to identify gaps in tools and development techniques. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike Mimic threat actor behavior using Tactics, Techniques and Procedures (TTPs) aligned with frameworks like MITRE ATT&CK Conduct assessments … across multiple operating systems including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in offensive tools and development techniques Perform development with at least two scripting or programming languages (Python, C+, Java, Rust, Assembly, C#, etc.) in More ❯
to travel approx. 10% each year if necessary (typically within the Continental United States) Desired (but not required) Qualifications: Experience with RUST Familiarity with Linux/POSIX platforms Familiarity with fundamental networking implementations and concepts, including basic LAN and WAN networking skills Familiarity with virtualization and containerization technologies Familiarity … with the following tools, concepts, and products are a plus: Ubuntu, Red Hat, similar Linux Distributions Networking Protocols Software Reverse Engineering tools (Ida Pro, Ghidra, Boofuzz, Frida) Wireshark KaliLinux proficiency Scanning/Analysis Tools (nmap, nikto, etc) Exploitation Tools (Metasploit, Cobalt Strike, etc) Required Education: Candidates More ❯
Pentesting Strong knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding practices. Proficiency in tools such as Burp Suite, ZAP, Metasploit, KaliLinux, etc. Familiarity with testing APIs (REST/GraphQL), mobile applications, and desktop applications. Solid understanding of authentication protocols (OAuth2, SAML, PKI). More ❯
centralized monitoring and alerting. Vulnerability Assessment Tools: Tenable Nessus, Qualys, or OpenVAS for identifying and mitigating vulnerabilities. Penetration Testing Tools: Metasploit, Burp Suite, or KaliLinux for security assessments. Incident Management Systems: FireEye, Carbon Black, or CrowdStrike for threat detection and response coordination. Relevant certifications such as CISSP More ❯
. Foreign language ability Experience as a member of red team/blue team activities Experience with a variety of pen testing tools including kaliLinux Ability to automate processes through scripting Knowledge of network analysis tools and operating system tools. Experience with the following: SQL, Hadoop, or … analysis on a variety of datasets to identify elements of interest. Demonstrated experience of internet applications and protocols. Demonstrated experience in both Windows and Linux operating systems. A candidate must be a US Citizen and requires an active/current TS/SCI with Polygraph clearance. Equal Opportunity Employer More ❯
. Foreign language ability Experience as a member of red team/blue team activities Experience with a variety of pen testing tools including kaliLinux Ability to automate processes through scripting Knowledge of network analysis tools and operating system tools. Experience with the following: SQL, Hadoop, or … analysis on a variety of datasets to identify elements of interest. Demonstrated experience of internet applications and protocols. Demonstrated experience in both Windows and Linux operating systems. More ❯
security role. Experience performing two or more types of penetration test such as web application, infrastructure, cloud etc Experience working with tools such as KaliLinux, BurpSuite and Bloodhound. Minimum C1 German and fluent English Desirable: Relevant certifications e.g. OSCP, OSEP, CRTO etc. Company Benefits: 30+ days holidays More ❯
Experience performing web application security assessments Experience with TCP/IP protocols as it relates to network security Experience with offensive tool sets including: KaliLinux, Metasploit, CobaltStrike, Intercepting Proxies, etc. Experience in using network protocol analyzers and sniffers, as well as ability to decipher packet captures Excellent More ❯
Experience performing web application security assessments Experience with TCP/IP protocols as it relates to network security Experience with offensive tool sets including: KaliLinux, Metasploit, CobaltStrike, Intercepting Proxies, etc. Experience in using network protocol analyzers and sniffers, as well as ability to decipher packet captures Excellent More ❯
Experience performing web application security assessments Experience with TCP/IP protocols as it relates to network security Experience with offensive tool sets including: KaliLinux, Metasploit, CobaltStrike, Intercepting Proxies, etc. Experience in using network protocol analyzers and sniffers, as well as ability to decipher packet captures Excellent More ❯
Experience performing web application security assessments Experience with TCP/IP protocols as it relates to network security Experience with offensive tool sets including: KaliLinux, Metasploit, CobaltStrike, Intercepting Proxies, etc. Experience in using network protocol analyzers and sniffers, as well as ability to decipher packet captures Excellent More ❯
Experience performing web application security assessments Experience with TCP/IP protocols as it relates to network security Experience with offensive tool sets including: KaliLinux, Metasploit, CobaltStrike, Intercepting Proxies, etc. Experience in using network protocol analyzers and sniffers, as well as ability to decipher packet captures Excellent More ❯
