System Security Professional Certification (CISSP) or Security X (previously known as the CASP+) Certification required Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience using Customer tools. Must have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common … infrastructure, network and enterprise security architecture) and applying risk assessment methodology to system development. Experience developing/implementing integrated security services management processes, such as assessing and auditing network penetrationtesting, anti-virus planning assistance, risk analysis, and incident response. Experience providing information assurance support for application development that includes system security certifications and project evaluations for firewalls … that encompass the development, design, and implementation. Experience with penetrationtesting tools. Experience with scripting languages. $200,000 - $250,000 a year The pay range for this job, with multi-levels, is a general guideline only and not a guarantee of compensation or salary. Additional factors considered in extending an offer include (but are not limited to) responsibilities More ❯
Northampton, Northamptonshire, England, United Kingdom
Summit Recruiters
platforms like CyGlass and KnowBe4, coordinate with external partners including Pentest People, and support internal compliance efforts. This is a hands-on role with variety — from incident response and penetrationtesting coordination to user training and policy development. Key Responsibilities Security Operations & Monitoring • Manage and monitor the CyGlass network defence platform • Coordinate penetrationtesting and remediation More ❯
and system security layout. The candidate will operate in a team environment and collaborate across the organization (as required) to accomplish team goals by coordinating with customers and other testing organizations. Duties will include but are not limited to planning, executing, and reporting cyber test activities to develop artifacts in support of authorization packages. The Principal Cybersecurity Test Engineer … a system while it is under test for the customer. Periodic travel to operational or development sites is anticipated to perform & support cyber test activities. Responsibilities include: Perform cyber testing, verification, and validation Validate system security requirements definition and analysis, establish system security designs, implement security designs in hardware, software, data, and procedures Participate in team reviews of technical … requirements, designs and implementation plans prior to deployment of systems, digital communications systems, network protocols, computer architectures, and computer security penetration tools and techniques Provide cyber security implementation guidance to technical design teams and develop testing use cases to meet requirements and architecture model content. Support development of technical decision-making guidance to the Cybersecurity team to ensure More ❯
2HB Incorporated is seeking a Cyber Security Project Engineer to support its government customer in Herndon, VA. This Cyber Security Project Engineer will provide highly technical and in-depth penetrationtesting and ethical hacking to target, assess, and exploit risk and vulnerabilities of information systems. The Cyber Security Project Engineer will provide decision makers with documented and actionable … data to aid in making strategic investment decisions. The candidate MUST have experience with cyber penetrationtesting, leveraging adversarial tactics to conduct hands-on security testing, and applying computer attack methods and system exploitation techniques. The candidate MUST have experience with the cyber security principles for Linux, Windowx, and virtual platforms as well as performing network security More ❯
Stone, England, United Kingdom Hybrid / WFH Options
Meritus
impact security projects within complex OT environments. As a Senior ICS OT Cyber Security Engineer, you will take a lead role in securing operational technology networks, delivering threat modelling, penetrationtesting, and cyber risk mitigation strategies for industrial environments. You will work closely with key stakeholders to design secure architectures, provide technical leadership on live security projects, and … candidates to be eligible for SC Level Security Clearance. Main Responsibilities: Lead the design and implementation of secure OT network architectures across critical infrastructure environments. Conduct attack path analysis, penetrationtesting and adversary simulations within ICS/OT environments. Perform cybersecurity risk assessments and technical security audits aligned to recognised industry frameworks. Develop technical design specifications and security More ❯
Stone, Staffordshire, England, United Kingdom Hybrid / WFH Options
Meritus Talent
impact security projects within complex OT environments. As a Senior ICS OT Cyber Security Engineer, you will take a lead role in securing operational technology networks, delivering threat modelling, penetrationtesting, and cyber risk mitigation strategies for industrial environments. You will work closely with key stakeholders to design secure architectures, provide technical leadership on live security projects, and … candidates to be eligible for SC Level Security Clearance. Main Responsibilities: Lead the design and implementation of secure OT network architectures across critical infrastructure environments. Conduct attack path analysis, penetrationtesting and adversary simulations within ICS/OT environments. Perform cybersecurity risk assessments and technical security audits aligned to recognised industry frameworks. Develop technical design specifications and security More ❯
