computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
week JCAC course will count as 6 months of experience). You could also have this: Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. SALARY RANGE: $90,000 to $157,000 The BlueHalo, an AV Company, pay range More ❯
Forensic Analyst shall possess the following capabilities: Relevant experience must be in the design/development of computer or information systems, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, and/or systems engineering. Qualifications: Doctoral degree with 7 years of relevant experience. Master's degree with 9 years of relevant experience. Bachelor's Degree More ❯
defending our Nation's Security. Job Description: We are looking for a Computer Network Defense Analyst (CNDA) with experience in computer or information systems design, programming, cybersecurity, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and systems engineering. You will utilize information from various sources, such as intrusion detection systems, firewalls, network traffic logs, and host system logs More ❯
Cheadle Hulme, Cheadle, Cheshire, England, United Kingdom
QA
businesses improve efficiency, security, and scalability through managed IT support, cyber security, cloud transformation, and consultancy. They offer services like proactive IT monitoring, data backup, identity and access management, penetrationtesting, and tailored technology roadmaps. With a focus on simplicity, security, and business growth, San-iT supports small to medium-sized businesses across various sectors, delivering practical, jargon More ❯
e.g. Function Apps, Logic Aps, Power Automate, External Entra ID ISO27001 implementation and maintenance Proactive and self-motivated Desirable but not required: Cyber Security experience - understanding of vulnerability, pen testing and communicate with CyberSec professionals. Please apply directly with an up today CV and we will be in touch More ❯
Paddington, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusion detection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company’s services and there is an opportunity in that team for a Cyber More ❯
a related technical field (equivalent military training may be considered). Strong understanding of IP core infrastructure, network traffic analysis, and cybersecurity. Experience with SIGINT analysis, vulnerability assessments, or penetration testing. Demonstrated ability to work with multi-disciplinary teams in high-stakes environments. An active TS/SCI clearance with polygraph Salary Range: $150,000 - $220,000 The BlueHalo More ❯
Leominster, Herefordshire, West Midlands, United Kingdom Hybrid / WFH Options
Kingspan
support for global and regional content teams. Data privacy (GDPR/CCPA) and cookie & consent management. Domain & DNS Management (e.g SSL certification) Cyber security operations including vulnerability management and penetration testing. Regulatory compliance in local markets. Code quality & security including release management and change controls. Data & Optimization Business intelligence. Manage analytics and reporting for site performance, engagement, and conversions. More ❯
and Prototypes: Demonstrating how sites function and look. • Troubleshooting UX Problems: Identifying and addressing issues related to responsiveness. • Adhering to Style Standards: Ensuring consistency in fonts, colors, and images2. • Testing and Analysis: Conducts vulnerability research, penetrationtesting, malware analysis and reverse engineering development of computer network operations tools. Required Qualifications: • An Active TS/SCI Clearance with More ❯
experience must be in computer or information systems design/development/analysis may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Requirements AA + 7 yrs or B.A. + 5 yrs or Masters +3 yrs More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Identify, analyze, map, and/or protect against vulnerabilities, intrusions and threats to computer More ❯
Experience must be in computer or info systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Strong knowledge of web/mobile security (OWASP Top 10, API security), cloud security (AWS), and CI/CD pipeline hardening Familiar with SAST/DAST tools, vulnerability scanners, penetrationtesting frameworks, and monitoring platforms (e.g. Splunk, ELK, Datadog) Understanding of GDPR and data privacy best practices Tremendous opportunity offering plenty of scope for career progression in a More ❯
must be in computer or information systems design/development/analysis, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC will be More ❯
in computer or information systems design/development/analysis roles may include may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Excellent communication and collaboration skills to interface across NSA Strong target and content discovery More ❯
analysis, and metadata analysis. Education and Training Qualifications: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
roadmap Handle varied and complex security challenges, from system reviews to high-level risk assessments Work closely with third-party suppliers in relation to audits, forensic analysis and pen testing Requirements: Experience with ISO 27001 is essential Strong background in cyber security management Proven experience in identifying and mitigating security risks# Ability to make actionable recommendations for security improvements More ❯
roadmap Handle varied and complex security challenges, from system reviews to high-level risk assessments Work closely with third-party suppliers in relation to audits, forensic analysis and pen testing Requirements: Experience with ISO 27001 is essential Strong background in cyber security management Proven experience in identifying and mitigating security risks# Ability to make actionable recommendations for security improvements More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
required: Demonstrable experience in analysing and deconstructing Android applications ( Java essential; native code experience advantageous) Strong understanding of Android OS security features and architecture Proficiency in vulnerability identification and penetrationtesting techniques Ability to work independently, with excellent attention to detail and analytical skills Comfortable navigating large, unfamiliar codebases Excellent communication skills and a collaborative approach to problem … point during the recruitment process, if there is a better way for us to communicate, please do let us know. Developer, Engineer, Programmer, Java, Android, Mobile OS, Malware, Virus, Penetration Test, Threat, OSCP, Cyber, Infosec, Security, Information Security, Pentest #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent #recruitment #job Circle Recruitment is acting as an Employment Agency in relation to More ❯
Location: Annapolis Junction MD Salary: 125K-135K Background Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering Experience in network or system administration Requirements AA + 7 yrs or, B.A. + 5 yrs or Masters More ❯
cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Provides DevOps solutions enabling software quality assurance for vulnerability research, reverse engineering, penetrationtesting (red/blue teams), and develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge. of subject matter (hardware, software, networks, cloud, etc. More ❯
in computer or information systems design/development/analysis. In addition, it may also include: Engineering hardware and/or software Programming Computer/network security Vulnerability analysis Penetrationtesting Computer forensics Information assurance Systems engineering and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