lead projects Capacity to explain complex technical concepts to non-technical stakeholders Certifications: Relevant certifications might include: Tanium Certified Operator/Administrator Certified Information Systems Security Professional ( CISSP) Certified Ethical Hacker CEH Similar security certifications (ex: Security+). This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI More ❯
We are currently seeking a highly skilled and results-oriented Penetration Tester/Ethical Hacker with at least 5 years of hands-on penetration testing/ethicalhacking experience . This role is office-based with occasional travel to client sites. Please do not apply if you don't have at least one of the following qualifications More ❯
Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of Vulnerability Scanning, Management, and EthicalHacking (Penetration Testing). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work in a 24/ More ❯
or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Education Requirements & Experience Minimum of More ❯
the future together! Who We Are: Passionate Integrity, Driven by Excellence "Ardent Principles" signifies our unwavering commitment to excellence, driven by a profound passion and a strict adherence to ethical values. We believe that happy employees make for happy clients. Our mission is to act as a bridge between satisfied clients and fulfilled employees, ensuring that your job and … Directive (ICD) 503, Federal Information Processing Standards (FIPS), National Institute of Standards and Technology (NIST) Special Publication (SP) 800 A, SP 800 Certifications: Certified Information Security Manager (CISM), Certified Ethical Hacker. What We Offer You Highly Competitive Salary: Recognizing and rewarding your expertise and contributions. Generous Paid Time Off: Providing ample time for rest, relaxation, and personal pursuits. Dedicated More ❯
in Computer Science, Computer Engineering and/or Information Systems or other related discipline. 5+ years of experience CISSP or CISA or CISM or CompTIA Security + or Certified Ethical Hacker Top Secret with the ability to obtain a TS/TSCI GDIT IS YOUR PLACE: • Full-flex work week to own your priorities at work and at home More ❯
as well as policies and regulations. • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH) • General technical certifications such as CompTIA Network+, Security+, Linux+ More ❯
space-based communication systems. Additional experience in Network Engineering practices in compliance with DoD standards. Desired Certifications: Cisco Certified Network Associate (CCNA), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), CompTIA Security+, or equivalent certifications. Familiarity with tools like: Wireshark, SolarWinds, and analysis tools. Experience with scripting and automation of network configurations (python, bash, PowerShell) Collaboration & Communication More ❯
management, and encryption. Understanding of security frameworks such as NIST, CIS Controls, or ISO 27001. Formal industry recognised Cyber Security qualification such as ISC2 CISSP, ISC2 CISM or Certified Ethical Hacker (CEH) (desired). Security and Network technology experience. About us: We are an international engineering and construction company delivering state-of-the-art infrastructure and buildings projects for More ❯
Management Framework (RMF) process. • Possession of excellent customer service and organization skills. • Possession of excellent oral and written communication skills. Preferred Certifications: • Certified Information Systems Security Professional (CISSP) • Certified Ethical Hacker (CEH) • Certified SCADA Security Architect (CSSA) Related Control Systems. Abilities: • Exposure to computer screens for an extended period of time. • Sitting for extended periods of time. • Reach by More ❯
degree in Computer Science, IT, Cybersecurity, or Data Science from an accredited University; or Certifications: Certified Information Systems Security Professional (CISSP); or CompTIA Advanced Security Practitioner (CASP+); or Certified Ethical Hacker (CEH); or CompTIA Security+ CE Desired Qualifications: Professional project management certification, such as Project+, CAPM, PMP, or similar. Experience planning, designing, engineering, testing, deploying, and maintaining large-scale More ❯
a degree, commensurate operational experience may be substituted. Must have 10-15 years in cyber, communications, cybersecurity experience. Must possess a CSSP Auditor certification Must possess the CEH (Certified Ethical Hacker) certification. Possess IAT Level II certifications and CSSP Analyst computing environment certification - (CompTIA Secuirty + CE) IAM Level II - Must have either CISSP (Computer Information Systems Security Professional More ❯
tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we offer: At More ❯
findings including any new tradecraft that you develop with teammates, stakeholders, and intelligence consumers These Qualifications Would be Nice to Have: JCAC (Joint Cyber Analysis Course), Network+, Security+, Certified Ethical Hacker (CEH), Microsoft Networking, Computer Network Administrator (CNA), Certified Information Systems Security Professional (CISSP), Information Systems Security Engineering Professional (ISSEP), Certified EthicalHacking, and Certified Information Systems More ❯
experience with the ability to lead a team Proven expertise in Red Team operations, threat emulation, and offensive security. Strong understanding of adversary TTPs, MITRE ATT&CK framework, and ethicalhacking principles. Excellent communication skills with the ability to convey complex technical concepts to non-technical stakeholders. Certifications or equivalent advanced certification as recognized under DoD 8140, (one More ❯
years of practical, hands-on Cybersecurity experience Proven analysist in Red Team operations, threat emulation, and offensive security Strong understanding of adversary TTPs, MITRE ATT&CK framework, and ethicalhacking principles Excellent communication skills with the ability to convey complex technical concepts to non-technical stakeholders Certifications or equivalent advanced certification as recognized under DoD 8140, (one required More ❯
and written English communication skills. Excellent interpersonal and presentation skills. Strong analytical skills. Good understanding of network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and EthicalHacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work More ❯
required for my client based in Leeds/London - visit office 2 x per month. This is a permanent opportunity. Salary approx. £50-80k. Are you a skilled ethical hacker with a passion for uncovering vulnerabilities? My client are a fast-growing cybersecurity reseller/MSP delivering cutting-edge security solutions across multiple sectors. The Role: As the More ❯
Demonstrable experience as a Systems Administrator or Software Developer...or both! Expert knowledge of Cloud Software Security (NOT Networking or Infrastructure) Software Security related Certification such as CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional) Passion for DevSecOps and with knowledge of Terraform, Bicep, Sonar Clous, Wiz, and other security product like Trivy Experience with cloud More ❯
a good old fashioned Unix/Linux Systems Administrator...or someone who has worked as a Senior .NET Developer and has a Software Security Certification like: like CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional), We want someone with a development/some form of coding background who has blossomed into Software Security/Cloud Security More ❯
Must be able to provide daily supervision and direction to support teams Qualifications: 6-10 years' experience in cyber threat analysis Recommended (Not required) certifications include: Security+ (SEC+), Certified Ethical Hacker (CEH), Network+ (Net+), Certified Information Systems Security Professional (CISSP) Education A degree in relevant field such as history, political science, sociology, or other social science field Clearance TS More ❯
education and experience). Clearance: Active DOE Q-Clearance or Top Secret (TS) equivalent required. Certifications (Preferred): OSCP (Offensive Security Certified Professional) OSCE (Offensive Security Certified Expert) CEH (Certified Ethical Hacker) CISSP (Certified Information Systems Security Professional) Technical Skills & Tools Strong proficiency in vulnerability analysis, risk remediation, and reporting. Ability to clearly replicate vulnerabilities and provide actionable mitigation steps. More ❯
Master's Degree in Cyber Security or IT-related field Certifications that demonstrate firsthand Information technology knowledge specific to the Army and OT environments are highly desirable, including: Certified Ethical Hacker (CEH) GIAC Security Essentials (GSEC) Certified SCADA Security Architect (CSSA) Information Technology Infrastructure Library (ITIL) The ideal candidate brings expertise in: Zero Trust architecture, Identity, Credential, & Access Management More ❯
Istio, Kubernetes, Linux, or Python. Ability to work independently and in a team environment. Strong oral and written communication skills. Preferred Qualifications: Certification in AWS, Kubernetes, CCSP, CISSP, Certified Ethical Hacker, Security+. ADA Notations: Regular communication (hearing/speaking). Noise conditions range from very quiet to very noisy. Prolonged use of computer (typing/keyboarding). Frequently required More ❯