in computer or information systems design/development/analysis. In addition, it may also include: Engineering hardware and/or software Programming Computer/network security Vulnerability analysis Penetrationtesting Computer forensics Information assurance Systems engineering and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
to perform security assessments in search of vulnerabilities and identify mitigations. Conduct vulnerability assessments on web applications, networked devices, standalone software products, and other technologies as assigned using the penetrationtesting life cycle. Qualifications: • Offensive Security Certified Professional a must • DoD 8570 IAT Level II certification (Security+ or equivalent). • Intermediate knowledge of Linux and Windows internals. • Thorough More ❯
progress Conduct sophisticated exploitation activities against complex targets, leveraging zero-day vulnerabilities, reverse engineering, and custom payload development Support and execute offensive cyber operations, including but not limited to, penetrationtesting, red teaming, and advanced cyber threat emulation Experience with APTs: Demonstrated experience in tracking, analyzing, and mitigating Advanced Persistent Threats Programming Skills: Proficiency in programming/scripting More ❯
progress Conduct sophisticated exploitation activities against complex targets, leveraging zero-day vulnerabilities, reverse engineering, and custom payload development Support and execute offensive cyber operations, including but not limited to, penetrationtesting, red teaming, and advanced cyber threat emulation Experience with APTs: Demonstrated experience in tracking, analyzing, and mitigating Advanced Persistent Threats Programming Skills: Proficiency in programming/scripting More ❯
progress Conduct sophisticated exploitation activities against complex targets, leveraging zero-day vulnerabilities, reverse engineering, and custom payload development Support and execute offensive cyber operations, including but not limited to, penetrationtesting, red teaming, and advanced cyber threat emulation Experience with APTs: Demonstrated experience in tracking, analyzing, and mitigating Advanced Persistent Threats Programming Skills: Proficiency in programming/scripting More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
Senior Security Engineer you will implement and maintain robust security systems and protocols across the company's IT infrastructure, conducting risk assessments and vulnerability scans, mitigating vulnerabilities identified in penetrationtesting and implementing preventative measures to protect against cyber threats with a focus on WAF, IDS, IPS, Windows Security and Palo Alto firewalls. You also manage the 3rd More ❯
london, south east england, united kingdom Hybrid / WFH Options
Client Server
Senior Security Engineer you will implement and maintain robust security systems and protocols across the company's IT infrastructure, conducting risk assessments and vulnerability scans, mitigating vulnerabilities identified in penetrationtesting and implementing preventative measures to protect against cyber threats with a focus on WAF, IDS, IPS, Windows Security and Palo Alto firewalls. You also manage the 3rd More ❯
of information assurance concepts, operations, and tools Bachelor's Degree TS/SCI clearance Requirements/Abilities: Experience requirements may include: RMF, COOP, disaster recovery, contingency planning, Vulnerability assessments, penetrationtesting, Security assessments, Web Application Security Program, web application scanning, web filtering, trusted sites, web site certifications, Sharepoint and Intelink Site administration, IA Complaince and reporting, IA Training More ❯
and DevOps Containerization. We also provide customer solutions in the areas of CND, CNE, and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, PenetrationTesting, Threat Hunting, and Preventing Advanced Persistent Threat. More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
environments, driving maturity and constant improvements to support the constantly changing threat landscape and define and monitor KPIs regarding detection, response and containment. You'll also manage 3rd party PenetrationTesting and manage key security controls, MSSPs and tolling providers. Location/WFH: There's a hybrid work from home model with three days a week in the More ❯
methods of exploitation, malware research, researching innovative tools and techniques, and manipulating code execution • Securing development environments and software through application security architecture software evaluations, web application vulnerability assessment penetrationtesting and fuzzing, malware research and vulnerability mitigation • Excellent written and verbal communication skills with the ability to successfully brief and interact with personnel at all levels of More ❯
