Computer Security Job Vacancies

1 to 25 of 86 Computer Security Jobs

Product Manager- Data Feeds

London, England, United Kingdom
Hybrid / WFH Options
Chainlink Labs Inc
re a global team of developers, academics, and financial industry experts with deep experience in cryptography, decentralized systems, game theory, and capital markets. Together we’re leveraging cutting-edge computer science research to build an industry-defining platform. We believe in the power of blockchain technologies to create a more economically fair world. Where do I fit? Global expertise … also the Weill Family Foundation and Joan and Sanford I. Weill Professor at the Jacobs Technion-Cornell Institute at Cornell Tech, as well as a faculty member in the Computer Science department at Cornell University. He is a Co-Director of the Initiative for CryptoCurrencies and Contracts (IC3). Previously, he served as the Chief Scientist of RSA. Eric … served on the boards of Alphabet, Apple, Princeton University, Carnegie Mellon University, and the Mayo Clinic. Technical Advisor Farinaz Koushanfar is the Henry Booker scholar professor of Electrical and Computer Engineering at the University of California San Diego, where she is the founding co-director of UCSD MICS (Center for Machine Intelligence, Computing, and Security). Her research More ❯
Posted:

Cryptography Software Engineer

United Kingdom
Hybrid / WFH Options
PQShield
Post-Quantum Cryptography and RISC-V). Our platform IP components come together as a RISC-V MCU based Sub-system with advanced (post-quantum) cryptography algorithm support and security features. As a Senior Software Engineer at PQShield, you will be designing and developing secure solutions, helping to develop software solutions working seamlessly through the entire software development life … cycle. You will assist with the development of PQShield's core software cryptography libraries. Responsibilities include developing internal tools to support the build, test and security analysis of PQShield's software products. ️ What you'll be doing Design, implement, and test classical and post-quantum cryptographic primitives with a strong emphasis on functional correctness, interoperability, and optimized performance across … attacks (FIA), and other physical or logical threats through constant-time design and other countermeasures. Ensuring integration with cryptographic system and application API's, for example: GlobalPlatform, ARM Platform Security Architecture, Linux Kernel drivers Collaborate with cryptographers, security engineers, and cross-functional teams-including hardware, verification, and platform security-to review, validate, and harden cryptographic implementations. Contribute More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Engineer III with Security Clearance

Jacksonville, Florida, United States
Strategic Resilience Group
This position is contingent upon funding with an expected start date of December 2025 SECRET Clearance required SRG is seeking an Expert Cyber Security Engineer to capture and refine information security requirements and ensure that the requirements are integrated into information technology component products and information systems through purposeful security architecting, design, development, and configuration. On-site … development teams working to design and develop information systems or upgrade legacy systems. Conducts product research and support Analysis of Alternative (AoA) activities that independently identify the most appropriate security solutions. Assists with leading the development of system concepts, contribute to the capability phase of the systems development lifecycle, and translate technology and environmental conditions (e.g., law and regulation … into system security designs and processes. Assists with leading the development and documentation of Security Architectures, Roadmaps, and investments. Oversee the work of Senior-, Mid-, and Junior-level contractor Cyber Security Engineers. Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer III with Security Clearance

Virginia Beach, Virginia, United States
Strategic Resilience Group
This position is contingent upon funding with an expected start date of December 2025 SECRET Clearance required SRG is seeking an Expert Cyber Security Engineer to capture and refine information security requirements and ensure that the requirements are integrated into information technology component products and information systems through purposeful security architecting, design, development, and configuration. On-site … development teams working to design and develop information systems or upgrade legacy systems. Conducts product research and support Analysis of Alternative (AoA) activities that independently identify the most appropriate security solutions. Assists with leading the development of system concepts, contribute to the capability phase of the systems development lifecycle, and translate technology and environmental conditions (e.g., law and regulation … into system security designs and processes. Assists with leading the development and documentation of Security Architectures, Roadmaps, and investments. Oversee the work of Senior-, Mid-, and Junior-level contractor Cyber Security Engineers. Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer III with Security Clearance

