Job Summary Researcher/Cyber Security Country: United Kingdom Location: Malvern Sector: Other Job Type: Permanent Technologies: Researcher Cyber Security, Wireshark, Python, PowerShell, Windows, CentOS, SC clearance, Microsoft Office, hex editors, Computing Degree, Cloud, Malvern A successful cyber-security company is looking for a Researcher to join their growing research team. This is a great opportunity for someone with an … and PowerShell Install and configure operating systems such as Windows and CentOS Work in virtualized environments, both in the cloud and on-premises Diagnose network problems using tools like Wireshark Use hex editors to analyze file structures Proficient in Microsoft Office applications Develop prototypes, integrate system components, and present findings in reports and presentations Hold a computing-related degree If More ❯
Information Assurance, Nessus, RMF, Windows, Linux, WireShark, System Security Plans, Authorization to Operate, Verification and Validation, NIST, PKI, Scripting Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI clearance w/active polygraph (Polygraph must … applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services. Must have experience with secure configurations of commonly used desktop and server operating systems. Must be More ❯
Familiar with Unix based systems. Experience with reverse engineering Linux based network devices. In-depth understanding of network protocols (e.g., TCP/IP), and analysis of network traffic (e.g., Wireshark). Ability to produce and modify software systems in C/C Python. Familiarity with Git, Subversion, Jira, Confluence. Desired: Experience with reverse engineering windows or embedded platforms (RTOS). More ❯
of networking protocols, routing, firewalls • Knowledge of software vulnerabilities and exploits • Possession of excellent oral and written communication skills OPTIONAL SKILLS AND EXPERIENCE (Nice to haves) • Experience with KaliLinux, Wireshark • Experience with software development • Experience with Cybersecurity products, including anti-virus and endpoint security variants and methods • Experience with mobile security products and capabilities • Experience with end point and/ More ❯
Houston, Texas, United States Hybrid / WFH Options
All Points Logistics LLC
skills with C++ in a Linux environment. Python Real time embedded software development Linux Skills desired: Simulation software, SWIG, Matlab/Simulink, Make, Perforce, Eclipse, JIRA, QEMU, Simics, VMWare, Wireshark, Eggplant, Time Triggered Ethernet, XML, Agile methodology Ability to perform well in a team environment and meet schedule commitments under a highly constrained timeline Knowledge in overall software life cycle More ❯
Colocation, and Inbound Number Provisioning (TFN, DID etc) Working knowledge of TCP/IP, TLS, BGID, Routers, Switches, Hubs, Firewalls, Domains, DNS, DHCP and subnetting Command level knowledge Empirix, Wireshark, Ribbon Analytics Previous experience with configuring SBCs Proven track record of excellent communication and conflict resolution skills Benefits Life Insurance - 4 x Annual Salary Private Medical Insurance Employee Assistance Program More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Spectrum IT Recruitment
Colocation, and Inbound Number Provisioning (TFN, DID etc) Working knowledge of TCP/IP, TLS, BGID, Routers, Switches, Hubs, Firewalls, Domains, DNS, DHCP and subnetting Command level knowledge Empirix, Wireshark, Ribbon Analytics Previous experience with configuring SBCs Proven track record of excellent communication and conflict resolution skills Benefits Life Insurance - 4 x Annual Salary Private Medical Insurance Employee Assistance Program More ❯
. Familiar with MySQL & Apache. Familiar with monitoring systems. Advantageous Knowledge of mobile network technologies and concepts. Analysis of signalling traffic (SS7 and Diameter). Packet capture analysis with Wireshark or similar tools. Awareness of high availability concepts. Knowledge of automation (Ansible/Terraform). Knowledge of back-up and restore processes. Understanding of VoIP. Other information Eseye is an More ❯
Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, Kali Linux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in More ❯
Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, Kali Linux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in More ❯
Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, Kali Linux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to more advanced levels Experience in More ❯
Intelligence Community networks Practical experience with firewalls, network TAPs, IDS/IPS, endpoint protection, and other network defense technologies Adept in evaluating network protocols utilizing network analyzers, such as Wireshark, Tshark, and tcpdump Experienced in analyzing network datasets, including Zeek and firewall logs, to support threat hunting and security investigations. Experienced in leveraging data analysis platforms, such as Splunk, Kibana More ❯
experience with scripting and automation tools to streamline deployment and configuration tasks - Solid understanding of network protocols and infrastructure (BGP, OSPF), including routing, switching, and load balancing - Experience with Wireshark or other protocol analysers - Desired Skills: Good understanding of Cloud environments: Azure, AWS, GCP Documentation & Design - Experience using Visio for network diagramming and design visualizations - Ability to develop comprehensive implementation More ❯
