maintaining network infrastructure using Juniper, Cisco (including Nexus), MikroTik, and FortiGate devices Detailed understanding of modern router architecture, LAN switching architecture, design and implementation. Understanding diagnostic tools, Tcpdump, Wireshark, NMAP, Netflow. Knowledge of monitoring and management tools (OSS/NMS) such as OpenNMS or similar. Network automation exposure with experience in Python software development and network infrastructure management using CLI More ❯
one or more of the following DoD 8570.01-M CSSP Auditor certifications: CEH CySA+ CISA GSNA CFR PenTest+ Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … Seven (7) years of full-time professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Performing exploit development Identifying gaps in tools and development More ❯
the following certifications: Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … time professional experience conducting penetration testing and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Performing exploit development Identifying gaps in tools and development More ❯
the following certifications: Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … time professional experience conducting penetration testing and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Performing exploit development Identifying gaps in tools and development More ❯
the following certifications: Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … time professional experience conducting penetration testing and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Performing exploit development Identifying gaps in tools and development More ❯
the following certifications: Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … time professional experience conducting penetration testing and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Performing exploit development Identifying gaps in tools and development More ❯
the following certifications: Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … time professional experience conducting penetration testing and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Performing exploit development Identifying gaps in tools and development More ❯
the following certifications: Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … time professional experience conducting penetration testing and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Performing exploit development Identifying gaps in tools and development More ❯
the following certifications: Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … time professional experience conducting penetration testing and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Performing exploit development Identifying gaps in tools and development More ❯
the following certifications: Offensive Security Certified Expert (OSCE) Offensive Security Exploitation Expert (OSEE) Offensive Security Wireless Professional (OSWP) Responsibilities: Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform … time professional experience conducting penetration testing and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike Mimicking threat behavior and adversary emulation Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Performing exploit development Identifying gaps in tools and development More ❯
z2ez0 • Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP WebInspect, NetworkMapper (NMAP), and/or similar applications. • Hold At least one of the following certifications: o Certified Information Systems Security Professional (CISSP), or o CISM or o Global Information Security Professional (GISP), or o the CompTIA Advanced More ❯
Risk Management Framework (RMF), NMAP, PKI, Wireshark, auditing, penetration testing, scripting, IASAE, CISSP, ISSEP, NISCAP Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen Must have TS/SCI clearance w/active polygraph Bachelor's degree in Computer Science … have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services. Must have experience with secure configurations of commonly used desktop and server operating systems. More ❯
environments, perform testing, and generate technical reports for Common Criteria and FIPS evaluations. Perform vulnerability analysis on product/system designs against applicable security criteria using tools like Nessus, NMAP, and Wireshark. Develop mitigation strategies for vulnerabilities identified during security testing. Act as the primary project point of contact (POC) for internal and external stakeholders. Required Skillset: 5+ years of … validation. Expertise in cryptographic encryption algorithms, key exchange protocols, PKI, random number generators, and hashing/message authentication algorithms. Proficiency in vulnerability analysis tools such as Nessus, NMAP, and Wireshark. Proficiency in FIPS 186-4/5, SP 800-186, SP 800-90B, and FIPS 140-3 requirements. Knowledge of security protocols (e.g., SSH, IPsec, TLS). Strong technical More ❯
Network Engineer Location - Norfolk, VA Clearance - Active Secret Clearance required (Can hold up to Top Secret) M-F Days Onsite Monday-Friday Job Responsibilities: • Provide IT engineering and technical services and support for a broad assortment of system engineering and More ❯