We are watchTowr, a VC-backed cyber security startup helping organisations continuously discover vulnerabilities in their Internet-facing attack surface. Cyber security veterans and technical experts, we are obsessed with building cybersecurity technology to help prevent breaches. With experience informed by years of simulating sophisticated cyber attacks against some of the world's largest organisations, our mission is … breaches. We are in a high and aggressive growth phase of our journey, and are excited to continue adding colleagues to join our phorce of nature. Our vision for offensivesecurity is continuous. But what's the role? We are looking for an ambitious colleague to join watchTowr as our first Head of Information Security to manage … and continuously evolve watchTowr's internal cyber security capability. As such, this is a hands-on role that will act as an individual-contributor in the initial stages. Although watchTowr's first dedicated internal Info Sec role, as a cyber security company, watchTowr has built a strong internal cyber security posture and culture since day zero, maintained More ❯
Penetration Tester – UK remote - £30,000 - £40,000 + Benefits + Bonus Our client is looking for a Penetration Tester to join their established OffensiveSecurity function. This role involves conducting and delivering high-quality security assessments across web applications, infrastructure, mobile, cloud, and networks. Our client is looking for someone who has a wide understanding of … different types of security testing, and in-depth threat-intelligence knowledge. Main Responsibilities: Perform penetration tests on web applications, networks, APIs, cloud environments, and mobile platforms. Assist in red team exercises, social engineering assessments, and security awareness initiatives. Conduct vulnerability assessments, exploit security flaws, and document findings with actionable remediation steps. Simulate real-world attack scenarios to … evaluate security weaknesses. Utilize and develop custom scripts, tools, and exploits to test system defences. Work closely with security teams to remediate identified vulnerabilities. To be considered, you should have: 1+ years in a professional Penetration Testing role. Strong interest of OWASP Top 10, MITRE ATT&CK Framework, and common exploit techniques. Desire and interest to build a More ❯
Are you a cybersecurity enthusiast with expertise in penetration testing across infrastructure, web applications, mobile, and cloud environments? A Penetration Tester is needed to deliver high-quality security assessments and support clients in identifying and addressing vulnerabilities across their technology landscape. Based near Doncaster or Manchester, this role involves hands-on penetration testing across infrastructure and applications, contributing to … technical reporting, and working closely with a skilled cybersecurity team on a variety of engagements. Ideal for someone with a strong interest in offensivesecurity and a solid foundation in network, web, or cloud testing. Looking to deepen your expertise and work on meaningful security challenges? Apply now to be part of a team delivering real impact. … Key Responsibilities: Conduct penetration testing on infrastructure, web applications, mobile platforms, and cloud environments to uncover vulnerabilities. Analyze testing outcomes and provide actionable recommendations to improve security measures. Collaborate with cross-functional teams to develop and implement security strategies. Stay updated on emerging cybersecurity threats and adapt testing methodologies accordingly. Skills & Requirements: Proven experience in penetration testing for More ❯
We are watchTowr, a VC-backed global cyber security startup helping organisations continuously discover vulnerabilities in their Internet-facing attack surface. Cyber security veterans and technical experts, we are obsessed with building cybersecurity technology to help prevent breaches. With experience informed by years of simulating sophisticated cyber attacks against some of the world's largest organisations, our mission … breaches. We are in a high and aggressive growth phase of our journey, and are excited to continue adding colleagues to join our phorce of nature. Our vision for offensivesecurity is continuous. But what's the role? We are looking for a passionate Senior HR Manager to support our growing global team. This is a UK-based … to effectively fulfil your role. Endless opportunities - we are in a high-growth phase of our journey, and plan to promote from within as we scale. Work with cyber security experts - we are solving cutting-edge industry-wide cyber security challenges with some of the world's most advanced organisations. Please note that at this time, we cannot More ❯
Solana) OffensiveSecurity Engineer - 100% Remote, Blockchain, DeFi About Halborn Inc Our mission is to provide value-add security services and products to the world's most cutting edge technology firms and that starts with blockchain tech. Founded in 2019, Halborn is an elite cyber security company focused on solving complex adversarial problems unique to the … as new startups with high growth trajectories. Our Culture Halborn is a globally distributed team of 100+, looking to grow our elite team of white hat hackers, sales professionals, security engineers and DevSecOps specialists who value independence, want to make their own hours, work for themselves and have a passion for the ever evolving cryptocurrency industry. Our Commitment to … does not have a signed agreement with Halborn Inc. Responsibilities Conduct realistic adversary simulations from conception through reporting. Perform testing of systems, applications, networks, and processes. Research cutting-edge offensivesecurity techniques. Develop tools and exploits. Communicate clearly and effectively, both written and orally, the risks that exist and remediations required. Work collaboratively and independently on unique or More ❯