San Diego, California, United States
Strategic Resilience Group
This position is contingent upon funding with an expected start date of December 2025 SECRET Clearance required SRG is seeking an Expert Cyber Security Engineer to capture and refine information security requirements and ensure that the requirements are integrated into information technology component products and information systems through purposeful security architecting, design, development, and configuration. On-site … development teams working to design and develop information systems or upgrade legacy systems. Conducts product research and support Analysis of Alternative (AoA) activities that independently identify the most appropriate security solutions. Assists with leading the development of system concepts, contribute to the capability phase of the systems development lifecycle, and translate technology and environmental conditions (e.g., law and regulation … into system security designs and processes. Assists with leading the development and documentation of Security Architectures, Roadmaps, and investments. Oversee the work of Senior-, Mid-, and Junior-level contractor Cyber Security Engineers. Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior, FIPS 140 Security Engineer & CVP Certified Tester - 380 with Security Clearance

Columbia, Maryland, United States
Catapult Staffing
Senior, FIPS 140 Security Engineer & CVP Certified Tester Work model: REMOTE Department: FIPS/Testing Location: Columbia, MD Role Type: Contract No Clearance Required Not available on C2C basis About Our Client Our client offers an exciting opportunity to work in the rapidly expanding IT Security field, integral to supporting national defense initiatives. This organization plays a crucial … role in ensuring national security by evaluating and validating IT security products that are deployed to facilitate secure communications for military and defense systems. You will join a team of industry experts and work with a wide range of Commercial Off-The-Shelf (COTS) products across various technology types in a hands-on lab environment. The company fosters … a supportive culture with performance-based career development, flexible hours, work-life balance, and opportunities for continuous learning and professional growth. Job Description As a FIPS 140 Security Engineer, you will be a vital member of a dedicated team focused on performing in-depth security evaluations and validation projects. Your day-to-day work will involve a comprehensive More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Mid-level, FIPS 140 Security Engineer & CVP Certified Tester - 3 with Security Clearance

Columbia, Maryland, United States
Catapult Staffing
Mid-level, FIPS 140 Security Engineer & CVP Certified Tester Work model: REMOTE Department: FIPS/Testing Location: Columbia, MD Role Type: Contract No Clearance Required Not available on C2C contract basis About Our Client Our client offers an exciting opportunity to work in the rapidly expanding IT Security field, integral to supporting national defense initiatives. This organization plays … a crucial role in ensuring national security by evaluating and validating IT security products that are deployed to facilitate secure communications for military and defense systems. You will join a team of industry experts and work with a wide range of Commercial Off-The-Shelf (COTS) products across various technology types in a hands-on lab environment. The … company fosters a supportive culture with performance-based career development, flexible hours, work-life balance, and opportunities for continuous learning and professional growth. Job Description As a FIPS 140 Security Engineer, you will be a vital member of a dedicated team focused on performing in-depth security evaluations and validation projects. Your day-to-day work will involve More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Principal Offensive Security Researcher

Reading, England, United Kingdom
Hybrid / WFH Options
Oracle
Senior Principal Offensive Security Researcher Senior Principal Offensive Security Researcher 2 days ago Be among the first 25 applicants Get AI-powered advice on this job and more exclusive features. Direct message the job poster from Oracle As a member of our technical leadership team, you will be responsible for leading the planning and delivery of in-depth … security assessments across a variety of products and services, you will author reports and be the owner from cradle to grave while presenting to executive leadership your findings and taking ownership of your teams work. Your next project could be anything from secure systems design, static and dynamic analysis of a multi-node Java infrastructure, to writing a fuzzer … new programming language, to analysis and reverse engineering of firmware used in the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for computer security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help More ❯
Posted:

Sr Principal Security Architect

London, England, United Kingdom
Oracle
Job Description Responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ensures compliance with corporate security policies and procedures. Job Description Responsible for the planning, design and build of security architectures; oversees the implementation of network and computer security and ensures compliance with … corporate security policies and procedures. Career Level - IC5 Responsibilities Responsible for expert planning, design and build of security systems, applications, environments and architectures; oversees the implementation of security systems, applications, environments and architectures and ensures compliance with information security standards and corporate security policies and procedures. Evaluates existing and proposed technical architectures for security risk, provides expert technical advice to support the design and development of secure architectures and recommends security controls to mitigate those risks. Evaluations of internal security architecture may include design assessment, risk assessment, and threat modeling. Provides expert technical advice and direction to support the design and development of secure architectures. Maintain expert proficiency in emerging trends More ❯
Posted:

