Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems … including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in offensive tools and development techniques Perform development with at least two scripting or programming languages (Python, C++, Java, Rust, Assembly, C#, etc.) in support of exploit development … time professional experience conducting penetration testing or offensive Cyber operations in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. o Mimicking threat behavior. o Utilizing various operating systems (examples include Linux, Windows, MAC OS, etc.); o Utilizing Active More ❯
Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems … including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in offensive tools and development techniques Perform development with at least two scripting or programming languages (Python, C++, Java, Rust, Assembly, C#, etc.) in support of exploit development … conducting penetration testing or offensive Cyber operations including demonstrated experience in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. o Mimicking threat behavior. o Utilizing various operating systems (examples include Linux, Windows, MAC OS, etc.); o Utilizing Active More ❯
and execute complex Red Team penetration tests and cyber adversary emulation operations. Design, develop, and employ offensive tools using platforms such as Metasploit, NMAP, KaliLinux, and Cobalt Strike. Emulate threat actor TTPs based on MITRE ATT&CK, APT profiles, and emerging threat intelligence. Conduct assessments and attacks … across various platforms, including Linux, Windows, and macOS. Exploit and manipulate Active Directory environments to assess internal and external threat postures. Perform exploit development and vulnerability research to identify and validate security flaws. Identify limitations in existing toolsets and develop custom techniques to improve effectiveness and stealth. Script and … years of full-time professional experience in Red Team operations and penetration testing, including: Developing and leveraging offensive tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike. Simulating adversary behavior and TTPs. Operating across Linux, Windows, and macOS environments. Utilizing and exploiting Active Directory infrastructures. Performing More ❯
RESPONSIBILITIES Plan, execute, and document full-scope penetration tests and adversary emulation exercises. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike. Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK. Conduct assessments across multiple operating systems … including Linux, Windows, and macOS. Perform exploit development and identify zero-day or previously unknown vulnerabilities. Analyze, identify, and remediate gaps in offensive tools and Red Team methodologies. Perform scripting and programming tasks in support of custom exploit development and automation. Work collaboratively with Blue Team, tool developers, and … full-time professional experience in each of the following: Conducting penetration testing or offensive cyber operations. Developing and using tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike. Mimicking threat behavior and adversary simulation. Working across Linux, Windows, and macOS environments. Utilizing and exploiting Active Directory More ❯
obtain the ISTQB Certified Tester Advanced Level-Test Analyst (CTAL-TA) certification within 2 years of hire. Advanced experience with Windows (Power Shell) and Linux (Kali and Ubuntu) command line interface. Intermediate ability to interface effectively with customers, end-users, technical leads, and program management throughout the full … the Agile mindset and methodologies, including Agile project management. DESIRED QUALIFICATIONS/SKILLS Knowledgeable on various Software Development Lifecycles. Advanced experience working in Windows, Linux (Kali and Ubuntu), and VMware environments. Intermediate experience with Agile/Scrum Framework and Issue Management Tools (e.g., Confluence, Jira, Azure DevOps). More ❯
Must obtain the ISTQB Certified Tester Advanced Level-Test Analyst (CTAL-TA) certification within 2 years of hire. Experience with Windows (Power Shell) and Linux (Kali and Ubuntu) command line interface. Intermediate ability to interface effectively with customers, end-users, technical leads, and program management throughout the full … and executing test plans, procedures, reports, and technical documentation. DESIRED QUALIFICATIONS/SKILLS Knowledgeable on various Software Development Lifecycles. Advanced experience working in Windows, Linux (Kali and Ubuntu), and VMware environments. Intermediate experience with Agile/Scrum Framework and Issue Management Tools (e.g., Confluence, Jira, Azure DevOps). More ❯
testing. • Proven ability to perform computer network vulnerability assessment and penetration testing. • Proficient in tools such as Nmap, Wireshark, Metasploit, Canvas, Kismet, Burp Suite, Kali Linuxetc. • Understanding of operating systems (MaxOS, Windows, Linux) and how clients/servers are built and secured. • Ability to research, prioritize, problem solve … infosec, system testing and client structures. TECHNOLOGIES USED: Operating Systems: • Microsoft Windows (7 - 10, Server ) • UNIX (Solaris, HP-UX, etc.,) Operating System versions • Common Linux distributions including RHEL/CentOS/Rocky and Debian/Ubuntu • OSX/iOS and Android • VMware/ESXi/KVM/OpenVZ or … other virtualized environments • Linux variant Operating Systems versions • BSD variant Operating Systems versions Software/Scripting: • Java/C++ • Bash/Perl/Powershell/Python Database Administration and application development with: • Oracle platforms • SQL Server • MySQL • Hadoop Wireless: • WiFi/WiMax/Bluetooth technology (hardware or core software More ❯
will allow you to expand both your offensive and defensive networks security skills by using tools like Shodan, Maltego and various tools in the KaliLinux environment. Applicants for this position should have a solid understanding of network engineering with some exposure to bash and/or Python … scripting. REQUIRED SKILLS: • Proficiency working in a Linux environment (CentOS, Ubuntu, Fedora, Solaris, Kali). • Experience configuring small business or home network (SOHO) devices (e.g., wifi routers, switches, etc.). • Comfortable working in a command-line environment (SSH, bash, telnet, etc.) • Experience monitoring network activity, to include performing … the design, implementation, procurement, tradecraft or maintenance of various layers within covert network infrastructure. • Proven ability to design and develop integrated network solutions using Linux and traditional appliance network devices. DESIRED SKILLS: • Scripting including Python, Bash and Perl and frameworks like Ansible. • Understanding of Linux network security tools More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Risk Crew