got what you're looking for. Job Description: Parsons is looking for an amazingly talented Software Developer to join our team! In this role you will get to conduct offensive capability development for Windows environments. What You'll Be Doing: Offensive capability development Program in C and C# and BOFs Work in a Scrm/Agile Environment Malware … development, analysis and software vulnerability research What Required Skills You'll Bring: Active TS/SCI Clearance Must be proficient in offensive capability development for Windows environments. Proficient in C and C# and BOFs. Should have experience working in an agile/scrum environment. Experience with Cobalt Strike Special requirements: Professional Certification(s) required for this position are as … cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or software exploit More ❯
Bitcoin OffensiveSecurity Engineer - 100% Remote, Blockchain, DeFi About Halborn Inc Our mission is to provide value-add security services and products to the world's most cutting edge technology firms and that starts with blockchain tech. Founded in 2019, Halborn is an elite cyber security company focused on solving complex adversarial problems unique to the … as new startups with high growth trajectories. Our Culture Halborn is a globally distributed team of 100+, looking to grow our elite team of white hat hackers, sales professionals, security engineers and DevSecOps specialists who value independence, want to make their own hours, work for themselves and have a passion for the ever evolving cryptocurrency industry. Our Commitment to … does not have a signed agreement with Halborn Inc. Responsibilities Conduct realistic adversary simulations from conception through reporting. Perform testing on systems, applications, networks, and processes. Research cutting-edge offensivesecurity techniques. Develop tools and exploits. Communicate clearly and effectively, both written and orally, regarding risks and required remediations. Work collaboratively and independently on unique or specialized assignments More ❯
Responsibilities & Qualifications RESPONSIBILITIES Design, develop, and deploy offensive cyber tools to support Red Team and penetration testing engagements. Conduct advanced exploitation activities to simulate adversary tactics, techniques, and procedures (TTPs). Reverse engineer software and systems to identify vulnerabilities and create proof-of-concept exploits. Identify gaps in current offensive toolsets and develop novel approaches to bypass detection … Techniques, and Procedures (TTPs) for advanced Red Team operations. REQUIRED QUALIFICATIONS Experience: 5 years of full-time professional experience supporting Red Team/Penetration Test engagements involving exploit and offensive tool development. 5 years of demonstrated development experience using at least three (3) programming/scripting languages (e.g., Python, C++, Java, Assembly, C#, Rust). 5 years of experience … in identifying gaps in current tools and offensive techniques, and innovating new capabilities. Certifications: DoD Approved 8570 Baseline Certification: CSSP Infrastructure Support (One of the Following): CEH CySA+ GICSP SSCP CHFI CFR Cloud+ CND One of the following: GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) OffensiveSecurity Exploit Developer (OSED) Education: Bachelor of Science in Computer More ❯
to a variety of government agencies and commercial enterprises since 1982. DCCA is proud to offer a strong, competitive compensation and benefits package. Visit our website at: . Cyber Security Analyst CANDIDATES MUST HAVE AN ACTIVE TS/SCI w/Poly For over 40 years, DCCA has provided a broad range of IT services to government agencies and … diverse array of perspectives. Join us and be part of a team that has a people first mentality and a dedication to excellence. Key Tasks: Support specializing in cyber security and systems architecture. Requesting split support as ISSE/A&A, Strategic, DevSecOps, management and new product evaluation. Required Skills: • The Contractor team shall assist the Sponsor shepherd multiple … IT systems through the Assessment and Accreditation (A&A) processes. • Demonstrated experience leading security accreditation efforts for enterprise systems. • Demonstrated experience with security engineering and network engineering. • Demonstrated experience analyzing and documenting test results • Demonstrated experience assessing systems against information assurance policies and regulations. • Demonstrated experience in cyber security implementation and design • Demonstrated experience in customer A More ❯
Our client is a specialised offensivesecurity company delivering high-impact red teaming, adversary simulation, and technical security assessments to global clients. Role: OffensiveSecurity Team Lead/Infrastructure Team Lead Location: Amsterdam Type: Permanent Workplace Type: Hybrid/Remote, 1-2 days in office Language: Dutch speaking role Role: Our client is looking for … Senior Security Consultants or Technical Security Leads to join as their Infrastructure Team Lead. Y ou will be responsible for designing, developing, and maintaining the infrastructure that powers their red team operations, adversary simulations, and tooling. Key Responsibilities: Act as a trusted advisor to clients, translating complex cybersecurity concepts into business-friendly language. You coordinate technical cyber security consultancy assignments with the client You will lead a range of assignments and technical security assessments Stay updated on emerging threats, security technologies, and regulatory requirements to provide informed recommendations. Collaborate with internal technical teams to ensure the seamless delivery of security solutions. Build and maintain strong relationships with stakeholders Key Requirements: Professional level of Dutch More ❯