Staff Software Engineer

Cambridge, England, United Kingdom
Hybrid / WFH Options
Entrust
About the Company Join us at Entrust. At Entrust, we’re shaping the future of identity centric security solutions. From our comprehensive portfolio of solutions to our flexible, global workplace, we empower careers, foster collaboration, and build solutions that help keep the world moving safely. Headquartered in Minnesota, Entrust is an industry leader in identity-centric security solutions … We are looking for Staff Software Developer to join our Cambridge, UK team! A highly skilled C designer and developer with Python skills, to work on a major crypto-security product. You must be based in the UK and have the right to work in the UK. Responsibilities Play a major role in the design and development of our … system. Embedded Linux in Hardware Security Modules, Windows/Linux drivers & client-side tools, API libraries. Lead features from inception to delivery. Software design & coding, testing, and review. Integrate effort across disciplines. Lead by example, mentor juniors, set standards. Supporting architecture team in feature analysis. Qualifications Degree or equivalent, in Software Engineering, Computer Science, Maths or relevant discipline. More ❯
Posted:

Senior Software Engineer

Cambridge, England, United Kingdom
Hybrid / WFH Options
Entrust
Continue with Google Continue with Google Continue with Google Continue with Google Direct message the job poster from Entrust At Entrust, we’re shaping the future of identity centric security solutions. From our comprehensive portfolio of solutions to our flexible, global workplace, we empower careers, foster collaboration, and build solutions that help keep the world moving safely. Get to … Know Us Headquartered in Minnesota, Entrust is an industry leader in identity-centric security solutions, serving over 150 countries with cutting-edge, scalable technologies. But our secret weapon? Our people. It’s the curiosity, dedication, and innovation that drive our success and help us anticipate the future. We are looking for Senior Software Developer to join our Cambridge-UK … team! Position Overview: A highly skilled developer with strong C programming and good Python exposure as well as good design skills, to work on a major crypto-security product. You must be based in the UK and have the right to work in the UK. Responsibilities: Play a significant role in the design and development of our full-stack More ❯
Posted:

Senior Software Engineer

Cambridge, England, United Kingdom
Hybrid / WFH Options
Entrust
Join us at Entrust At Entrust, we’re shaping the future of identity centric security solutions. From our comprehensive portfolio of solutions to our flexible, global workplace, we empower careers, foster collaboration, and build solutions that help keep the world moving safely. Get to Know Us Headquartered in Minnesota, Entrust is an industry leader in identity-centric security … Cambridge-UK team! Position Overview: A highly skilled developer with strong C programming and good Python exposure as well as good design skills, to work on a major crypto-security product. You must be based in the UK and have the right to work in the UK. Responsibilities: Play a significant role in the design and development of our … software embedded in HSMs, client-side tools, API libraries. Develop features from inception to delivery Software design & coding, testing, and review. Essential Qualifications: Degree or equivalent, in Software Engineering, Computer Science, Maths or relevant discipline. Large-scale development & design on Linux/Windows. Experienced in C & Python development Embedded and application development over the range from embedded code & drivers More ❯
Posted:

Computer Network Defense Analyst (CNDA) Level 1 - 4 with Security Clearance

Maryland, United States
Tailored Access, LLC
collaborative platforms such as video teleconferencing, and the hardware and software that support it all. Advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission … findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers. Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military … training/coursework in networking, computer science, or cyber topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Computer Network Defense Analyst/CNDA (Multiple Levels) with Security Clearance

Annapolis Junction, Maryland, United States
Weeghman & Briggs
Weeghman & Briggs is seeking Computer Network Defense Analysts (CNDA) of multiple levels. Join our growing team and support an important mission within the Federal Government. Location: Annapolis Junction Clearance Required: TS/SCI w/Polygraph As a Computer Network Defense Analyst (CNDA), your responsibilities will include: Use information collected from a variety sources (e.g., intrusion detection systems … such as video teleconferencing, and the hardware and software that support it all. You can advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced network security. Be part of a team, working together with government, military, and contractor personnel to develop shared understandings of intelligence needs, mission … including any new tradecraft that you develop-with teammates, stakeholders, and intelligence consumers. Qualifications: Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military More ❯
Employment Type: Permanent
Salary: USD 121,900 Annual
Posted:

Information Systems Security Manager with Security Clearance

Fairfax, Virginia, United States
M.C. Dean
Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. The Information System Security Manager (ISSM) is responsible for the development, implementation, and continuous improvement of cybersecurity functions for multiple critical systems and for providing strategic and tactical leadership to a cybersecurity staff … including Information System Security Officer(s) and cybersecurity analysts. Responsibilities Key responsibilities include but are not limited with the following: 1. In collaboration with the Facility Security Officer (FSO) and business leadership, take responsibility for establishing Information Systems Security Program identifying, pursuing, and maintaining cybersecurity accreditations and authorizations of critical M.C. Dean enterprise and/or customer … information systems. 2. Lead development, implementation, and continuous improvement of information security policies, standards, plans, and procedures to maintain security posture, ensure compliance, and allow for effective and efficient execution of business functions. 3. Provide effective leadership to identify, assess, and mitigate cybersecurity risks; exercise direct ownership of system monitoring and auditing, threat intelligence, vulnerability management, incident response More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Blockchain Security Engineer, Offensive Security