Offensive capability development for Windows environments. Program with C/C C# and Beacon Object Files (BOF)s. Operate in a Scrum/Agile environment, contributing to design, development, testing, and planning as part of an agile team. Host-based and network-based forensics, cyber incident response, cyber-criminal investigations, intrusion detection/analysis, and designing countermeasures and mitigations … for programming language weaknesses and vulnerabilities. Advanced cyber red teaming, network penetrationtesting, security operations center analysis, defensive and offensive cyber operations. What Desired Skills You'll Bring Host-based and network-based forensics, cyber incident response, cyber-criminal investigations, intrusion detection/analysis, and designing countermeasures and mitigations for programming language weaknesses and vulnerabilities. Advanced cyber red … teaming, network penetrationtesting, security operations center analysis, defensive and offensive cyber operations. Malware development and analysis, including binary disassembly, binary decomplication, dynamic analysis, and network/communication protocol analysis. Software vulnerability research and exploit development. Desired skills/certifications: Offensive Security Experienced Penetration Tester (OSEP), Advanced Windows Exploitation - Offensive Security Exploitation Expert (OSEE), GIAC Exploit Researcher More ❯
world projects that directly impact warfighter capabilities and mission success. Key Responsibilities: • Design and implement security architectures for AI/ML systems in classified environments • Conduct security assessments and penetrationtesting of AI applications • Develop security policies and procedures specific to AI/ML workloads • Lead incident response activities and forensic analysis for AI system compromises • Implement advanced … to obtain CI Polygraph required • Professional certifications (CISSP, CISM, CEH, or equivalent) • Deep knowledge of network security, cryptography, and secure coding practices • Experience with security tools (SIEM, vulnerability scanners, penetrationtesting tools) • Understanding of AI/ML security considerations and adversarial attacks • AWS security experience highly preferred but not required • Military experience strongly preferred More ❯
ll Be Doing: Offensive capability development. Program with C/C C# and Beacon Object Files (BOF)s. Operate in a Scrum/Agile environment, contributing to design, development, testing, and planning as part of an agile team. Conduct malware development and analysis, software vulnerability research, and reverse engineering. Develop exploits, shellcode, and techniques to bypass mitigations. Perform dynamic … analysis, code reviews, troubleshooting, and debugging. Design and develop penetrationtesting and red team operations capabilities to validate the security of critical national systems. Leverage C2 tools such as Cobalt Strike to deliver integrated capabilities that maximize red team mission effectiveness. Rapidly prototype and implement new scripts, tools, and capabilities to support active red team operations in real … network-based forensics, cyber incident response, cyber-criminal investigations, intrusion detection/analysis, and designing countermeasures and mitigations for programming language weaknesses and vulnerabilities. Advanced cyber red teaming, network penetrationtesting, security operations center analysis, defensive and offensive cyber operations. Malware development and analysis, including binary disassembly, binary decomplication, dynamic analysis, and network/communication protocol analysis. Software More ❯
additional years of relevant technical experience may be accepted in lieu of degree; 3+ years of experience across technical competencies, such as: analysis, network engineering, network security, technical collection, penetrationtesting, red teaming, hardware engineering, software reverse engineering, cyber operations, and/or computer exploitation; 1+ years of experience across three or more of the following: mobile device … ability to adapt to dynamic and unexpected customer requirements Desired Qualifications 6+ years of experience across technical competencies, such as: analysis, network engineering, network security, vulnerability assessment, technical collection, penetrationtesting, red teaming, hardware engineering, software reverse engineering, cyber operations, and/or computer exploitation; 3+ years of experience across three or more of the following: mobile device More ❯
/systems required to meet operational needs. • Devise new techniques by applying technical capabilities in innovative scenarios. • Provide technical feedback to ongoing development activities. DESIRED SKILLS • Prior experience in penetrationtesting, red team operations, incident response or computer forensics. • Experience with wireless communications protocols and technologies, including cellular, Wifi and bluetooth • Previous overseas travel experience, including engaging with … sound judgment, good administrative and organizational skills. • Knowledge of the process and techniques for recruiting. • Knowledge writing methods and systems as well as policies and regulations. • Technical certifications in penetrationtesting or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH) • General technical certifications such as CompTIA More ❯