processes. Your mandatory technical skills: Ability to perform black box, grey box and white box tests with an attacker's mindset. Expertise in using Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit and other security tools. Strong knowledge of the OWASP Testing Methodology. Strong understanding of security protocols, such as More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Risk Crew
processes. Your mandatory technical skills: Ability to perform black box, grey box and white box tests with an attacker's mindset. Expertise in using Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit and other security tools. Strong knowledge of the OWASP Testing Methodology. Strong understanding of security protocols, such as More ❯
and non-technical audiences. Requirements Proven experience in penetration testing and ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP More ❯
to obtain before start date: CCNA Cyber Ops, CCNA-Security, CEH, CFR, Cloud+, CySA+, GCIA, GCIH, GICSP, SCYBER, Security+ CE, SSCP Demonstrated experience with Kali Linux. Demonstrated penetration testing tools experience with Nmap, Burp Suite, Metasploit, etc. Demonstrated ability in evaluating vulnerabilities, performing root cause analysis, and reporting findings More ❯
and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike Mimicking threat behavior Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Exploit development Identifying gaps in More ❯
professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike; Mimicking threat behavior; Utilizing various operating systems (Linux, Windows, MAC OS); Utilizing Active Directory; Performing exploit development; Identifying gaps More ❯
or network penetration testing with track record of end to end testing of complex systems. Advanced knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong expertise with web application and network pen testing methodologies. Proficiency … in using penetration testing tools such as BurpSuite Pro, Nmap, Nessus, and Metasploit. Experienced in using KaliLinux and the associated penetration testing tool suite. Advanced completion of penetration testing simulations like Hack the Box or Capture the Flag or ideally one of the following certifications: CSTL/ More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
and penetration testing. Demonstrable experience in infrastructure and web application testing; experience in API testing is desirable. Demonstrable experience using common pentesting tools including KaliLinux, Burpsuite, Nessus and other industry standard tools. Hold or working towards an industry recognised certification including CompTIA PenTest+; CHECK, CREST; Offensive Security More ❯
activities, and current Cyber updates while adhering to 319CTS instructions, security classification guides, and other guidance as identified in lesson plans. Fully versed in LINUX OS Fundamentals, administration, processes, services, command shells, networking, scripting, partitions, and surveying Interface with internal and external Cyber agencies as required to update and … Ethical Hacker (CIEH) (Optional) Skills, including, but not limited to, using any of the following tools, capabilities: NMAP Endpoint Detection and Response (EDR) tools Linux CLI, Powershell, Windows CLI Metasploit KaliLinux Protocol Analyzers, Password Crackers, Vulnerability Assessment Command Line Tools: netstat, nslookup, netcat etc Pyhton, Bash More ❯
exploiting vulnerabilities in complex systems and applications. Experience with vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) and penetration testing tools (e.g., Metasploit, Burp Suite, KaliLinux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR, PCI-DSS) Relevant certifications (e.g., CEH, OSCP, CISSP More ❯
Injection, SQLi, single sign-on limitations, etc. Must be proficient in any of the following: PowerShell Empire, Metasploit Framework, Cobalt Strike, Burp Suite, Canvas, KaliLinux, IPTables, Sysinternals, A/V evasion methodologies, Exploit Dev. Must have solid working experience and knowledge of Windows operating systems (incl. Active … Directory), Linux operating systems; ESXi or similar; mobile platforms are a plus. Solid understanding of networking, TCP/IP, virtualization and cloud/data center architecture. Strong familiarity with some of the following: OWASP top 10, DoD and NSA Vulnerability and Penetration Testing Standards. Knowledge of exploitation concepts including More ❯
cybersecurity operations, digital forensics, or large-scale data analysis. Strong understanding of internet protocols, network infrastructure, and system security. Proficient in both Windows and Linux environments. Familiarity with scripting (e.g., Python, Bash) and cybersecurity tools (e.g., Wireshark, SIEM, KaliLinux). Ability to convey technical findings clearly More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
HS diploma or GED and 7+ years of experience in Information Technology, or Bachelor's degree and 3+ years of experience in Information Technology Linux Computing Environment (CE) Certification Windows CE Certification Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN) Certification DoD Approved 8570 Information Assurance Technician … IAT) Level III Certification, including CASP+ CE, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP Certification Additional Qualifications Experience with Cobalt Strike, Metasploit, and KaliLinux Python Certification Completion of the Red Team Apprentice, Offensive Methodology Analysis, or Red Team Operations Training Clearance: Applicants selected will be subject More ❯
Experience performing web application security assessments Experience with TCP/IP protocols as it relates to network security Experience with offensive tool sets including: KaliLinux, Metasploit, CobaltStrike, Intercepting Proxies, etc. Experience in using network protocol analyzers and sniffers, as well as ability to decipher packet captures Excellent More ❯
access management Advanced, hands-on experience with manual vulnerability testing and static code analysis Advanced experience with tools including, but not limited to, the KaliLinux platform and its built-in tools Advanced experience performing manual testing with Burp Suite, OWASP ZAP, or similar tools Advanced understanding of More ❯