United Kingdom
P2P
to bring 1B+ people onchain in the most secure way possible. We want to provide them secure platforms and tools to build and interact with exciting applications. The Protocol Security team ensures the security of all onchain development at Coinbase. We partner closely with product teams to make sure that our users can safely and confidently engage with … the onchain world. What you'll be doing (ie. job duties): Perform threat modeling and security assessments of blockchain products and services. Propose, plan, and execute Red Team operations based on realistic threats. Write detailed reports covering the goals and outcomes of Red Team operations, including significant observations and recommendations. Collaborate with partner teams to improve detection and response … capabilities. Provide expert technical guidance to the team in building new security frameworks and analysis tools. Stay informed on current security trends, advisories, publications, and academic research. What we look for in you (ie. job requirements): Bachelor's or Master's degree in Computer Science, Cyber security, Software Engineering, or a related field. 3+ years of More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Blockchain Security Engineer, Offensive Security

London, England, United Kingdom
P2P
to bring 1B+ people onchain in the most secure way possible. We want to provide them secure platforms and tools to build and interact with exciting applications. The Protocol Security team ensures the security of all onchain development at Coinbase. We partner closely with product teams to make sure that our users can safely and confidently engage with … the onchain world. What you’ll be doing (ie. job duties): Perform threat modeling and security assessments of blockchain products and services. Propose, plan, and execute Red Team operations based on realistic threats. Write detailed reports covering the goals and outcomes of Red Team operations, including significant observations and recommendations. Collaborate with partner teams to improve detection and response … capabilities. Provide expert technical guidance to the team in building new security frameworks and analysis tools. Stay informed on current security trends, advisories, publications, and academic research. What we look for in you (ie. job requirements): Bachelor’s or Master’s degree in Computer Science, Cyber security, Software Engineering, or a related field. 3+ years of More ❯
Posted:

Reverse Engineer - multiple levels - CLEARANCE and POLYGRAPH REQ with Security Clearance

Annapolis Junction, Maryland, United States
Constellation Technologies Inc
IDA, IDA Pro, WINDbg, x64dgb, 011yDbg, Immunity Debugger, FireEye AX, Ghidra, CISSP, GIAC, GREM, CREA Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen Must have TS/SCI clearance w/active polygraph This position is open to …/Degree Level 01 requires a minimum four (04) years of experience w/Degree Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). Experience with any of the following: IDA … An Information Assurance Certification may also be required for some specific openings. Support Endpoint Exploitation Activities (EEA) with expertise in malware exploitation (MEX) or mobile-focused capabilities. Experience in Computer Network Operations (CNO) reverse engineering and development-primarily using Python-to enhance access capabilities and drive innovative solutions. Analyzing and advancing endpoint and mobile toolsets to meet evolving needs. More ❯
Employment Type: Permanent
Salary: USD 205,000 Annual
Posted:

Embedded Software Engineer II, Ring

London, United Kingdom
Amazon
are solving challenging problems to make our product more suited to customer needs. About the team As a team we build Ring Doorbell Wired - BASIC QUALIFICATIONS - Bachelors degree in Computer Science, Computer Engineering, Electrical Engineering, related field, or equivalent practical experience. - Proven experience in software and embedded development with C/C++ and familiarity with SoC and embedded … CPU. - Field experience with writing low-level drivers, interrupting service routines, and general troubleshooting/debugging with hardware. PREFERRED QUALIFICATIONS - Master's in Computer Science, Information Security, or related field, or equivalent work experience. - Extensive experience in computer architecture and embedded systems. - Extensive experience in two or more of the following technical categories: - Hardware security (PCB … JTAG, UART, SPI, ROM, microcode, custom ASIC/FPGA). - x86 and/or ARM chipset and firmware security (TPM, UEFI, TrustZone, Secure Boot, JTAG, PCIe). - Security assessment (e.g. penetration testing, incident response, forensics, network traffic analysis). - Performing security reviews and implementing defensive technical security controls. - Virtualization security, side-channel attack vectors, and More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior SOC Analyst

