NETWORK SECURITY ENGINEER: Expert Level Location: Chantilly, VA US Security Clearance Requirement: TS/SCI with Full Scope Polygraph Clearance Status: Must be Current JOB DESCRIPTION: If you are looking for a position that is different from your normal network/cyber security position, please keep reading. … We are looking for Network Security Engineers who are familiar with both network defense and offensive techniques to support ongoing operations and secure our customers' networks. You will be assisting Penetration Testers with analysis of edge network devices to include vulnerability analysis and exploitation. We are looking for … Network Security Engineers with a blend of network infrastructure management and familiarity with network penetration testing and offensive security. Candidates should have a minimum of 7+ years of experience as a Network Engineer, System Engineer or in the Cyber Security field as a hands-on penetration tester. More ❯
At Vertical Structure (an Instil Company), we specialise in providing human-focused security and penetration testing services for web applications, cloud infrastructure and mobile applications. The Role We are looking for a CTL (Infrastructure) to join our dynamic team based in Belfast. As a Pen Tester, you will be … of technologies and a wide range of customers including software, fintech, manufacturing, engineering, legal, and public sector. Your insights will be crucial in identifying security weaknesses and helping clients fortify their systems. We offer varied, challenging work in a supportive environment where you will find yourself constantly evolving and … end-to-end testing, collaborating with clients during kick-off and discovery sessions, providing expert advice and follow up. Stay current with the latest security threats, vulnerabilities, and trends. Research offensivesecurity techniques to assess and validate infrastructure and technologies, including cloud-based systems continuously incorporating new More ❯
new and innovative tools for Operators to use during assessments of critical DoD and U.S. Government networks. Successful candidates will be passionate about supporting offensive cyber operations and customizing tools for post-exploitation capabilities. The position is located at Dam Neck, VA. Responsibilities include: - Expand command and control (C2 … C++, C#, Rust, Python, Java, Assembly, etc.). - Experience identifying gaps in tools and development techniques. Certifications Required: Certified Ethical Hacker (CEH) EC-Council , OffensiveSecurity Certified Professional (OSCP) Off Sec OSED, OSEP, GXPN. DoD Clearance Required: Security Clearance Top Secret/SCI. Education Level Required: Bachelor More ❯
the engineering aspects of CS. CS continues to be approached as compliance-based and this has not addressed significant shortcomings and vulnerabilities in the security of naval warfare systems and other service warfare systems. CS requirements must be included during the design, development, and sustainment phases of systems acquisition … Life-Cycle. FILLING THIS POSITION IS CONTINGENT UPON AWARD Requirements Bachelor of Science in Computer Science, or Bachelor of Science in Computer Engineering National Security Agency (NAC) Computer Network Operations Development Program (CNODP) graduate Minimum IAT Level I Must have prior Red Team experience Must have CSSP certification Must … currently possess a DoD Top Secret clearance Must currently possess GIAC Exploit Researcher and Advanced Penetration Tester (GXPN) or OffensiveSecurity Exploit Developer (OSED). Must have minimum of: Five (5) years of full-time professional experience supporting Red Team/Penetration test engagements with exploit and tool More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Cyberteam
My client a growing information security consultancy, is seeking a qualified, highly motivated and skilled Cyber Essentials/CE Plus Assessor to join our team. We require the applicant to have a minimum of 2 years experience working on CE. Must be able to get to Milton Keynes up … that stays at the forefront of the constantly evolving field of Cybersecurity. This role also has the potential to lead/evolve into IT Security, Penetration Testing, and Information Governance specialisations. Key Responsibilities: Conduct Cyber Essentials and Cyber Essentials Plus Assessment: Perform comprehensive assessments of organisations' cybersecurity practices, systems … and controls to ensure compliance to the Cyber Essentials Scheme Conduct in-depth vulnerability assessments to identify potential security weaknesses. Verify the effectiveness of CE security controls through rigorous testing and analysis. Document CE and CE+ assessment findings, including detailed reports and recommendations. Provide Guidance and Recommendations: Offer More ❯
Business Development Representative – Cyber Security We are seeking a driven Business Development Representative (BDR) with expertise in cyber security to generate new business opportunities. This role requires an individual who understands offensivesecurity services and can effectively identify client needs, build relationships, and position bespoke cyber … security solutions. Key Responsibilities Lead Generation & Prospecting – Identify and engage with potential clients through cold calling, email campaigns, LinkedIn outreach, and industry events. Client Qualification – Assess the security needs and challenges of potential clients to determine how the company’s penetration testing, red teaming, and cyber maturity assessments … can add value. Sales Outreach – Initiate contact with prospects, educate them on cyber security services, and establish how they align with their organisational needs. Pipeline Management – Maintain accurate records of prospect interactions and sales progress using a CRM system, ensuring a steady flow of qualified leads. Collaboration with Sales More ❯