dynamic analysis, code reviews, troubleshooting, and debugging. Conduct malware development and analysis, software vulnerability research, and reverse engineering. Operate in a Scrum/Agile environment, contributing to design, development, testing, and planning as part of an agile team. Design and develop penetrationtesting and red team operations capabilities to validate the security of critical national systems. Leverage … network-based forensics, cyber incident response, cyber-criminal investigations, intrusion detection/analysis, and designing countermeasures and mitigations for programming language weaknesses and vulnerabilities. Advanced cyber red teaming, network penetrationtesting, security operations center analysis, defensive and offensive cyber operations. Malware development and analysis, including binary disassembly, binary decomplication, dynamic analysis, and network/communication protocol analysis. Software More ❯
and system security layout. The candidate will operate in a team environment and collaborate across the organization (as required) to accomplish team goals by coordinating with customers and other testing organizations. Duties will include but are not limited to guiding, scheduling, planning, executing, and reporting cyber test activities to develop artifacts in support of authorization packages. The Senior Cybersecurity … a system while it is under test for the customer. Periodic travel to operational or development sites is anticipated to perform & support cyber test activities. Responsibilities include: Perform cyber testing, verification, and validation Validate system security requirements definition and analysis, establish system security designs, implement security designs in hardware, software, data, and procedures Participate in team reviews of technical … requirements, designs and implementation plans prior to deployment of systems, digital communications systems, network protocols, computer architectures, and computer security penetration tools and techniques Provide cyber security implementation guidance to technical design teams and develop testing use cases to meet requirements and architecture model content. Support development of technical decision-making guidance to the Cybersecurity team to ensure More ❯
that are not in compliance 5.Validate the security requirements of the information system 6.Verify and validate the system meets the security requirements 7.Provide vulnerability assessment of the system, coordinate penetrationtesting, and provide a comprehensive verification and validation report (certification report) for the information system 8.Facilitate penetrationtesting 9.Provide a comprehensive verification and validation report (certification More ❯
that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetrationtesting, and provide a comprehensive verification and validation report (certification report) for the information system Facilitate penetrationtesting Provide a comprehensive verification and validation report (certification More ❯
years of technical experience installing, maintaining, and managing Local Area Networks (LANs) or Wide Area Networks (WAN) and 3 years of security engineering, system security auditing or system penetrationtesting Certifications (at least one is desirable): MCSA/Unix/Linux, CCNA, CompTIA-Network , CompTIA-Security , CISSP Certification • Education: Bachelor's Degree in Information Systems, Security, Engineering, or … years of technical experience installing, maintaining, and managing Local Area Networks (LANs) or Wide Area Networks (WAN) and 3 years of security engineering, system security auditing or system penetrationtesting Certifications (at least one is desirable): MCSA/Unix/Linux, CCNA, CompTIA-Network , CompTIA-Security , CISSP Certification Preferred: • Front-end: o Code quality and standardization practices • Development More ❯
An active Top Secret/SCI with CI Polygraph is required. Candidates who do not meet these requirements will not be considered. Responsibilities: • Perform full scope of Red Team testing: including network penetration, web application testing, threat analysis, wireless network assessments, social-engineering testing, and antivirus/EDR evasion techniques. • Configure and safely utilize adversary emulation … vulnerabilities discovered. Qualifications: • High School Diploma/GED, Associates Degree and 5 years of relevant work experience. • Bachelor's Degree and 3 years of relevant work experience. • Experience in penetrationtesting and/or red teaming. • Knowledge of tools used for offensive security testing such as Kali Linux, Cobalt Strike, NMAP, Wireshark, Metasploit, Burp suite, Bloodhound, PowerShell More ❯
