candidate will have hands-on experience with cyber network operations and deep technical knowledge of programming, with the ability to work in a high-security, fast-paced environment. REQUIREMENTS The Level 1 CNO Analyst/Programmer possesses strong programming skills in Assembly, C, C++, Java, Perl, or Python, and … scripts to detect, investigate, and respond to cybersecurity threats. 5. Prepare clear and concise documentation for technical processes and code to maintain compliance with security policies and enhance collaboration. 6. Work closely with cyber analysts, engineers, and other stakeholders to coordinate efforts and meet mission objectives. Engage with cross … an ability to explain technical details to both technical and non-technical stakeholders. 5. Advanced certifications in cybersecurity, such as Certified Ethical Hacker (CEH), OffensiveSecurity Certified Professional (OSCP), or similar. 6. Experience working in a classified, high-security environment and adhering to strict data handling procedures. More ❯
and gym and support in finding local accommodation if required. Main Duties & Responsibilities: Perform assessments to the latest cybersecurity regulations, standards and guidelines Perform security reviews and testing of IOT hardware devices, including application design, embedded software, web applications, web services and mobile applications to bespoke test programs and … their products and assessment requirements, and define bespoke test programs based upon our customer needs Actively contribute to the development of the TUV SUD security program with a focus on IIoT/IoT devices. Participate and contribute on global cybersecurity regulatory standards committees Provide training to customers on the … qualification, preferably a cybersecurity degree (BSc/MSc/PhD) or equivalent cybersecurity qualification Experience in a penetration testing (SW/HW) or similar offensivesecurity A commitment to customer service excellence. Strong analytical skills and efficient problem solving. Ability to work unsupervised, under pressure and meet deadlines. More ❯
Fully Remote Are you looking to take your penetration testing career to the next level? We’re working with a leading UK-based cyber security consultancy that’s looking to grow its team with a passionate and technically skilled Penetration Tester at junior to mid level. This is a … networks, and infrastructure Preparing detailed reports and debriefs for clients, including remediation advice Collaborating with internal teams and clients to identify risks and improve security postures Staying up to date with the latest exploits, vulnerabilities, and testing methodologies What we’re looking for: 1–3+ years of experience in … penetration testing or red teaming Strong understanding of offensivesecurity tools, techniques, and methodologies (e.g. OWASP, MITRE ATT&CK, NIST) Experience in a consultancy environment is highly desirable Excellent written and verbal communication skills for client-facing work Familiarity with reporting standards and structured documentation IDEALLY – SANS GIAC More ❯
to join our elite team of cyber professionals. This is your chance to contribute to national defense through high-impact red team operations and offensive cyber assessments. What You'll Be Doing: • Lead and conduct Red Team assessments and offensive cyber operations • Perform advanced penetration testing against enterprise … for red cyber assessments, guiding planning, execution, and reporting Required Qualifications: • Active TS/SCI clearance • 3+ years of experience in red team assessments, offensive cyber ops, or penetration testing • Must meet Apprentice and Journeyman Operator requirements in the DCART Operator Training Program within required timelines • Must be capable … Must pass the DCART Senior Operator Aptitude Test • Willingness to travel up to 15% OCONUS/CONUS Desired Qualifications: • 5+ years of experience in offensive cyber operations or Red Team environments (DoD or commercial) • Completion of advanced training/certifications such as: Red Team Apprentice Course (RTAC) Red Team More ❯
expertise to exploit discovered vulnerabilities and misconfigurations associated with but not limited to operating systems (Windows, Linux, etc.), protocols (HTTP, FTP, etc.), and network security services (PKI, HTTPS, etc.) to accomplish test objectives. Research various cyber TTPs, organizational structures, capabilities, personas, and environments, and integrate findings into Cyber Survivability … development, improvement and validation. Support development and execution of TTPs for penetration testing/Red Teaming. Education/Qualifications Required: Active U.S. DoD Secret Security Clearance. 0-2 years of experience including one of the following: 1 penetration testing internship including practical experience. 1 of the following certifications: eJPT … CompTIA PenTest+, or GIAC Penetration Tester (GPEN). 1 year of Tryhackme, bug bounty, or capture the flag experience. Must be able to obtain OffensiveSecurity Certified Professional (OSCP) within 6 months of hire. Bachelor's degree in Computer Science, Mathematics, Engineering or related fields or relevant years More ❯