London, England, United Kingdom
IAG GBS
more competitive. Job Description In your role you will work within the team that investigates and analyses high priority cybersecurity incidents with precision. You will respond to and contain security threats effectively, following a robust Cyber Security Incident Response Plan (CIRP). Collaborating with both internal and external stakeholders, you will ensure seamless communication and effective outcomes. You … will document incident responses meticulously and create comprehensive reports. Additionally, you will be responsible for introducing and utilising security automation and scripting to enhance efficiency and security measures. Accountabilities: Monitor security alerts and logs to detect potential security incidents. Conduct initial triage and assessment of incidents to determine severity and impact. Conduct in-depth analysis of … security incidents to determine root cause, scope, and extent of compromise. Analyze malware samples, network traffic, and system logs to identify indicators of compromise (IOCs) and attack patterns. Lead and coordinate incident response efforts, including containment, eradication, and recovery activities. Collaborate with cross-functional teams to mitigate security incidents and minimize business impact. Assist partners in/and More ❯
Posted:

Ethical Hacker - Senior Consultant (4769)

London, England, United Kingdom
MAZARS LIMITED
sectors and geographies, giving you the opportunity to constantly update and grow your skills for lifelong professional development. Job Purpose As a Senior Penetration Tester, you'll lead complex security engagements across infrastructure, cloud, mobile, AI systems, and more. You will design and execute red team operations, mentor junior consultants, and directly influence our technical testing capability and methodology … to closure any issues that impact the service and its value to clients. Working with clients to develop appropriate remediation plans. Providing thought leadership and direction for the Cyber Security practice on malware, attack vectors and methods to protect against threats. Helping recruit, retain and develop the Ethical Hacking team by bringing superior leadership skills. Training and mentoring of … teaming, purple teaming, and social engineering techniques. Application, Infrastructure and Cloud penetration testing experience above and beyond running automated tools. A good understanding of Unix, Microsoft Windows, and network security skills. Excellent written and communication skills in English. Ability to work both independently and collaboratively in a team. Developing applications in one or more of the following: C#, ASP More ❯
Posted:

Computer Network Defense Analyst with Security Clearance

Georgia, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for a Computer Network Defense Analyst (CNDA) with experience in computer or information systems design, programming, cybersecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and systems engineering. You will … wireless transport (Wi-Fi and cellular), and collaborative platforms like video teleconferencing, along with the supporting hardware and software. Experience in network or system administration is also required. The Computer Network Defense Analyst shall possess the following capabilities: Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Computer Network Defense Analyst with Security Clearance

Utah, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for a Computer Network Defense Analyst (CNDA) with experience in computer or information systems design, programming, cybersecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and systems engineering. You will … wireless transport (Wi-Fi and cellular), and collaborative platforms like video teleconferencing, along with the supporting hardware and software. Experience in network or system administration is also required. The Computer Network Defense Analyst shall possess the following capabilities: Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Computer Network Defense Analyst with Security Clearance

San Antonio, Texas, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for a Computer Network Defense Analyst (CNDA) with experience in computer or information systems design, programming, cybersecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and systems engineering. You will … wireless transport (Wi-Fi and cellular), and collaborative platforms like video teleconferencing, along with the supporting hardware and software. Experience in network or system administration is also required. The Computer Network Defense Analyst shall possess the following capabilities: Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Computer Network Defense Analyst with Security Clearance

Aurora, Colorado, United States
Torin Consulting, Inc
growth. We do this by offering exceptional benefits, flexible schedules, and the tools necessary to achieve success through paid training, mentoring, and the opportunity to work alongside top-notch security professionals. Join us on this journey as we execute this new mission-critical contract providing Cybersecurity Expertise and Risk Management! Your effort and expertise are crucial to the success … Analyst, Digital Network Exploitation Analyst, Target Digital Network Analyst, Cyber Network Defense Analyst by improving, protecting, and defending our Nation's Security. Job Description: We are looking for a Computer Network Defense Analyst (CNDA) with experience in computer or information systems design, programming, cybersecurity, vulnerability analysis, penetration testing, computer forensics, information assurance, and systems engineering. You will … wireless transport (Wi-Fi and cellular), and collaborative platforms like video teleconferencing, along with the supporting hardware and software. Experience in network or system administration is also required. The Computer Network Defense Analyst shall possess the following capabilities: Utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs, to identify potential More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Computer Security
25th Percentile
£24,460
Median
£25,640
75th Percentile
£26,820
90th Percentile
£45,910