Our client is a specialised offensivesecurity company delivering high-impact red teaming, adversary simulation, and technical security assessments to global clients. Role: OffensiveSecurity Team Lead/Infrastructure Team Lead Location: Amsterdam Type: Permanent Workplace Type: Hybrid/Remote, 1-2 days in office Language: Dutch speaking role Role: Our client is looking for … Senior Security Consultants or Technical Security Leads to join as their Infrastructure Team Lead. Y ou will be responsible for designing, developing, and maintaining the infrastructure that powers their red team operations, adversary simulations, and tooling. Key Responsibilities: Act as a trusted advisor to clients, translating complex cybersecurity concepts into business-friendly language. You coordinate technical cyber security consultancy assignments with the client You will lead a range of assignments and technical security assessments Stay updated on emerging threats, security technologies, and regulatory requirements to provide informed recommendations. Collaborate with internal technical teams to ensure the seamless delivery of security solutions. Build and maintain strong relationships with stakeholders Key Requirements: Professional level of Dutch More ❯
client emulate potential nation-state peer adversary cyber reconnaissance, exploitation techniques, and attack capabilities against a targeted mission, system, network, component, or capability. Successful candidates will be passionate about offensive cyber operations and the technical disciplines involved in emulating sophisticated adversarial activity to demonstrate cyber risk-to-mission. This position will be on-site at Fort Belvoir, VA due … to the nature of the classified work. Responsibilities include: - Plan and execute computer network operations against U.S. government organizations worldwide to strengthen information system security, identify intrusions and vulnerabilities, and recommend mitigation strategies. - Maintain operational, technical, and authoritative situational awareness during threat emulation-based exploitation and operations. - Perform advanced penetration tests against U.S. government organizations as required. - Perform remote … other Cyber Red Team Members. - Support the development of Cyber Red Team training modules, standard operating procedures, assessment planning, assessment reporting, white papers, briefs, and other technical documentation. Experience: - Offensivesecurity or significant penetration testing experience - Ability to communicate complex technical and programmatic information, often in the form of verbal and visual operational updates, situational awareness reports, and More ❯
for. Job Description: Parsons is looking for an amazingly talented Senior Red Cyber Operator to join our team! In this role you will get to conduct red team assessments, offensive cyber operations, and penetration testing. What You'll Be Doing: Penetration Testing Red Team Assessments Offensive cyber operations Will direct the activities of mid-level operators Antivirus evasion … of assessment Technical Lead. This assessment-specific leadership position guides the technical planning, execution, and reporting of a specific assigned assessment 3+ years' experience in conducting red team assessments, offensive cyber operations, or penetration testing and be prepared to direct the activities of mid-level operators. Special requirements: Professional Certification(s) required for this position are as follows: o … DCART senior operator aptitude test before joining DCART as an Operator. Must be willing to travel 15%- OCONUS/CONUS locations What Desired Skills You'll Bring: 5+ years Offensive Cyber experience, DoD Cyber Red Team Experience, or corporate Red Team experience. Red Team Apprentice Course (RTAC), Rogue Ops- Red Team 1 ROPS, Red Team Journeyman Course (RTJC), Certified More ❯
over 20 years of expertise in training, consulting, technology, and operational support, the company provides services to the military, government, and law enforcement. Committed to excellence, innovation, and national security, Oak Grove Technologies fulfills federal defense contracts and actively supports veterans through sponsorships and events. Driven by its mission-focused approach, the company seeks top talent to develop impactful … solutions. Oak Grove Technologies offers a competitive compensation and benefits package. Requirements What You'll Be Doing: Penetration Testing Red Team Assessments Offensive cyber operations Will direct the activities of mid-level operators Antivirus evasion, EDR evasion What Required Skills You'll Bring: Active TS/SCI Clearance Must be capable of meeting both apprentice operator requirements and journeyman … of assessment Technical Lead. This assessment-specific leadership position guides the technical planning, execution, and reporting of a specific assigned assessment 3+ years' experience in conducting red team assessments, offensive cyber operations, or penetration testing and be prepared to direct the activities of mid-level operators. Special requirements: Professional Certification(s) required for this position are as follows: Must More ❯