We are watchTowr, a VC-backed global cyber security startup helping organisations continuously discover vulnerabilities in their Internet-facing attack surface. Cyber security veterans and technical experts, we are obsessed with building cybersecurity technology to help prevent breaches. With experience informed by years of simulating sophisticated cyber attacks … high and aggressive growth phase of our journey, and are excited to continue adding colleagues to join our phorce of nature. Our vision for offensivesecurity is continuous. But what's the role? We are looking for a passionate Senior HR Manager to support our growing global team. … Endless opportunities - we are in a high-growth phase of our journey, and plan to promote from within as we scale. Work with cyber security experts - we are solving cutting-edge industry-wide cyber security challenges with some of the world's most advanced organisations. Please note that More ❯
high-level engagements. You'll be involved in scoping and delivering advanced red team assessments, mentoring more junior team members, and supporting innovation through offensivesecurity research. A GitHub portfolio of scripts or tools is required at interview stage. The essentials: Minimum 7 years of penetration testing experience … disciplines, including networks, infrastructure, applications, and cloud Comfortable in client-facing roles with strong communication skills Deep understanding of adversary simulation, lateral movement, and offensive tooling Capable of producing clear, actionable reports for both technical and executive stakeholders Desirable: Certifications such as OSCP, CREST, CHECK, or Cyber Scheme (CCT More ❯
day onsite, 4 days remote Requirements Proven experience as a Business Analyst within large, complex environments (ideally financial services). Strong knowledge of security and compliance projects, including experience with offensivesecurity initiatives. Experience working with Microsoft E5 Security stack is a strong advantage; knowledge of More ❯
Are you looking for a threat hunter role, detecting cyber threats in support of active forensic investigations? Cyber threats are evolving, and when perimeter security and automated protection aren't enough, networks are compromised, information is accessed, data is exfiltrated, backups are wiped, and ransomware is deployed, locking up … and assist organizations in recovering from cyber incidents. We're seeking CND and CNO specialists who can think like cyber attackers to understand how security measures were circumvented. This role offers an opportunity to use your analytical skills and gain endpoint detection and response experience to identify indicators of … Endpoint Experience with network- and host-based intrusion analysis, digital forensics, or malware handling Experience with hunt teams, cyber threat intelligence, incident response, or security operations teams Knowledge of security principles, including MITRE ATT&CK framework, threat landscapes, or attacker TTPs Knowledge of Microsoft Windows, UNIX, and Mac More ❯
projects effectively. Collaborate with cross-functional teams, prioritize tasks, and ensure timely delivery of project milestones. Vulnerability Identification: Drive the discovery and analysis of security vulnerabilities, weaknesses, and design flaws in software applications and systems through comprehensive reverse engineering techniques. Technical Leadership: Provide technical leadership and mentorship to junior … reverse engineers, guiding them in advanced analysis methodologies, problem-solving, and decision-making. Collaborative Problem-Solving: Collaborate closely with security analysts, developers, and stakeholders to address complex technical challenges, propose solutions, and drive implementation efforts. Documentation and Reporting: Document reverse engineering findings, analysis methodologies, and project progress. Prepare technical … field, or a master's degree in computer science, Cybersecurity, or related disciplines is preferred. Relevant certifications such as Certified Reverse Engineering Analyst (CREA), OffensiveSecurity Certified Professional (OSCP), or similar certifications demonstrating expertise in reverse engineering and cybersecurity are highly desirable. More ❯