experience points required to unlock the role of Defensive Content Engineer at Hack The Box: Experience in a Defensive security operations environment Familiarity with Defensive security tooling (SIEM, EDR, Wireshark, Volatility, Autopsy, etc) Some experience engineering defensive content for CTFs or similar platforms Good understanding of common operating systems and applications as well as system administration (Windows, Linux, etc.) Strong More ❯
with any of the following: Java, JavaScript, Bash, PowerShell, Perl, C#, and Rust. In-depth understanding of network protocols (e.g., TCP/IP), and analysis of network traffic (e.g., Wireshark). Experience developing CNO specific software in Linux/Windows/Embedded applications. Experience with Vulnerability Research and Exploit development. Familiarity with CNO capabilities and operations. Education/Experience More ❯
Eglin Afb, Florida, United States Hybrid / WFH Options
Astrion
lbs. unassisted. DESIRED QUALIFICATIONS/SKILLS Working knowledge of tactical datalink systems (Link 16, SADL, JREAP, etc.). Proficiency in network analysis, including practical experience with tools like Wireshark and tcpdump, and a deep understanding of networking protocols (TCP/IP, UDP, HTTP, etc.). Proficiency with Windows and Linux operating systems. Proficiency in one or more programming languages (C++ More ❯
*Will be required to travel to client sites occasionally/SC CLEARED OR CLEARABLE* Our client is a Digital Transformation and Cyber Security Consultancy and are currently looking for a Cyber Security Consultant to join their dynamic team! They offer More ❯
automated testing of firmware and software features, including over-the-air updates, location tracking (GNSS & Wi-Fi), power management, and protocol implementation, e.g. COAP, MQTT, BLE. Use tools like Wireshark, serial loggers, oscilloscopes and power analysers to verify data flow and system stability . Analyse logs and telemetry data to troubleshoot issues across hardware, firmware, and cloud layers . Contribute … . Strong analytical and debugging skills with the ability to understand hardware/software interactions Experience with Python test automation or frameworks like Robot Framework Proficiency with Testrail, Postman, Wireshark, and other data capture tools . Familiarity with IoT cloud platforms (e.g., AWS IoT, Azure IoT, Google Cloud IoT) . Experience testing battery-powered devices, power optimization, or environmental robustness More ❯
infrastructure by devising and implementing tailored specifications for communication between embedded software products utilizing network sockets and specially defined protocols. Perform in-depth packet analysis of custom protocols using Wireshark and implemented software handlers for dissecting and processing TCP/IP packet data. Support the development of custom front-end user interfaces written in XML and Java designed for management More ❯
Familiar with Unix based systems. Experience with reverse engineering Linux based network devices. In-depth understanding of network protocols (e.g., TCP/IP), and analysis of network traffic (e.g., Wireshark). Produce and modify software systems in C/C Python/Assembly. Provide support for fielded software systems. Familiarity with Git and Subversion. Atlassian Tools (Jira, Confluence). Nice More ❯
communications solutions Experience deploying systems Preferred Experience with programming languages such as Python, Java, C/C++, etc. Familiarity with network and log analysis tools, such as Splunk, LogRhythm, Wireshark Exposure to AL/ML technologies to analyze network protocols and communications Experience in VPN set up; reviewing popular services. Also, experience in two-factor authentication Experience in trouble shooting More ❯
Security, Dynamic Access Control (DAC), and Thales CT Hardware Security Modules and Windows Certificate Authority (PKI) Skilled in cloud print products (PaperCut), Windows Server Update Services, debugging tools (SysInternals Wireshark), Microsoft Exchange, Endpoint Management, Active Directory management tools, and ABAC systems (Nextlabs) Knowledgeable in networking, subnetting, troubleshooting, F5 Load Balancers, APM, iRules, Active Directory Forests, and Linux (RedHat, CentOS More ❯
secure coding practices, reverse engineering, and x86 assembly Experience in Agile/Scrum environments Active Top Secret/SCI clearance required Preferred Qualifications: Familiarity with tools such as Ghidra, Wireshark, XKEYSCORE, or similar Experience with custom protocol development, vulnerability analysis, or cyber toolkits Knowledge of containerization (e.g., Docker), CI/CD pipelines, and automated testing Background in training or mentoring More ❯
Managing global WAN solutions Low latency networks Timing solutions using GPS, PTP, NTP and PPS Packet capture solutions, including optical taps, SPAN, tap aggregation and timestamping Packet Analysis using Wireshark Interconnecting for market data and order entry in exchange collocations Multicast configuration and troubleshooting Automation tools, including Git, Python, Golang, Jenkins, Terraform and Ansible Why should you apply? Highly competitive More ❯