Security). Experience with serverless architectures and microservices security. Experience working in air-gapped environments (IL6) Familiarity with software supply chain security (SBOM, Dependency Scanning). Familiarity with security testing methodologies and tools, such as vulnerability scanning and penetrationtesting Familiarity with SATCOM, spectral processing and EMI (Electromagnetic Interference) Required Certifications: N/A U.S. Citizenship Required More ❯
Penetration Tester Job Category: Engineering Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: None The Opportunity: Perform computer network evaluations to include penetration security assessments in a cybersecurity red team environment. Be part of a department with an expanding range of … Python, Perl or Ruby, Systems Programming is a plus. Existing Subject Matter Expert of Advanced Persistent Threats and Emerging Threats. Proactive interest in emerging technologies and techniques related to penetration testing. Demonstrated real world experience performing grey and black box penetration testing. Have an understanding of and interest in common web application vulnerabilities like XSS, CSRF, Command Injection … Solid understanding of networking, TCP/IP, virtualization and cloud/data center architecture. Strong familiarity with some of the following: OWASP top 10, DoD and NSA Vulnerability and PenetrationTesting Standards. Knowledge of exploitation concepts including phishing and social engineering tactics, buffer overflows, fuzzing, SQLi, MiTM, covert channels, secure tunneling and open source exfiltration techniques. Bachelors degree More ❯
adherence to regulatory standards. Consistently monitor and assess cloud environments for vulnerabilities and misconfigurations utilising tools like AWS Inspector, GuardDuty, and Security Hub, complemented by regular vulnerability scanning and penetration testing. Design, implement, and automate enterprise-level security systems and controls -including IAM, SIEM, DLP, firewalls, endpoint protection, and cloud-native guardrails-to safeguard assets across both cloud and … compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure key management (e.g., PCI digital keys, security access modules). Hands-on experience with offensive security techniques , including penetrationtesting and phishing simulations. Proficiency in programming or scripting languages (such as Python, Bash, or PowerShell) for automation or tooling. Experience with Infrastructure as Code (IaC) and its More ❯
of Navy (DoN) and DoD cybersecurity policies, verifying user clearances and training. Assemble and submit Security Authorization Packages, registering and maintaining systems in eMASS. Execute annual security reviews, control testing, and contingency plan testing per FISMA requirements. Correlate non-RMF vulnerability assessment findings (e.g., penetrationtesting, CCORI) to RMF controls for holistic risk assessment. Travel Up More ❯
Chantilly, VA Full-Time TS/SCI with Poly Onsite Overview Lucayan Technology LLC is hiring a Senior Penetration Tester (Level 3) to lead advanced penetrationtesting engagements for Intelligence Community systems. A Penetration Tester (Pen Tester) is a security professional who reviews and evaluates NRO ISs and recommends changes to the Government that can improve … improve the security posture of NRO ISs. This senior role requires strong technical expertise, leadership, and the ability to provide strategic security guidance. What You'll Do Lead advanced penetration tests and vulnerability assessments. Develop custom tools and advanced exploitation methods. Identify complex vulnerabilities and recommend mitigations. Advise management on policies and security strategy. Mentor penetration testers and More ❯
the cyber kill chain. Familiarity with frameworks including MITRE ATT&CK, NIST, and CIS. Strong communication, analytical, and presentation skills. Solid understanding of network traffic flows, vulnerability management, and penetrationtesting principles. Knowledge of ITIL processes (Incident, Problem, Change Management). Ability to work independently and thrive in a 24/7 on-call environment. Education & Experience More ❯
level! The Cyber Readiness Engineer supports mission readiness by coordinating cybersecurity requirements with operational needs. Responsibilities Design and implement security measures and simulations to test incident response readiness. Conduct penetrationtesting to identify vulnerabilities in the network and system. Monitor and manage security measures to ensure compliance with industry standards. Staying updated on the latest cybersecurity threats and More ❯
a first responder to network security incidents. Execute incident response procedures, perform digital forensics, and lead efforts to contain and remediate security breaches. Vulnerability management: Conduct vulnerability assessments and penetrationtesting to identify weaknesses in network security. Collaborate with system administrators and network engineers to develop and implement mitigation strategies. Threat intelligence: Stay current with the latest cybersecurity … information security requirements, translate these into security designs, implements these designs, and tests effectiveness. Experience with standard information security products including firewalls, intrusion detection systems, anti-virus systems, vulnerability testing, and security analysis tools. Experience in all phases of security requirements analysis, and information security system design as well as available products, and management practices. Experience with U.S. Government More ❯
