Assurance (SwA) tools and techniques (e.g., Fortify). Knowledge of FISMA, NIST 800-53, and DoD cybersecurity policies. Experience supporting cybersecurity test events, red/blue team exercises, or penetration testing. Background in DoD systems architecture, defense communications, or mission operations is a plus. More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and recommendations for stakeholders. More ❯
background in incident response, SOC operations, and security investigations. Hands-on expertise with SIEM tools (Splunk, QRadar, Microsoft Sentinel). Deep understanding of network traffic analysis, vulnerability management, and penetration testing. Knowledge of DFIR principles, malware reverse engineering, and digital forensics. Familiarity with ITIL processes (Incident, Problem, Change). Experience with cloud platforms (AWS and/or Azure). More ❯
Navy and DoD regulations. Implement and manage security baselines for systems and applications, ensuring adherence to DoD STIGs, security requirements guides (SRGs), and other applicable security standards. Conduct security testing and evaluations to verify the effectiveness of security controls, including vulnerability scanning, penetrationtesting, and security audits. Investigate and respond to security incidents in accordance with established More ❯
cyber and space defense, space exploration, hypersonic and nuclear deterrence and warfighter readiness. Visit for more details. Responsibilities Arcfield's Cyber programs are expanding and currently in need of Penetration Tester (Pen Tester), Level 2 (Intermediate) professionals to review and evaluate customer Information Systems (IS) and recommend changes to the Government that can improve information confidentiality, integrity, and availability. … established methodologies Identify, document, and report common vulnerabilities that could be exploited Perform security-focused services to improve the security posture of customer Information Systems Execute active and passive penetrationtesting capabilities on customer IT assets, as per government policy and direction Document findings in detailed reports for inclusion in Security Assessment Reports (SARs) Support Risk Management Framework … RMF) Steps 4 and 6 processes Review and write Information System Accreditation Packages (ISAPs) and Technical Information System Security Requirements (TISSRs) Conduct approved testing and write reports following government-approved templates Complete ISAP/TISSR reports within 30 calendar days of on-site assessment completion Maintain and update report templates with government approval Demonstrate basic scripting abilities and understanding More ❯
cyber and space defense, space exploration, hypersonic and nuclear deterrence and warfighter readiness. Visit for more details. Responsibilities Arcfield's Cyber programs are expanding and currently in need of Penetration Tester (Pen Tester), Level 3 (Senior) professionals to review and evaluate customer Information Systems (IS) and recommend changes to the Government that can improve information confidentiality, integrity, and availability. … established methodologies Identify, document, and report common vulnerabilities that could be exploited Perform security-focused services to improve the security posture of customer Information Systems Execute active and passive penetrationtesting capabilities on customer IT assets, as per government policy and direction Document findings in detailed reports for inclusion in Security Assessment Reports (SARs) Support Risk Management Framework … RMF) Steps 4 and 6 processes Review and write Information System Accreditation Packages (ISAPs) and Technical Information System Security Requirements (TISSRs) Conduct approved testing and write reports following government-approved templates Complete ISAP/TISSR reports within 30 calendar days of on-site assessment completion Maintain and update report templates with government approval Demonstrate basic scripting abilities and understanding More ❯
Engineer in Huntsville, AL. Candidate must have an active Secret Clearance with eligibility to obtain a Top Secret/SCI Clearance. The Red Team Security Engineer will conduct multiple penetration tests of global customer networks, rapid development of domain or problem-specific tools that leverage identified vulnerabilities, research on the latest exploitation techniques and threat vectors, and design and … degree. Must have a CEH & CISSP Certification upon hire SPECIALIZED experience in Red Teaming, Computer Network Attack (CNA), Computer Network Exploitation (CNE), Computer Network Defense (CND), and/or penetrationtesting Ability to independently and rapidly develop tools and scripts from concept to production in a high-stress, short deadline, under-resourced environment using multiple programming languages Additional … personal project management) skills Proven ability to work effectively with management, staff, vendors, and external consultants Ability to think outside the box and emulate adversarial approaches Capable of conducting penetration tests on applications, systems and network utilizing proven/formal processes and industry standards. Capable of managing multiple penetration test engagements, from cradle to grave, at the same More ❯
II in Huntsville, AL. Candidate must have an active Secret Clearance with eligibility to obtain a Top Secret/SCI Clearance. The Red Team Security Engineer will conduct multiple penetration tests of global customer networks, rapid development of domain or problem-specific tools that leverage identified vulnerabilities, research on the latest exploitation techniques and threat vectors, and design and … degree. Must have a CEH & CISSP Certification upon hire SPECIALIZED experience in Red Teaming, Computer Network Attack (CNA), Computer Network Exploitation (CNE), Computer Network Defense (CND), and/or penetrationtesting Ability to independently and rapidly develop tools and scripts from concept to production in a high-stress, short deadline, under-resourced environment using multiple programming languages Additional … personal project management) skills Proven ability to work effectively with management, staff, vendors, and external consultants Ability to think outside the box and emulate adversarial approaches Capable of conducting penetration tests on applications, systems and network utilizing proven/formal processes and industry standards. Capable of managing multiple penetration test engagements, from cradle to grave, at the same More ❯