and V.P of Software Engineering and Advanced Analytics to determine technical requirements and will undergo a formal approval, review, and voting by representatives for security impact analysis (the Change Approval Board). WHAT ARE WE LOOKING FOR: A proven record of implementation of method transformers. The technical ability to … C++, and C#. 10+ years of experience as a Software Engineer. Extensive experience in AI-powered software development management and advanced analytics. Certified Information Security Manager (CISM) is essential. OffensiveSecurity Certified Professional (OSCP), Certified Information Security Manager (CISM) is essential. Certified Authorization Professional (CAP) Information … INTERVIEW PROCESS: STAGE 1: Cognitive Ability Test STAGE 2: Cognitive Assessment Screening with a 30+ years experienced psychologist STAGE 3: Pre-Screening (verification checks & security clearance) STAGE 4: Interview with the CEO, CTO & GC More ❯
At Vertical Structure (an Instil Company), we specialise in providing human-focused security and penetration testing services for web applications, cloud infrastructure and mobile applications. The Role We are looking for a Mid/Senior Penetration Tester to join our dynamic team based in Belfast. As a Pen Tester … of technologies and a wide range of customers including software, fintech, manufacturing, engineering, legal, and public sector. Your insights will be crucial in identifying security weaknesses and helping clients fortify their systems. We offer varied, challenging work in a supportive environment where you will find yourself constantly evolving and … Working Hours 35 Days Holiday Private Pension (8% Employer, 5% Employee) Private Healthcare Life Assurance Cycle to Work Scheme Day to Day Probe & exploit security vulnerabilities in client's Infrastructure/cloud, Web Applications and Mobile Applications using a variety of penetration tests. Write detailed reports outlining vulnerabilities and More ❯
Join a team recognized for leadership, innovation and diversity Honeywell Building Automation team is looking for a motivated Senior Cyber Security Specialist with an interest in Operational Technology (OT) Security to join our Team in the Netherlands. In this role, you will work with our Building Automation Cybersecurity … gaining hands-on experience in real-world cybersecurity scenarios. Your responsibilities will include assisting in the development of cyber solutions, testing products, troubleshooting, implementing security measures, conducting vulnerability assessments and penetration testing, and participating in cyber assessments while learning about standards such as the NIST Cybersecurity Framework (CSF) 2.0 … the DACH/Benelux ICT/Cybersecurity Operation and work as part of a European/global Team. Key responsibilities: Working with leading-edge security products as applicable to OT systems. Assist in evaluating new cyber solutions and introducing innovative approaches to existing solutions. Assist in varying stages of More ❯
The Opportunity: We're seeking an experienced and strategic Information Security Manager to lead our client's cyber security, data privacy and compliance programmes where you will serve as the cornerstone of our client s Information Security efforts, collaborating across departments and with external partners to protect … in high-hazard industries such as the Oil and Gas, Energy and Chemical or relatable sectors. Skills and Experience: Proven experience as an Information Security Manager, ideally within a complex, multi-site organisation, with the ability to lead teams, set objectives and foster professional growth. Strong knowledge of enterprise … risk management, regulatory compliance and offensivesecurity strategies, with experience with Cyber Essentials Plus, ISO27002, CAFM, NIST frameworks and managing ISMS. Expertise in data protection laws and cybersecurity standards, with a solid grasp of GDPR, DPA, CMA, etc. and in leading security audits and managing compliance reporting More ❯
The Opportunity: We're seeking an experienced and strategic Information Security Manager to lead our client's cyber security, data privacy and compliance programmes where you will serve as the cornerstone of our client’s Information Security efforts, collaborating across departments and with external partners to protect … in high-hazard industries such as the Oil and Gas, Energy and Chemical or relatable sectors. Skills and Experience: Proven experience as an Information Security Manager, ideally within a complex, multi-site organisation, with the ability to lead teams, set objectives and foster professional growth. Strong knowledge of enterprise … risk management, regulatory compliance and offensivesecurity strategies, with experience with Cyber Essentials Plus, ISO27002, CAFM, NIST frameworks and managing ISMS. Expertise in data protection laws and cybersecurity standards, with a solid grasp of GDPR, DPA, CMA, etc. and in leading security audits and managing compliance reporting More ❯