in training, consulting, technology, and operational support, the company provides services to the military, government, and law enforcement. Committed to excellence, innovation, and national security, Oak Grove Technologies fulfills federal defense contracts and actively supports veterans through sponsorships and events. Driven by its mission-focused approach, the company seeks … develop impactful solutions. Oak Grove Technologies offers a competitive compensation and benefits package. Requirements What You'll Be Doing: Penetration Testing Red Team Assessments Offensive cyber operations Will direct the activities of mid-level operators Antivirus evasion, EDR evasion What Required Skills You'll Bring: Active TS/SCI … assessment-specific leadership position guides the technical planning, execution, and reporting of a specific assigned assessment 3+ years' experience in conducting red team assessments, offensive cyber operations, or penetration testing and be prepared to direct the activities of mid-level operators. Special requirements: Professional Certification(s) required for this More ❯
software. • Develop custom tools and scripts to automate tasks, analyze data, and improve system performance. • Write clean, efficient, and well-documented code that meets security and performance standards. o Reverse Engineering: • Analyze, decompile, and reverse-engineer software binaries to understand vulnerabilities and potential exploits. • Develop proof-of-concept exploits … o System and Network Analysis: • Conduct network traffic analysis to identify anomalies, potential threats, and areas for improvement. • Develop and implement solutions for network security, ensuring systems are protected against potential intrusions. o Collaboration: • Work closely with cross-functional teams, including system engineers, analysts, and other developers, to ensure … certifications such as OSCP, CEH, CISSP, or GPEN. Experience: Prior experience in a DoD or intelligence community environment is highly desirable. Knowledge: Familiarity with offensivesecurity techniques and frameworks, such as Metasploit or Cobalt Strike. More ❯
technical planning, execution, and reporting of a specific assigned assessment. Senior Red Cyber Operators shall have 3+ years' experience in conducting red team assessments, offensive cyber operations, or penetration testing and be prepared to direct the activities of mid-level operators. Special requirements: Professional Certification(s) required for this … before joining Defense Threat Reduction Agency (DTRA) Cyber Assessment Red Team (DCART) as an Operator. In addition, desired skills/certifications are: - 5+ years Offensive Cyber experience, DoD Cyber Red Team Experience, or corporate Red Team experience. - Red Team Apprentice Course (RTAC), Rogue Ops- Red Team 1 ROPS, Red … Team Journeyman Course (RTJC), Certified Red Team Operator (CRTO) certification, OffensiveSecurity, Certified Professional (OSCP), Global Information Assurance Certification, (GIAC) Exploit Researcher & Advanced Penetration Tester (GXPN), GIAC Penetration Tester (GPEN), and/or GIAC Web Application Penetration Tester (GWAP). - Expertise in antivirus evasion, EDR evasion, and/ More ❯
We are watchTowr, a VC-backed cyber security startup helping organisations continuously discover vulnerabilities in their Internet-facing attack surface. Cyber security veterans and technical experts, we are obsessed with building cybersecurity technology to help prevent breaches. With experience informed by years of simulating sophisticated cyber attacks against … high and aggressive growth phase of our journey, and are excited to continue adding colleagues to join our phorce of nature. Our vision for offensivesecurity is continuous. But what's the role? We are looking for an ambitious Full Stack Engineer to join us and our client More ❯
We are watchTowr, a VC-backed cyber security startup helping organisations continuously discover vulnerabilities in their Internet-facing attack surface. Cyber security veterans and technical experts, we are obsessed with building cybersecurity technology to help prevent breaches. With experience informed by years of simulating sophisticated cyber attacks against … high and aggressive growth phase of our journey, and are excited to continue adding colleagues to join our phorce of nature. Our vision for offensivesecurity is continuous. But what's the role? We are looking for an ambitious Full Stack Engineer to join us and our client More ❯
of three (3) years of experience working in Agile environments, preferably in roles involving project management or leadership responsibilities. Certified Reverse Engineering Analyst (CREA), OffensiveSecurity Certified Professional (OSCP), or similar certifications demonstrating expertise in reverse engineering and cybersecurity are highly desirable. Experience using industry standard RE tools More ❯
