System Vulnerability Analyst shall possess the following capabilities: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Network and system administration may account for some, but not all, of the experience. Qualifications: Doctoral degree with More ❯
topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
System Vulnerability Analyst shall possess the following capabilities: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. The Analyst should be More ❯
Analyst shall possess the following capabilities: Experience in computer or information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, or network and systems administration. Qualifications: Level 1: Associate's Degree with 4 years of experience or Bachelor's Degree with More ❯
on current platform(s). - Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) - Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. - Develop and maintain security incident response plans and procedures. - Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. - Deploy and manage machines More ❯
Experience must be in the design/development of computer or information systems, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, and/or systems engineering. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (i.e., 24-week JCAC course will More ❯
and potential attacks against the systems or missions being studied. The principal level System Vulnerability Analyst shall possess the following capabilities: Candidate must have relevant experience in vulnerability analysis, penetrationtesting, and/or computer forensics. Requirements Active TS/SCI w/Polygraph security clearance is required. Information Assurance Certification may be required A Bachelor's Degree More ❯
and/or enable mitigation of network vulnerabilities. Relevant experience must be in the design/development of computer or information systems, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, and/or systems engineering. Experience with endpoint and device driven data. Familiarity with Linux systems and usage of Linux command line. Cyber forensics and More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC will be More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC will be More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
experience must be in computer or information systems design/development/analysis. May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
must be in computer or information systems design/development/analysis, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
risks. Own control frameworks - Maintain and improve controls to ensure alignment with standards like NIST CSF and COBIT. Drive assurance - Monitor the effectiveness of security controls, including outcomes of penetrationtesting and red team exercises. Collaborate with business units - Act as a security advocate and guide cross-functional teams in secure practices. Lead technical initiatives - Provide hands-on More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
CI Polygraph (Fullscope highly preferred) - Bachelor's or Master's degree in Computer Science, Cybersecurity, Information Systems, or related field. - A Minimum 5 years of experience in network exploitation, penetrationtesting, or defensive cyber operations. Proficiency in scripting languages (e.g., Python, Bash, PowerShell). Strong understanding of TCP/IP, DNS, HTTP/S, and other core networking More ❯
cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed. Successful candidates may also have experience programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Required Experience: Level 3: At least 8 years demonstrated experience within the Department of More ❯
in conjunction with the Navy tactical configuration development and associated tactical applications, applying principles and techniques of network engineering, cybersecurity engineering, and systems administration. Conduct vulnerability research, malware analysis, penetrationtesting, and reverse engineering development of computer network operations, as required. Conduct installation and integration of Commercial Off-The-Shelf (COTS) cybersecurity tools and applications and perform proof More ❯
make the most out of your career. You'd like to do this Computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Network or system administration. Use information collected from a variety of sources (e.g., intrusion detection systems, firewalls, network More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