At Vertical Structure (an Instil Company), we specialise in providing human-focused security and penetration testing services for web applications, cloud infrastructure and mobile applications. The Role We are looking for a Penetration Tester to join our dynamic team based in Belfast. As a Pen Tester, you will be … of technologies and a wide range of customers including software, fintech, manufacturing, engineering, legal, and public sector. Your insights will be crucial in identifying security weaknesses and helping clients fortify their systems. We offer varied, challenging work in a supportive environment where you will find yourself constantly evolving and … Working Hours 35 Days Holiday Private Pension (8% Employer, 5% Employee) Private Healthcare Life Assurance Cycle to Work Scheme Day to Day Probe & exploit security vulnerabilities in client's Infrastructure/cloud, Web Applications and Mobile Applications using a variety of penetration tests. Write detailed reports outlining vulnerabilities and More ❯
TECHNICAL OPERATOR: Full Performance Level Location: Chantilly, VA US Security Clearance Requirement: TS/SCI with Full Scope Polygraph Clearance Status: Must be Current JOB DESCRIPTION: Inferno Systems is currently looking for proactive and self-motivated individuals for our Technical Operator positions to work closely with our Penetration Testers. … the process and techniques for recruiting. • Knowledge writing methods and systems as well as policies and regulations. • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), OffensiveSecurity (OSCP), Certified Ethical Hacker (CEH) • General technical certifications such More ❯
Technical Operator: Full Performance Level Location: Chantilly, VA US Security Clearance Requirement: TS/SCI with Full Scope Polygraph Clearance Status: Must be Current JOB DESCRIPTION: Inferno Systems is currently looking for proactive and self-motivated individuals for our Technical Operator positions to work closely with our Penetration Testers. … the process and techniques for recruiting. • Knowledge writing methods and systems as well as policies and regulations. • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), OffensiveSecurity (OSCP), Certified Ethical Hacker (CEH) • General technical certifications such More ❯
Parsons is looking for an amazingly talented Red Cyber Operator to join our team! In this role you will conduct cyber red team assessments, offensive cyber operations and penetration testing What You'll Be Doing: Cyber Red Team assessments Penetration Testing Antivirus evasion, EDR evasion, offensive infrastructure, phishing … and social engineering Offensive cyber operations What Required Skills You'll Bring: Active TS/SCI Clearance Must be capable of meeting apprentice operator requirements in the DCART Operator Training Program within the prescribed timelines, as outlined in the DCART Handbook. Red Cyber Operators are expected to have experience … as operators conducting cyber red team assessments, offensive cyber operations, or significant penetration testing experience. Must hold an IAT Level III certification as defined and described in DoDD 8570.01, 8570.01-M, 8140.01-03, and as amended. Must pass the DCART operator aptitude test before joining DCART as an Operator. More ❯
software development. Strong programming skills. Great skills in data engineering and big data technologies. Highly skilled with object-orientation and software development best practices. OffensiveSecurity Certified Professional (OSCP) . Certified Information Security Manager (CISM) . Information Systems Security Architecture Professional (ISSAP) is essential. Certified Authorization … PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30+ YEARS EXPERIENCE PSYCHOLOGIST STAGE 3: PRE-SCREENING (verification checks & DV security clearance) STAGE 4: INTERVIEW WITH THE CEO, CTO & GC More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
experience in Information Technology, or Bachelor's degree and 3+ years of experience in Information Technology Linux Computing Environment (CE) Certification Windows CE Certification OffensiveSecurity Certified Professional (OSCP) or GIAC Penetration Tester (GPEN) Certification DoD Approved 8570 Information Assurance Technician (IAT) Level III Certification, including CASP+ CE … CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP Certification Additional Qualifications Experience with Cobalt Strike, Metasploit, and Kali Linux Python Certification Completion of the Red Team Apprentice, Offensive Methodology Analysis, or Red Team Operations Training Clearance: Applicants selected will be subject to a security investigation and may … Gridiron IT specializes in providing comprehensive IT services tailored to meet the needs of federal agencies. Our capabilities include IT Infrastructure & Cloud Services, Cyber Security, Software Integration & Development, Data Solution & AI, and Enterprise Applications. These capabilities are backed by Gridiron IT's experienced workforce and our commitment to ensuring More ❯
for. Job Description: Parsons is looking for an amazingly talented Software Developer to join our team! In this role you will get to conduct offensive capability development for Windows environments. What You'll Be Doing: Offensive capability development Program in C and C# and BOFs Work in a … Agile Environment Malware development, analysis and software vulnerability research What Required Skills You'll Bring: Active TS/SCI Clearance Must be proficient in offensive capability development for Windows environments. Proficient in C and C# and BOFs. Should have experience working in an agile/scrum environment. Special requirements … investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetration testing, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software More ❯