unique mission needs. Familiarity with Red Teaming/Cyber exploitation concepts (e.g., killchain, MITRE ATT&CK, common hacker tools such as Metasploit/Meterpreter, Kalilinux, etc.) Ability to code/script simple programs and functions in Python, bash, powershell, etc., to enable analytic triage and automation. Familiarity More ❯
El Segundo, California, United States Hybrid / WFH Options
Aerospace Corporation
in computer science or cybersecurity. At least one cybersecurity certification (CISSP, C EH, SANS, etc. Expert with bash, shell, PowerShell, and basic scripting on Linux and Windows platforms. Solid understanding of satellite system design and technology. Knowledge of various cyber tools such as KaliLinux and competitive More ❯
City of London, London, Walbrook, United Kingdom Hybrid / WFH Options
Langley James IT Recruitment
Azure AD/Group Policy. Desired Experience: Familiarity with Imperva WAF/DDoS, Menlo, Cisco security, KnowBe4, Digicert, patching tools, web application scanners, and Kali Linux. Candidate Profile: Relevant security certifications (CISM, MS Security, OSCP preferred). Financial services/SOC/pentesting background desirable. Strong communication and problem More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
Aerospace Corporation
the staff of an Authorizing Official (AO) or Security Control Assessor's (SCA). Have certifications and/or have undergone focused training on KaliLinux or other penetration testing type tools, Security Incident and Event Management (SIEM) products, Endpoint Detection and Response (EDR) solutions, or other cybersecurity More ❯
a passion for professional growth Passion for technology and cybersecurity Our current stack and tools: Programming Language, Python, C/C++ Git Hacking Tools, Kali Toolsuite Operative Systems, UNIX Based OS Networks, Network basis (protocols and technical aspects), usage of network tools like wireshark Benefits Permanent contract. Full-time More ❯
support of red team operations). Minimum 4 years of hands-on experience with using penetration testing and red teaming software frameworks (Cobalt Strike, Kali, etc.) in a production environment. Minimum 4 years of experience of network technologies and protocols (OSI model, routing, building, and troubleshooting networks, etc.). More ❯
lieu of degree. Perform a variety of tasks, including specialization in several sub-fields such as kernel mode programming for platforms like Windows and Linux in C, C++, or Assembly, reverse engineering of various instruction set architectures (e.g., x86, x64, MIPS, PPC, or ARM), and vulnerability analysis. Experience with … VMware, ESXi, IDA Prol, Olly Debug, Ghidra, KaliLinux, GDP, Tcpdump, Wireshark, Strace, NC, NMAP, and other tools. Preferred Qualifications : Self-motivated, creative, willing to work as a member of a team, who can organize and manage an individual schedule. Knowledge of internet protocols, telecommunication technologies, and internet More ❯
zijn een plus, net als andere relevante certificaten (bijv. ITIL4, CEH). Kennis van netwerkinfrastructuren (bijv. Cisco ASA, VPN's) en cybersecurity-tools (bijv. KaliLinux, Metasploit). What's in it for you? Onze prioriteit is dat je je goed voelt op het werk. Babbeltjes in de More ❯
Experience of operations management processes Familiar with Penetration Testing life cycle Strong written communication Familiar with variety of Computer Operating Systems Desired : Experience with KaliLinux tools This position is contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI More ❯
. 3. Minimum of 3 years of hands-on experience with using modifying and customizing penetration testing and red teaming software frameworks (Cobalt Strike, Kali, etc.) to meet operational requirements. 4. Minimum of 2 years of independently conducting every phase of a red team exercise on their own without More ❯
understanding internet applications and protocols Demonstrated experience and the ability to use the Internet in an operational environment Demonstrated experience with both Windows and Linux operating systems Desired Qualifications: Demonstrated experience with foreign language skills, spoken, written, or reading, specifically Chines, Russian, Farsi, or Arabic Demonstrated experience in penetration … testing, defensive methodologies, or network intrusion response using applications such as MetaSploit, Kali/BackTrack, Nmap, Snort, Nessus, and NetWitness Demonstrated experience creating and automating technical solutions to manipulate large datasets Demonstrated experience with network analysis tools (Network Traffic Analysis, Encase, RedSeal, Protocol Analyzers, Hex Editors, Splunk), and operating More ❯
County Antrim, United Kingdom Hybrid / WFH Options
Cyber Guarded
equivalent. All CHECK Team Leaders (CTL) must hold a UK CSC Professional Title at Principal level or above. Solid knowledge of networking, operating systems (Linux, Windows) and web technologies. Proficiency with tools such as Burp Suite, Metasploit, Nessus and Kali Linux. Familiarity with OWASP Top 10 and modern More ❯
Belfast, County Antrim, Northern Ireland, United Kingdom Hybrid / WFH Options
Get Staffed Online Recruitment
equivalent. All CHECK Team Leaders (CTL) must hold a UK CSC Professional Title at Principal level or above. Solid knowledge of networking, operating systems (Linux, Windows) and web technologies. Proficiency with tools such as Burp Suite, Metasploit, Nessus and Kali Linux. Familiarity with OWASP Top 10 and modern More ❯