Provides expertise in network protection needs assessment, requirements elicitation, security architecture, threat assessment, computer security, communication security, networking, security technologies, hardware and software development, test and evaluation, vulnerability assessment, penetrationtesting, and supply chain risk. Provides input to analyses of alternatives and to requirements, engineering, and risk trade-off analyses to achieve a cost-effective security architectural design More ❯
analysis, and metadata analysis. Education and Training Qualifications: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
Provides expertise in network protection needs assessment, requirements elicitation, security architecture, threat assessment, computer security, communication security, networking, security technologies, hardware and software development, test and evaluation, vulnerability assessment, penetrationtesting, and supply chain risk. Provides input to analyses of alternatives and to requirements, engineering, and risk trade-off analyses to achieve a cost-effective security architectural design More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
Desire to mentor and be mentored • Vulnerability Analysis • Knowledge of Open Source Intelligence and similar methodologies • Technical writing and presentation skills • Networking fundamentals • Familiar with Risk Management Framework (RMF) • PenetrationTesting/Red Team experience Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level: Secret Other Important More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
Desire to mentor and be mentored • Vulnerability Analysis • Knowledge of Open Source Intelligence and similar methodologies • Technical writing and presentation skills • Networking fundamentals • Familiar with Risk Management Framework (RMF) • PenetrationTesting/Red Team experience Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level: Secret Other Important More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
Desire to mentor and be mentored • Vulnerability Analysis • Knowledge of Open Source Intelligence and similar methodologies • Technical writing and presentation skills • Networking fundamentals • Familiar with Risk Management Framework (RMF) • PenetrationTesting/Red Team experience Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level: Secret Other Important More ❯
years may be considered. • Degree in Network Engineering, Systems Engineering, Information Technology, or a related field. • Experience in computer or information systems design/development, programming, cybersecurity, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. • Strong Linux experience. • Experience with systems/network administration, application administration, IT support/management, and hardware installation. More ❯
Licenses and Certifications are desired. Preferred Licenses and Certifications Current industry certifications from security organizations (for example CISSP, GIAC certifications, GPEN , C EH (M) , OSCP, (or other vendor agnostic PenetrationTesting security certification), CHFI, SSCP, CND (or other vendor agnostic defensive security certification such as Security +), CSA (Certified SOC Analyst), CTIA, CCSP (ISC2, Cloud Security Alliance, or More ❯
such as: A+CE, CCNA-Security, CND, Network+CE, SSCP Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance and/or systems engineering. Additionally, must have experience in network or system administration. Strong Linux experience Experience in systems/network administration More ❯
such as: A+CE, CCNA-Security, CND, Network+CE, SSCP Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance and/or systems engineering. Additionally, must have experience in network or system administration. Required Technical Skills Strong Linux experience Experience in systems More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
develops, documents, tests, and maintains full spectrum cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Conducts vulnerability research, reverse engineering, penetrationtesting (red/blue teams), develops and integrates low-level firmware, and/or develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge More ❯
Chippenham, Wiltshire, England, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
VLANS, TCP/IP ect. Azure Qualifications (e.g. AZ-104, AZ-305, AZ-700, AZ-500, AZ-140). Desirable: Experience with filtering tools, Data (PowerBI, SQL), SonicWALL, Pen testing, VoIP and site recovery. Duties of the Azure Solutions Architect: Design and architect modern IT infrastructure solutions, focusing on Azure and Microsoft 365 technologies. Lead and end to end More ❯
Corsham, Wiltshire, South West, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
VLANS, TCP/IP ect. Azure Qualifications (e.g. AZ-104, AZ-305, AZ-700, AZ-500, AZ-140). Desirable: Experience with filtering tools, Data (PowerBI, SQL), SonicWALL, Pen testing, VoIP and site recovery. Duties of the Azure Solutions Architect: Design and architect modern IT infrastructure solutions, focusing on Azure and Microsoft 365 technologies. Lead and end to end More ❯