CNO support teams and CNO reach back capabilities to gain and maintain information dominance throughout Cyberspace. Will support Computer Defense Assistance Program, computer network operations planning and exercise support, penetrationtesting and network damage assessment. Required Training/Certification: Active TS/SCI clearance or higher (Must Have) Army Information Operations Planner Course (AIOPC) after employment begins Must … operations (FUOPS), an/or plans (deliberate planning using the Military Decision Making Process MDMP ). Experience working a joint environment. Desired Experience/Education: Experience with cyberspace operations, penetrationtesting or cybersecurity DoD recognized technical certifications Strong verbal and written communication skills. What you can expect from us: Real opportunity for career growth in an environment where More ❯
processes are in place to protect the organisation. Key Responsibilities Support implementation of the cyber security strategy and management plan. Monitor global threats and assess potential organisational impact. Coordinate penetrationtesting and manage remediation actions. Assist with maintaining Cyber Essentials certification and internal audits. Work with IT colleagues to plan and implement security improvements. About You Strong skills … the development and implementation of an Information Security Management System (ISMS) aligned with ISO 27001 standards. Monitor emerging threats, legislation, and industry changes, translating them into actionable requirements. Coordinate penetrationtesting and vulnerability assessments, ensuring remediation plans are completed effectively. Identify and plan critical patching and security updates with technical teams. Ensure security is embedded in all change More ❯
is accountable for security within the mobile channel. We provide a suite of mobile security components, that provides an all-round security posture in mobile apps including associated services (penetrationtesting, obfuscation, consultancy etc.). Our mission is to build a scalable, adaptable, and proactive approach to securing customer's mobile apps, enabling mobile engineers across the bank … delivering, and driving the security of our mobile platform. The key aspect of this role is the design and delivery of a world-class security framework, including associated services (penetrationtesting, research, consultancy etc.). Essential skills & experience: Experience of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular reviews of our mobile application security … posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and automation frameworks. Have deep knowledge and experience using the mobile security tools. Good understanding of authentication, authorisation, encryption, and More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
General Dynamics Information Technology
based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetrationtesting, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or … WHAT YOU'LL NEED TO SUCCEED: Required Experience: 5+ years of related experience Required Technical Skills: Offensive Security Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM) Security Clearance Level: TS/SCI US Citizenship Required Location: Hybrid-Ft. Belvoir, VA Required Skills and Abilities: Must be proficient in offensive … based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetrationtesting, security operations center analysis, defensive cyber operations, or offensive cyber operations. GDIT IS YOUR PLACE: Full-flex work week to own your priorities at work and at More ❯
Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetrationtesting, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and guidelines for usage. The Level … that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetrationtesting, and provide a comprehensive verification and validation report (certification report) for the information system Required Qualifications 5 years' experience in security, systems engineering or system assessment to More ❯
Knowledgeable in software security, reverse engineering, debugging, and exploit development. Experience working with Layer 2 and 3 network devices Preferred experience with tools such as Cobalt Strike or similar penetrationtesting tools Experience in working on offensive cyber operations, or a related field, such as penetrationtesting, vulnerability research, or exploit development. Excellent communication, presentation, and More ❯
assessments, developing creative attack paths, and engaging with clients at the highest levels—this role is for you. What You'll Do Lead and deliver advanced red team and penetrationtesting engagements Work on regulatory red team exercises in the financial services sector Manage complex client engagements , reporting to stakeholders, and working with internal blue teams Bring new … to your engagements, from initial access to post-exploitation Collaborate across teams and mentor junior members of staff What We’re Looking For Must-Have Skills: 5+ years of penetrationtesting experience (more is welcome) Significant hands-on red team experience Strong consultancy background – comfortable in client-facing roles Familiarity with multiple scripting/programming languages Strong Pluses More ❯
Renowned for their deep technical expertise, our client brings together comprehensive capabilities across all aspects of CNO, including software development, reverse engineering, SIGINT analysis, testing, penetrationtesting, network engineering, and program management. Founded and run by engineers, their team of CNO experts makes a direct impact on our nation's security every single day. They offer an More ❯