in training, consulting, technology, and operational support, the company provides services to the military, government, and law enforcement. Committed to excellence, innovation, and national security, Oak Grove Technologies fulfills federal defense contracts and actively supports veterans through sponsorships and events. Driven by its mission-focused approach, the company seeks … develop impactful solutions. Oak Grove Technologies offers a competitive compensation and benefits package. Requirements: What You'll Be Doing: Penetration Testing Red Team Assessments Offensive cyber operations Will direct the activities of mid-level operators Antivirus evasion, EDR evasion What Required Skills You'll Bring: Active TS/SCI … assessment-specific leadership position guides the technical planning, execution, and reporting of a specific assigned assessment 3+ years' experience in conducting red team assessments, offensive cyber operations, or penetration testing and be prepared to direct the activities of mid-level operators. Special requirements: Professional Certification(s) required for this More ❯
the development of threat intelligence products, technical reports, and briefings for senior government officials and technical stakeholders. • Stay abreast of the latest trends in offensivesecurity research, reverse engineering tools and techniques, and emerging exploit methodologies. Qualifications: • Active Top Secret clearance with SCI eligibility (TS/SCI) is … tools (e.g., Wireshark, tcpdump). • Strong understanding of operating systems internals (Windows, Linux, RTOS). • Experience with exploit development techniques, shellcode writing, and bypassing security mitigations. • Excellent written and verbal communication skills, with the ability to effectively convey complex technical findings to both technical and non-technical audiences. Desired … Qualifications: • Experience with vulnerability disclosure processes and responsible disclosure practices. • Contributions to open-source security tools or research publications. • Relevant industry certifications (e.g., OSCP, OSCE, GPEN, GXPN, GREM). Strategic Analysis, Inc. is an Equal Opportunity employer and is committed to non-discrimination in employment. All qualified applicants will More ❯
IR35 Location: Edinburgh 1 day onsite, 4 days remote Duration: 6 months initially, view to extend. Requirements Proven experience as a Project Manager delivering security and compliance initiatives, ideally in financial services. Strong background in offensivesecurity or other high-risk cybersecurity projects. Experience with Microsoft Endpoint More ❯
of their remote SDR team. Focussed on Cybersecurity, our client specialises in Managed Detection and Response. They monitor networks for a broad range of security issues, tailoring their monitoring for the specific industry and requirements of each client. They have worked with nationally-recognised brands such as RAC, Inchcape … tips and tricks. Regular team meetings to share insight on successful sales points and strategies. Full training on their services from the Head of OffensiveSecurity and Head of Defensive Security. Regular one-to-one check-in meetings to ask questions and reflect progress. Appropriate online training courses More ❯
operate, maintain, and support cloud infrastructure and data services. Automate and optimize data engineering pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise … in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). More ❯
operate, maintain, and support cloud infrastructure and data services. Automate and optimize data engineering pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise … in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). More ❯
operate, maintain, and support cloud infrastructure and data services. Automate and optimize data engineering pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise … in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). More ❯
operate, maintain, and support cloud infrastructure and data services. Automate and optimize data engineering pipelines. Utilize big data technologies (Databricks, Spark). Develop custom security applications, APIs, AI/ML models, and advanced analytic technologies. Experience with threat detection in Azure Sentinel, Databricks, MPP Databases (Snowflake), or Splunk. Expertise … in network, endpoint, and cloud security, cryptography, malware analysis, vulnerability assessment, anomaly/intrusion detection, incident response, and offensive security. Proficiency in AI/ML security and automation. Experience with data science and analytics in Databricks, Synapse Analytics, and large-scale data warehouses (Snowflake, Redshift, Presto). More ❯