traceability. Work with cross-functional teams to ensure that SBOMs are correct and can be used as part of our continuous vulnerability monitoring process. Assist with efforts to establish penetrationtesting suites for continuous testing and monitoring of our product solution. Design architecture that prioritizes efficient, secure software updates and patch management across deployed systems. Establish incident … standards, and ACTS for premarket and post-market activities. Strong verbal & written communication skills. Familiarity with Windows OS and cloud-based solutions is required Expertise with security frameworks and testing tools, and how to incorporate the results of those into cybersecurity requirements for the Product Development team. Proficiency in scripting and simple test automation (e.g., PowerShell, Python). The More ❯
Security Classification Assessor Test Engineer (SCATE) Level 1 - Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 1. We are looking for a security professional who reviews and evaluates Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can perform … Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration management System maintenance Integration testing Information system engineering Penetrationtesting and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution of IS security tools More ❯
Security Classification Assessor Test Engineer (SCATE) Level 2 - Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 2. We are looking for a security professional who reviews and evaluates NRO Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can … Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration management System maintenance Integration testing Information system engineering Penetrationtesting and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution of IS security tools More ❯
Security Classification Assessor Test Engineer (SCATE) Level 3 - Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 3. We are looking for a security professional who reviews and evaluates NRO Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can … Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration management System maintenance Integration testing Information system engineering Penetrationtesting and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution of IS security tools More ❯
security breaches and other cybersecurity incidents. Document security breaches and assess the consequences/impacts; work with the security team to perform tests and uncover network vulnerabilities, such as penetrationtesting, and remediate detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security, install security measures and operating software to protect systems and information … needed. Implement system security measures in accordance with established procedures to ensure confidentiality, integrity, availability, authentication, and non-repudiation. Mitigate/correct security deficiencies identified during security/certification testing and/or recommend risk acceptance for the appropriate senior leader or authorized representative. Provides cybersecurity recommendations to leadership based on significant threats and vulnerabilities, as needed. Verify and … in developing and applying security system access controls, security system design tools, methods, and techniques, security management, network design processes (security objectives, operational objectives, and trade-offs), systems security testing and evaluation methods, use network analysis tools to identify vulnerabilities, systems security testing and evaluation methods. Demonstrated experience designing, operating, troubleshooting Cloud solutions Strong knowledge of FISMA, FedRAMP More ❯
Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetrationtesting and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools More ❯
Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetrationtesting and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools More ❯
Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetrationtesting and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools More ❯
Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetrationtesting and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools More ❯
TCP/IP, routing protocols (BGP, OSPF), VLANs, and network troubleshooting • Strong encryption and cryptography background including symmetric/asymmetric encryption, PKI, and secure communication protocols • Network design and testing experience including performance optimization and security validation • Infrastructure implementation experience (virtualization, cloud platforms, HPC) • Security monitoring, incident response, and vulnerability assessment knowledge • Excellent problem-solving skills and ability to … Firewall and network encryptor experience (Juniper, Cisco, Fortinet) • Enterprise networking expertise with high-speed optical networks • Network protocol analysis and packet capture experience (Wireshark, tcpdump) • Experience in network performance testing and optimization • Understanding of quantum computing architectures and quantum error correction • Programming experience in Python, C++, or similar languages for network automation • Active TS/SCI clearance Physical Demands … Implement quantum key distribution (QKD) systems. Test and validate post-quantum cryptographic algorithms. Design integrated quantum and classical computing environments. Optimize system performance for quantum workloads. Security Implementation and Testing (25%) Manage classified and unclassified encryption systems. Implement and maintain cryptographic key management infrastructure. Conduct security assessments of quantum communication protocols. Perform penetrationtesting and vulnerability assessments. More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