specific leadership position guides the technical planning, execution, and reporting of a specific assigned assessment. Senior Red Cyber Operators shall have 3+ years' experience in conducting red team assessments, offensive cyber operations, or penetration testing and be prepared to direct the activities of mid-level operators. Special requirements: Professional Certification(s) required for this position are as follows: - Must … DCART senior operator aptitude test before joining Defense Threat Reduction Agency (DTRA) Cyber Assessment Red Team (DCART) as an Operator. In addition, desired skills/certifications are: - 5+ years Offensive Cyber experience, DoD Cyber Red Team Experience, or corporate Red Team experience. - Red Team Apprentice Course (RTAC), Rogue Ops- Red Team 1 ROPS, Red Team Journeyman Course (RTJC), Certified … Red Team Operator (CRTO) certification, OffensiveSecurity, Certified Professional (OSCP), Global Information Assurance Certification, (GIAC) Exploit Researcher & Advanced Penetration Tester (GXPN), GIAC Penetration Tester (GPEN), and/or GIAC Web Application Penetration Tester (GWAP). - Expertise in antivirus evasion, EDR evasion, and/or penetration testing TS/SCI Required US Citizenship Required Amentum is proud to be More ❯
energy services teams. The Offices are located on the river Tees with close access to walks, shops and restaurants. The Opportunity We are now recruiting for an ICT Information Security Manager our Head Office. This is an exciting opportunity to join the team as you will take responsibility for delivering a broad range of key ICT Information Security … Plan to business growth initiatives such as site transitions/acquisitions in the UK and Abroad. In this role, you will serve as a pillar of px's Information Security program by driving and managing InfoSec activities, ensuring success through collaboration with internal and external partners. You'll be supported with personalised on the job training, coaching, mentoring and … twice-yearly development and performance reviews to help maintain & develop your contributions and competence. Degree in relevant ICT subject Previous experience as an Information Security Manager leading cyber/data security & compliance teams in a similar sized organisation(s). Experience managing an enterprise risk register. Experience managing InfoSec gathering and reporting metrics. Experience spearheading offensivesecurityMore ❯
Do you have a passion for high scale services and working with some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerability management and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and … leading efforts to increase security posture. In this key role, you will critically assess security architecture decisions, and lead the charge in secure planning, development, and coordination. Your expertise will guide the team through intricate cloud security challenges, ensuring our defences are both robust and adaptable. Who We Are We are a world-class team of high … calibre application security researchers and engineers who thrive on new challenges. We are an inclusive and diverse team with a full spectrum of experience distributed globally. We have the resources of a large enterprise and the energy of a start-up, working on a critical Greenfield software assurance project collaboratively with our cloud and mobile engineering teams. The Software More ❯
London, England, United Kingdom Hybrid / WFH Options
Oracle
Do you have a passion for high scale services and working with some of Oracle's most critical customers? We are seeking an experienced, passionate, and talented cyber security engineer with a deep interest in vulnerability management and cloud security. This position is designed for technical security engineers adept at navigating the complexities of cloud security and … leading efforts to increase security posture. In this key role, you will critically assess security architecture decisions, and lead the charge in secure planning, development, and coordination. Your expertise will guide the team through intricate cloud security challenges, ensuring our defences are both robust and adaptable. Who We Are We are a world-class team of high … calibre application security researchers and engineers who thrive on new challenges. We are an inclusive and diverse team with a full spectrum of experience distributed globally. We have the resources of a large enterprise and the energy of a start-up, working on a critical Greenfield software assurance project collaboratively with our cloud and mobile engineering teams. The Software More ❯
with Polygraph REQUIRED EXPERTISE: • Master's degree or PhD in computer science, mathematics, or relevant field. • 1 + years post-graduate experience in cyber operations; operational experience supporting a security operations center (SOC), Computer Emergency/Incident Response team, or Intelligence Community/DoD Computer Network Defense (CND) mission is highly desired but not required. • 2+ years project management … cybersecurity experience. • 2+ years of experience in system integration and software development. • Experience designing or participating in Capture-the-Flag, or Hack-the-Box events. • Ethical Hacking certification (e.g., OffensiveSecurity Certified Professional (OSCP , or equivalent experience or training. • Technical expertise and professional work in three or more of the following areas within the past five years (post More ❯