I in Huntsville, AL. Candidate must have an active Secret Clearance with eligibility to obtain a Top Secret/SCI Clearance. The Red Team Security Engineer will conduct multiple penetration tests of global customer networks, rapid development of domain or problem-specific tools that leverage identified vulnerabilities, research on the latest exploitation techniques and threat vectors, and design and … degree. Must have a CEH & CISSP Certification upon hire SPECIALIZED experience in Red Teaming, Computer Network Attack (CNA), Computer Network Exploitation (CNE), Computer Network Defense (CND), and/or penetrationtesting Ability to independently and rapidly develop tools and scripts from concept to production in a high-stress, short deadline, under-resourced environment using multiple programming languages Additional … personal project management) skills Proven ability to work effectively with management, staff, vendors, and external consultants Ability to think outside the box and emulate adversarial approaches Capable of conducting penetration tests on applications, systems and network utilizing proven/formal processes and industry standards. Capable of managing multiple penetration test engagements, from cradle to grave, at the same More ❯
IV in Huntsville, AL. Candidate must have an active Secret Clearance with eligibility to obtain a Top Secret/SCI Clearance. The Red Team Security Engineer will conduct multiple penetration tests of global customer networks, rapid development of domain or problem-specific tools that leverage identified vulnerabilities, research on the latest exploitation techniques and threat vectors, and design and … Team. Must have a CEH & CISSP Certification upon hire SPECIALIZED experience in Red Teaming, Computer Network Attack (CNA), Computer Network Exploitation (CNE), Computer Network Defense (CND), and/or penetrationtesting Ability to independently and rapidly develop tools and scripts from concept to production in a high-stress, short deadline, under-resourced environment using multiple programming languages Additional … personal project management) skills Proven ability to work effectively with management, staff, vendors, and external consultants Ability to think outside the box and emulate adversarial approaches Capable of conducting penetration tests on applications, systems and network utilizing proven/formal processes and industry standards. Capable of managing multiple penetration test engagements, from cradle to grave, at the same More ❯
III in Huntsville, AL. Candidate must have an active Secret Clearance with eligibility to obtain a Top Secret/SCI Clearance. The Red Team Security Engineer will conduct multiple penetration tests of global customer networks, rapid development of domain or problem-specific tools that leverage identified vulnerabilities, research on the latest exploitation techniques and threat vectors, and design and … Team. Must have a CEH & CISSP Certification upon hire SPECIALIZED experience in Red Teaming, Computer Network Attack (CNA), Computer Network Exploitation (CNE), Computer Network Defense (CND), and/or penetrationtesting Ability to independently and rapidly develop tools and scripts from concept to production in a high-stress, short deadline, under-resourced environment using multiple programming languages Additional … personal project management) skills Proven ability to work effectively with management, staff, vendors, and external consultants Ability to think outside the box and emulate adversarial approaches Capable of conducting penetration tests on applications, systems and network utilizing proven/formal processes and industry standards. Capable of managing multiple penetration test engagements, from cradle to grave, at the same More ❯
Current JOB DESCRIPTION: Inferno Systems is searching for Network Security Analysts to work on our red team to identify target network infrastructure and vulnerabilities. You will work closely with penetration testers and other team members to map out target networks (SIGDEV) using many different network artifacts. You will assist with identifying target objectives, understanding internal network connections and architectures … your findings. You will help scope, guide and analyze network exploitation activities and risks. You will be responsible for mapping out target networks, identifying opportunities for expansion and assisting Penetration Testers in planning out next steps. You can also assist the Penetration Testers to better hone their operational security, evade detection and find new ways to penetrate and … information and coordinate future operations. • Proven ability to communicate technical requirements to development teams and represent stakeholder equities through ongoing relationships. • Knowledge of IT defensive best practices and the penetrationtesting lifecycle DESIRED SKILLS: • Experience using scripting languages for automation, parsing data sets, and data visualization/analytics (e.g. python, perl, etc.). • Knowledge of stand-alone automated More ❯
Hampton, Virginia, United States Hybrid / WFH Options
RMantra Solutions Inc