concepts Strong analytical and problem-solving skills Good communication skills and the ability to explain technical concepts clearly Nice to Have (But Not Required): Personal or academic experience with penetrationtesting, malware analysis, or security tools Knowledge of scripting (e.g. Python, Bash, PowerShell) Internship, placement, or lab-based university project in security Familiarity with security frameworks or certifications … real users and systems Mentoring : One-on-one support to help you grow professionally and personally Career Pathways : Clear progression into specialised roles such as SOC Analyst, Security Engineer, Penetration Tester, or Risk Analyst Collaborative Culture : Join a team that values innovation, integrity, and inclusion Excellent Company Benefits We believe in supporting our people from day one. Here’s More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
concepts Strong analytical and problem-solving skills Good communication skills and the ability to explain technical concepts clearly Nice to Have (But Not Required): Personal or academic experience with penetrationtesting, malware analysis, or security tools Knowledge of scripting (e.g. Python, Bash, PowerShell) Internship, placement, or lab-based university project in security Familiarity with security frameworks or certifications … real users and systems Mentoring : One-on-one support to help you grow professionally and personally Career Pathways : Clear progression into specialised roles such as SOC Analyst, Security Engineer, Penetration Tester, or Risk Analyst Collaborative Culture : Join a team that values innovation, integrity, and inclusion Excellent Company Benefits We believe in supporting our people from day one. Here’s More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
concepts Strong analytical and problem-solving skills Good communication skills and the ability to explain technical concepts clearly Nice to Have (But Not Required): Personal or academic experience with penetrationtesting, malware analysis, or security tools Knowledge of scripting (e.g. Python, Bash, PowerShell) Internship, placement, or lab-based university project in security Familiarity with security frameworks or certifications … real users and systems Mentoring : One-on-one support to help you grow professionally and personally Career Pathways : Clear progression into specialised roles such as SOC Analyst, Security Engineer, Penetration Tester, or Risk Analyst Collaborative Culture : Join a team that values innovation, integrity, and inclusion Excellent Company Benefits We believe in supporting our people from day one. Here’s More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
concepts Strong analytical and problem-solving skills Good communication skills and the ability to explain technical concepts clearly Nice to Have (But Not Required): Personal or academic experience with penetrationtesting, malware analysis, or security tools Knowledge of scripting (e.g. Python, Bash, PowerShell) Internship, placement, or lab-based university project in security Familiarity with security frameworks or certifications … real users and systems Mentoring : One-on-one support to help you grow professionally and personally Career Pathways : Clear progression into specialised roles such as SOC Analyst, Security Engineer, Penetration Tester, or Risk Analyst Collaborative Culture : Join a team that values innovation, integrity, and inclusion Excellent Company Benefits We believe in supporting our people from day one. Here’s More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
concepts Strong analytical and problem-solving skills Good communication skills and the ability to explain technical concepts clearly Nice to Have (But Not Required): Personal or academic experience with penetrationtesting, malware analysis, or security tools Knowledge of scripting (e.g. Python, Bash, PowerShell) Internship, placement, or lab-based university project in security Familiarity with security frameworks or certifications … real users and systems Mentoring : One-on-one support to help you grow professionally and personally Career Pathways : Clear progression into specialised roles such as SOC Analyst, Security Engineer, Penetration Tester, or Risk Analyst Collaborative Culture : Join a team that values innovation, integrity, and inclusion Excellent Company Benefits We believe in supporting our people from day one. Here’s More ❯
Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
concepts Strong analytical and problem-solving skills Good communication skills and the ability to explain technical concepts clearly Nice to Have (But Not Required): Personal or academic experience with penetrationtesting, malware analysis, or security tools Knowledge of scripting (e.g. Python, Bash, PowerShell) Internship, placement, or lab-based university project in security Familiarity with security frameworks or certifications … real users and systems Mentoring : One-on-one support to help you grow professionally and personally Career Pathways : Clear progression into specialised roles such as SOC Analyst, Security Engineer, Penetration Tester, or Risk Analyst Collaborative Culture : Join a team that values innovation, integrity, and inclusion Excellent Company Benefits We believe in supporting our people from day one. Here’s More ❯