the development of threat intelligence products, technical reports, and briefings for senior government officials and technical stakeholders, and will be expected to stay abreast of the latest trends in offensivesecurity research, reverse engineering tools and techniques, and emerging exploit methodologies. Required Experience: - Demonstrated skill in conceiving, planning and conducting research in problem areas of considerable scope and … techniques. - Technical experience in reverse engineering techniques, identification and exploitation of vulnerabilities in critical systems, and development of mitigation strategies. - Experience with exploit development techniques, shellcode writing, and bypassing security mitigations. - Demonstrated experience with modern software development methodologies (e.g., Agile, DEVOPS/DEVSECOPS). - Demonstrated experience in the use of advanced techniques, theories, precepts, and practices for end to … rapidly gaining insights into current and next-generation research and prototyping, preferably with hands-on leadership of research and development programs in the defense sector. - Contributed to open-source security tools or research publications. - DARPA experience preferred Strategic Analysis, Inc. is an Equal Opportunity employer and is committed to non-discrimination in employment. All qualified applicants will receive consideration More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
General Dynamics Information Technology
Red Team assessments provide customers with actionable information to implement risk management strategies for mission assurance to prevent, protect, and mitigate threats to assets and operations critical to national security and the National Military Strategy HOW A SOFTWARE DEVELOPER WILL MAKE AN IMPACT: Host-based computer forensics, network-based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/… analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or software exploit development. WHAT YOU'LL NEED TO SUCCEED: Required Experience … 5+ years of related experience Required Technical Skills: OffensiveSecurity Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM) Security Clearance Level: TS/SCI US Citizenship Required Location: Hybrid-Ft. Belvoir, VA Required Skills and Abilities: Must be proficient in offensive capability development for Windows environments. More ❯
Our client is a renowned health care provider across the Netherlands and is looking to mature their Cyber and Information Security operations. As a Technical Security Officer : You make proposals for the continuous improvement of ICT security. You work closely with the information security officer to translate information security policy into specific technical security guidelines … which can be used by management and development teams. You coordinate security-related processes and actively monitor the design and operation of security measures. With your experience in the field of Azure, M365, networks, NEN7510 and NIS2 you are able to identify important concrete technical security measures. You draw up security policies and describe them in … clear language. You understand that there must be a healthy balance between security and user-friendliness. That is why you work pragmatically and carefully consider each security measure. You guide the implementation of the measures and monitor their design. In addition, you guide the external support and management teams and advise management on technical issues regarding information security. More ❯
client is a multi-international transportation technology company, and they are looking for a Pen tester here in Toronto. If you'd like to grow your skill set in OffensiveSecurity, this is the place. You'll be able to gain hands-on experience. Contract Duration: 6 Months (Possible Extension) What You Will Be Doing Tech Breakdown … Automation 50% Manual Daily Responsibilities SQL Injection & Cross-site scripting Grey box penetration testing, and perform access control Identify and exploit vulnerabilities to assess security risks. Communicate with clients about security issues and provide tailored solutions. Collaborate with developers and security teams to remediate discovered vulnerabilities. Develop detailed reports with findings and recommendations. Assist/Create rules More ❯
years of experience in professional software development. Strong programming skills. Great skills in data engineering and big data technologies. Highly skilled with object-orientation and software development best practices. OffensiveSecurity Certified Professional (OSCP) . Certified Information Security Manager (CISM) . Information Systems Security Architecture Professional (ISSAP) is essential. Certified Authorization Professional (CAP) . Information Assurance … listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30+ YEARS EXPERIENCE PSYCHOLOGIST STAGE 3: PRE-SCREENING (verification checks & DV security clearance) STAGE 4: INTERVIEW WITH THE CEO, CTO & GC More ❯
of Data Processing and Governance, and V.P of Software Engineering and Advanced Analytics to determine technical requirements and will undergo a formal approval, review, and voting by representatives for security impact analysis (the Change Approval Board). WHAT ARE WE LOOKING FOR: A proven record of implementation of method transformers. The technical ability to convert one data-frame into … Python, R, Scala, SQL, JAVA, C++, and C#. 10+ years of experience as a Software Engineer. Extensive experience in AI-powered software development management and advanced analytics. Certified Information Security Manager (CISM) is essential. OffensiveSecurity Certified Professional (OSCP), Certified Information Security Manager (CISM) is essential. Certified Authorization Professional (CAP) Information Assurance System Architecture and Engineer … the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: Cognitive Ability Test STAGE 2: Cognitive Assessment Screening with a 30+ years experienced psychologist STAGE 3: Pre-Screening (verification checks & security clearance) STAGE 4: Interview with the CEO, CTO & GC More ❯