problem-solving skills for resolving security issues Strong skills implementing and configuring networks and networks components Proven proficiency performing CCRI/vulnerability assessment/penetrationtesting on networks, databases, computer applications and IT frameworks Knowledge and understanding of DOD security regulations, DISA STIGs Expert experience in cybersecurity and evaluations Excellent knowledge of and More ❯
Conducts on-site evaluations Validates the security requirements of the information system Verifies and validates that the system meets the security requirements Provides vulnerability assessment of the system Coordinates penetrationtesting Provides a comprehensive verification and validation report (certification report) for the information system Provides process improvement recommendations Assists the Government to draft standards and guidelines for usage More ❯
of computer systems, network architectures, policies and procedures, applications, and/or facilities. Knowledge of or experience with creating/maintaining adversary emulation tool-sets. Knowledge of Red Teaming, penetrationtesting, and/or exploiting technical and human based security vulnerabilities. Counter Intelligence or Human Intelligence (HUMINT) experience. Experience with photography of any type. What you can expect More ❯
Plant Utilities background. o Industrial process, water/wastewater, nuclear, data centers, cogeneration plants, combined cooling, heating & power (CCHP) o Cooling towers, chillers, UPS, power monitoring. • Cybersecurity and or penetrationtesting experience • IT/Networking Certification (CISSP/SSCP, CEH, etc) • Familiarity with packet capture and analysis techniques; Wireshark, Netmap, Network Miner, GrassMarlin, Sceptre, Helics, IDS systems Come More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programing, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Experience with signal or intelligence-specific tools or databases for ELINT or telemetry Experience with programming or scripting for automation or forensics using languages such as Python Experience with penetrationtesting tools Knowledge of IT logging best practices Knowledge of log or data querying tools such as Splunk Ability to create network diagrams utilizing tools like Micro sof More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Boulder, Colorado, United States Hybrid / WFH Options
Lockheed Martin
and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Basic Qualifications: Demonstrable knowledge of cyber concepts, penetrationtesting methods, vulnerabilities, information assurance, and security methodology. Familiarity with Linux and Windows operating systems. Must have a current Top Secret clearance. Desired Skills: Experience with DoD cybersecurity More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
threats and vulnerabilities to the ISSO. Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals. Review reports from static code analysis, Pen Testing, and Scanning Results. Review network, data flow, org charts and etc for potential vulnerabilities related to processes or personnel. QUALIFICATIONS Bachelor's Degree in Information Technology, Cybersecurity, Data Science More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
to join our team in Austin, TX. The ideal candidate should have experience in automated red-teaming solutions, prompt engineering, and LLM applications, along with hands-on knowledge in penetration testing. Key Responsibilities: Develop and implement AI/ML models using Python. Work with automated red-teaming solutions like PyRIT, Garak, and Giskard. Optimize and fine-tune Large Language … Models (LLMs) for various applications. Implement and enhance Retrieval-Augmented Generation (RAG) systems. Conduct penetrationtesting to assess security vulnerabilities. Collaborate with cross-functional teams to integrate AI solutions into business processes. Stay updated with the latest advancements in AI, cybersecurity, and red-teaming tools. Required Skills & Qualifications: Strong proficiency in Python development and coding. Experience in prompt … engineering and working with LLM applications. Knowledge of automated red-teaming tools like PyRIT, Garak, and Giskard (preferred Hands-on experience in penetration testing. Familiarity with cybersecurity best practices. Strong problem-solving and analytical skills. Excellent communication and collaboration abilities. Preferred Qualifications: Experience with cloud-based AI/ML deployments. Understanding of ethical hacking methodologies. Prior experience in security More ❯
architecture and solution design Strong understanding of security standards and regulations (e.g. NCSC, ISO, NIST, PCI, GDPR) Background in application architecture, software development, or infrastructure architecture Experience with security testing tools and techniques Familiarity with CI/CD pipelines and continuous security practices Knowledge of network security (OSI, TCP/IP), web application security (OWASP), and cryptographic controls (PKI … a strong understanding of client engagement and delivery dynamics Desirable Experience Identity management and authentication/authorization patterns Involvement in governance, risk, compliance, operational security, and secure user management Penetrationtesting certifications (e.g. OSCP, CREST, TIGER or equivalent) Active participation in knowledge sharing and community engagement Benefits Competitive salary and comprehensive benefits package Flexible working arrangements Opportunities to More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
A Senior Expert CNO Software Engineer does work that requires a highly skilled individual with expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge … Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetrationtesting - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
A Senior Expert CNO Software Engineer does work that requires a highly skilled individual with expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge … Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetrationtesting - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible More ❯
years in Cyber Security roles Defence Experience: A solid background in working on defence-related projects. Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. PenetrationTesting Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. More ❯
Computer Futures - London & S.E(Permanent and Contract)
years in Cyber Security roles Defence Experience: A solid background in working on defence-related projects. Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. PenetrationTesting Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols - JSP453 . More ❯
years in Cyber Security roles Defence Experience: A solid background in working on defence-related projects. Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. PenetrationTesting Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. More ❯
years in Cyber Security roles Defence Experience: A solid background in working on defence-related projects. Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. PenetrationTesting Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols - JSP453 . More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