HCM Developer Location: Crystal City, VA Work Schedule: Remote position, but may be required to come to the office as needed Clearance: DoD Secret Responsible for designing, developing, documenting, testing and debugging applications software and systems that contain logical and mathematical solutions. Conducts multidisciplinary research and collaborates with equipment designers and/or hardware engineers in the planning, design … in conjunction with hardware product development, for medical, industrial, military, communications, aerospace, and scientific applications, applying principles and techniques of computer science, engineering, and mathematical analysis. Conducts vulnerability research, penetrationtesting, malware analysis and reverse engineering development of computer network operations tools Duties and Responsibilities: Responsible for technical solution design, development, deployment/cutover, and implementation covering all … presents options and recommendations to obtain desired results Design, plan, test and implement remediation's which meet functional and technical specifications of a large PeopleSoft HR application Conduct Unit testing and resolve issues found in testing Meet deadlines and manage multiple, dynamic priorities Effectively communicate and demonstrate experience working in a team-oriented environment Required Qualifications: Bachelor's More ❯
Corsham, England, United Kingdom Hybrid / WFH Options
NexGen Associates
will review documents for complex systems and assuring compliance against strict standards, advising on JSP policies, producing RMADS and PIA documentation, chairing security working groups, scoping vulnerability assessments and penetrationtesting activities, this will challenge you to grow your technical knowledge as well as use your current capabilities. Main duties: Ensuring project compliance to MOD JSP Policy and More ❯
swindon, wiltshire, south west england, united kingdom Hybrid / WFH Options
NexGen Associates
will review documents for complex systems and assuring compliance against strict standards, advising on JSP policies, producing RMADS and PIA documentation, chairing security working groups, scoping vulnerability assessments and penetrationtesting activities, this will challenge you to grow your technical knowledge as well as use your current capabilities. Main duties: Ensuring project compliance to MOD JSP Policy and More ❯
analytical, communication, and stakeholder engagement skills Experience supporting cybersecurity for intelligence or defense systems Familiarity with cloud security, Zero Trust architecture, and endpoint protection solutions Background in incident response, penetrationtesting, or threat intelligence Experience implementing RMF within classified environments Join a mission-driven team advancing government communication capabilities and operational readiness. Apply today and become part of More ❯
new DoD, USSF, DIA, and DISA cybersecurity directives. Support Vulnerability Management System (VMS) processes by documenting, tracking, and closing compliance findings. Contribute to Security Test & Evaluation (ST&E) efforts, penetrationtesting, and validation of cybersecurity controls. Revalidate cyber and IA controls for accredited systems and recommend improvements to strengthen mission assurance. Assess policy changes from higher headquarters and More ❯
and system security Cybersecurity Service Providers (CSSP) Cyber Red Teams With at least 3 of the following 6 focus areas: Vulnerability Analysis Network Security Monitoring Incident Response/Forensics PenetrationTesting/Red Teaming CND Infrastructure Support CND Incident Response EDUCATION: Bachelor's degree in computer science, Information Technology, or an equivalent degree from an accredited college or More ❯
prioritization of remediation of findings. Ability to monitor network security systems, summarize results with dashboards or other tools and report to C-suite on a weekly basis. Familiarity with Penetrationtesting tools such as MITRE ATT&CK and developing remediation strategies, POAM, and implementation of the POAM. Interpersonal skills in supporting internal stakeholders, customers, and support contractors. Knowledge More ❯
manager within the areas of computer or information systems design, development, and/or analysis, including engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. • Experience writing white papers and developing presentations. • Experience in either DoD or IC organizations More ❯
premises environments New and emerging information technology (IT) and cybersecurity technologies System life cycle management principles, including software security and usability Application vulnerabilities Cryptography and cryptographic key management concepts Penetrationtesting principles, tools, and techniques Industry technologies and how differences affect exploitation/vulnerabilities Information technology (IT) supply chain security and risk management policies, requirements, and procedures Local More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
Arlington, Virginia, United States Hybrid / WFH Options
CGI
for cleared personnel, • Technical security controls: Implement, manage, and monitor security measures such as firewalls, intrusion detection/prevention systems, and access controls. • Vulnerability management: Conduct vulnerability scanning and penetrationtesting on networks and systems, and report on compliance using tools like Nessus, SCAP, and Splunk. • Secure system development: Apply security techniques and best practices to system and More ❯
Cheshire, England, United Kingdom Hybrid / WFH Options
Morgan Law
of security incidents and policy violations Assist with risk assessments and security audits Implement and maintain security standards, and guidelines Work with third-party vendors and partners on pen testing and remediation activities Support awareness campaigns to improve cybersecurity hygiene among staff Assist in the development and implementation of disaster recovery and business continuity plans. Produce reports and metrics More ❯