Penetration Testing Job Vacancies

251 to 275 of 462 Penetration Testing Jobs

Information Technology Internal Auditor

Birmingham, England, United Kingdom
Insight Global
of areas such as access management, IT operations, job scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerability assessment and penetration testing, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology More ❯
Posted:

Exploitation Analyst 3 with Security Clearance

Georgia, United States
Torin Consulting, Inc
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Level 3 Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems … design/development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Georgia, United States
Torin Consulting, Inc
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst 2 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

San Antonio, Texas, United States
Torin Consulting, Inc
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Aurora, Colorado, United States
Torin Consulting, Inc
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst 3 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Wahiawa, Hawaii, United States
Torin Consulting, Inc
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Exploitation Analyst with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Digital Network Exploitation Analyst 1 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
connections, and traffic movements. Relevant experience includes computer or information systems design, development, and analysis, as well as engineering hardware and software, programming, computer and network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and network and systems administration. The Level 1 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or … information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration. Completion of military training in a relevant area such as the Joint Cyber Analysis Course (JCAC) may count towards the experience requirement (24-week JCAC course More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer, COR7186A

Basingstoke, Hampshire, South East, United Kingdom
Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
Employment Type: Permanent, Work From Home
Salary: £55,000
Posted:

Functional Analyst 2 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Identify overall … security requirements for the protection of data to ensure the implementation of appropriate information security controls. Provide analysis of customer mission needs to determine functional testing requirements. Work with security control assessors on systems testing. Perform functional analysis to identify required tasks and their interrelationships. Identify required resources. Maintain security posture for Information Systems or programs to ensure Information … The Level 2 Functional Analyst shall possess the following capabilities: Perform functional analysis to identify critical Cybersecurity tasks required and their interrelationships. Analyze customer/mission needs to determine testing requirements. Identify required resources to enable creation, registration, and assignment of SSPs in conjunction with Delegated Authorizing Officials (DAOs), ISSO's, and System Owners. Review and update organizational documentation More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer, COR7186B

Basingstoke, Hampshire, South East, United Kingdom
Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
Employment Type: Permanent, Work From Home
Salary: £55,000
Posted:

Cyber Security Analyst

London, United Kingdom
Hybrid / WFH Options
Investigo
respond to potential threats. Utilise advanced tools and techniques to analyse security data and identify patterns or anomalies that may indicate a security breach. Review regular vulnerability assessments and penetration testing to ensure the robustness of security measures. Ensure rapid response to common incidents: Contribute to incident response plans to address security breaches promptly and effectively. Key Skills More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cyber Security Analyst

Edinburgh, Scotland, United Kingdom
Hybrid / WFH Options
Acumin
and external partners to ensure data integrity and alignment What We’re Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetration testing) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Posted:

Reporting and Analytics Analyst

Edinburgh, Midlothian, United Kingdom
Hybrid / WFH Options
Red Snapper Recruitment Limited
and external partners to ensure data integrity and alignment What We're Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetration testing) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Reporting and Analytics Analyst

Edinburgh, City of Edinburgh, United Kingdom
Hybrid / WFH Options
Red Snapper Recruitment Limited
and external partners to ensure data integrity and alignment What We're Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetration testing) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Employment Type: Permanent
Posted:

Cybersecurity Analyst with Security Clearance

Chantilly, Virginia, United States
Square Peg Technologies
Ability to convey technical findings clearly to various audiences. Preferred , Advanced degree in Cybersecurity, Computer Science, or related field. Industry certifications (CISSP, CEH, OSCP, GIAC, etc.). Experience with penetration testing, red/blue teaming, or automated threat detection. Knowledge of mobile/wireless technologies and data visualization tools. Foreign language skills are a plus. Location: Chantilly, VA More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Digital Network Exploitation Analyst (DNEA) Level 1 - 4 with Security Clearance

Maryland, United States
Tailored Access, LLC
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Business Process Engineer 2 with Security Clearance

Southern Md Facility, Maryland, United States
Torin Consulting, Inc
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, Penetration Testing, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Collaborate with More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Security Controls Assessor with Security Clearance

Columbia, Maryland, United States
The Swift Group
Conduct on-site evaluations Validate the security requirements of the information system Verify and validates that the system meets the security requirements Provide vulnerability assessment of the system Coordinate penetration testing Provide a comprehensive verification and validation report (certification report) for the information system Provide process improvement recommendations Assist the Government to draft standards and guidelines for usage More ❯
Employment Type: Permanent
Salary: USD 290,004 Annual
Posted:

Cloud Platform Engineer (DV Security Clearance)

London, UK
CGI
to Methodically Find Faults and perform Root Cause Analysis • Able to evaluate multiple courses of action, achieving goals by non-standard means if necessary • System Regression • Protocol Analysis • Load Testing • Availability and Resilience Optimisation • Lockdowns and Basic Penetration Testing Technologies • Operating Systems and Virtualisation (Windows and Linux) • Infrastructure as Code and Operational Automation (e.g. Terraform, Ansible) • Message More ❯
Employment Type: Full-time
Posted:

Tenable Nessus Engineer

Knutsford, Cheshire, North West, United Kingdom
Experis
controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯
Employment Type: Contract
Rate: £600 - £660 per day
Posted:

Tenable Nessus Engineer

Warrington, Cheshire, UK
Experis
controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯
Posted:

Digital Network Exploitation Analyst/DNEA (Multiple Levels) with Security Clearance

Annapolis Junction, Maryland, United States
Weeghman & Briggs
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Employment Type: Permanent
Salary: USD 121,900 Annual
Posted:
Penetration Testing
10th Percentile
£44,950
25th Percentile
£53,750
Median
£67,500
75th Percentile
£79,500
90th Percentile
£95,000