software performs, then document the results and communicate defects to the development team so they can start improving the tool. You'll automate continuous security and performance testing and monitor health of quality assurance standards and procedures. You'll also broaden your experience in networking in support of unique … network roles, including network fundamentals, such as configuring switches, routers, firewalls, VLANs, and working with core networking protocols 2+ years of experience in network security, including hands-on penetration testing, red/blue teaming, threat hunting, or CNO, such as CNA, CND, or CNE 1+ years of experience in … in rapidly researching, learning, and applying new technologies across a wide range of physical devices and software platforms Experience with blue team operations, including security monitoring, threat detection, and incident response Experience conducting penetration tests, participating in red team engagements, and performing vulnerability research Experience utilizing software-based network More ❯
We are partnering with an exciting Cyber Security Consultancy looking to further establish themselves within the OffensiveSecurity world and as such looking to bring in a Senior Penetration Tester to spearhead the team through CHECK accreditation. This is a truly rare opportunity to be a part More ❯
are located on the river Tees with close access to walks, shops and restaurants. The Opportunity We are now recruiting for an ICT Information Security Manager our Head Office. This is an exciting opportunity to join the team as you will take responsibility for delivering a broad range of … key ICT Information Security & compliance tasks, projects and activities within px. This may include working as part of a larger program of works ranging from the ICT Annual Delivery Plan to business growth initiatives such as site transitions/acquisitions in the UK and Abroad. In this role, you … will serve as a pillar of px's Information Security program by driving and managing InfoSec activities, ensuring success through collaboration with internal and external partners. You'll be supported with personalised on the job training, coaching, mentoring and twice-yearly development and performance reviews to help maintain & develop More ❯
Stockton-On-Tees, County Durham, North East, United Kingdom
The Bridge (IT Recruitment) Limited
Right to Work Bridge are delighted to be recruiting for one of our clients based in North East looking to recruit an experienced Information Security Manager role. Requirements: Previous experience as an Information Security Manager leading cyber/data security & compliance teams in a medium size company … Experience managing InfoSec gathering and reporting metrics. Experience spearheading offensivesecurity activities. Certifications such as CISSP, CISM, CISA, or similar are highly preferred. Experience of Cyber Essentials, NIST, CAFM and ISO27002 standards and a proven track record in delivering against them. If intrested in this role can you More ❯
transportation technology company, and they are looking for a Pen tester here in Toronto. If you'd like to grow your skill set in OffensiveSecurity, this is the place. You'll be able to gain hands-on experience. Contract Duration: 6 Months (Possible Extension) What You Will … Automation 50% Manual Daily Responsibilities SQL Injection & Cross-site scripting Grey box penetration testing, and perform access control Identify and exploit vulnerabilities to assess security risks. Communicate with clients about security issues and provide tailored solutions. Collaborate with developers and security teams to remediate discovered vulnerabilities. Develop More ❯
candidate will have hands-on experience with cyber network operations and deep technical knowledge of programming, with the ability to work in a high-security, fast-paced environment. REQUIREMENTS The Level 3 CNO Analyst/Programmer possesses strong programming skills in Assembly, C, C++, Java, Perl, or Python, and … scripts to detect, investigate, and respond to cybersecurity threats. 5. Prepare clear and concise documentation for technical processes and code to maintain compliance with security policies and enhance collaboration. 6. Work closely with cyber analysts, engineers, and other stakeholders to coordinate efforts and meet mission objectives. Engage with cross … an ability to explain technical details to both technical and non-technical stakeholders. 5. Advanced certifications in cybersecurity, such as Certified Ethical Hacker (CEH), OffensiveSecurity Certified Professional (OSCP), or similar. 6. Experience working in a classified, high-security environment and adhering to strict data handling procedures. More ❯
candidate will have hands-on experience with cyber network operations and deep technical knowledge of programming, with the ability to work in a high-security, fast-paced environment. REQUIREMENTS The Level 2 CNO Analyst/Programmer possesses strong programming skills in Assembly, C, C++, Java, Perl, or Python, and … scripts to detect, investigate, and respond to cybersecurity threats. 5. Prepare clear and concise documentation for technical processes and code to maintain compliance with security policies and enhance collaboration. 6. Work closely with cyber analysts, engineers, and other stakeholders to coordinate efforts and meet mission objectives. Engage with cross … an ability to explain technical details to both technical and non-technical stakeholders. 5. Advanced certifications in cybersecurity, such as Certified Ethical Hacker (CEH), OffensiveSecurity Certified Professional (OSCP), or similar. 6. Experience working in a classified, high-security environment and adhering to strict data handling procedures. More ❯