on current platform(s). - Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) - Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. - Develop and maintain security incident response plans and procedures. - Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. - Deploy and manage machines More ❯
Full Scope Polygraph Clearance Status: Must be Current JOB DESCRIPTION: We are looking for someone who is well versed in devops, linux system administration and has a background in penetrationtesting and/or systems engineering to assist penetration testers with automating tasks, creating virtual infrastructure and assisting in performing tests in a virtual environment. JOB SUMMARY More ❯
S citizenship required. Travel is up to 20% Desired Skills/Qualifications IAT level II/III Understand and be well versed in common cyber threat terminology, vulnerability, and penetration test principes and methodologies. Possess basic knowledge of cyber incident and response forensics and related current events Familiarity with log analysis packet analysis OSI Model, Network Architectures, NISTS DIACAPS … and Information Operations threat intelligence activities including the collection of and tracking threat actors digital forensics incident response and threat hunting methodologies Experience performing attack analysis or Red Team penetrationtesting against operational computer networks including experience in Windows Security, Network Security, Linux/Unix Security, Database security, or Mainframe Security. Knowledge of common computer/network infections More ❯
will support multiple RMF accreditation efforts and will perform tasks that include determining DoD requirements, hardware/software configuration management (to include baseline configuration), risk assessments/vulnerability assessments, testing and documenting security controls, and ensuring overall compliance with DoD Cybersecurity policies. The ideal candidate will have experience working as an ISSO or security relevant field and must be … vulnerability, non-compliance with established cybersecurity standards and regulations, and recommend mitigation strategies to maintain operational security posture for the boundary systems • Conduct risk analyses from vulnerability, compliance scans, penetrationtesting results, and/or other audit activities • Create and maintain Plan of Action and Milestones (POA&Ms), System Security Plans (SSPs), Security Control Traceability Matrices (SCTMs), Standard More ❯
Engineer will have first-class scoping and planning skills. The IT Project Engineer will host security consultations and conduct vulnerability assessments. The IT Project Engineer will oversee and direct PenetrationTesting exercises. The IT Project Engineer will be familiar with Cyber Essentials, Microsoft Copilot and PCI-DSS. The IT Project Engineer will be network-savvy. Think firewalls, switches More ❯
Engineer will have first-class scoping and planning skills. The IT Project Engineer will host security consultations and conduct vulnerability assessments. The IT Project Engineer will oversee and direct PenetrationTesting exercises. The IT Project Engineer will be familiar with Cyber Essentials, Microsoft Copilot and PCI-DSS. The IT Project Engineer will be network-savvy. Think firewalls, switches More ❯
Engineer will have first-class scoping and planning skills. The IT Project Engineer will host security consultations and conduct vulnerability assessments. The IT Project Engineer will oversee and direct PenetrationTesting exercises. The IT Project Engineer will be familiar with Cyber Essentials, Microsoft Copilot and PCI-DSS. The IT Project Engineer will be network-savvy. Think firewalls, switches More ❯
london (city of london), south east england, united kingdom
Mongoose Gray
Engineer will have first-class scoping and planning skills. The IT Project Engineer will host security consultations and conduct vulnerability assessments. The IT Project Engineer will oversee and direct PenetrationTesting exercises. The IT Project Engineer will be familiar with Cyber Essentials, Microsoft Copilot and PCI-DSS. The IT Project Engineer will be network-savvy. Think firewalls, switches More ❯
Engineer will have first-class scoping and planning skills. The IT Project Engineer will host security consultations and conduct vulnerability assessments. The IT Project Engineer will oversee and direct PenetrationTesting exercises. The IT Project Engineer will be familiar with Cyber Essentials, Microsoft Copilot and PCI-DSS. The IT Project Engineer will be network-savvy. Think firewalls, switches More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom Hybrid / WFH Options
Tank Recruitment
initiatives. Key Responsibilities Develop and execute an information security strategy and roadmap aligned with business goals. Lead on governance, compliance, and audit processes across the organisation. Manage incident response, penetrationtesting, and risk assessments. Support secure software development and supplier risk management. Promote security awareness and report regularly to senior leadership on risk posture. Skills & Experience Required Previous More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
actors, and exploit techniques Mentor junior team members and contribute to tooling, methodology, and lab development Required Skills & Experience 3+ years' experience in red teaming, offensive security, or advanced penetrationtesting Strong knowledge of attacker frameworks (e.g., MITRE ATT&CK, NIST adversary simulation guidelines) Highly proficient with red team tools and techniques (e.g., Cobalt Strike, Mimikatz, Sliver, BloodHound More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Security, Software Engineering, Information Assurance, or Computer Security) Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance and/or system engineering. Must have experience in network or system administration Compensation Range: $101,768.87 - $223,891.52 _ Compensation ranges encompass a More ❯
Chippenham, Wiltshire, England, United Kingdom Hybrid / WFH Options
Artis Recruitment
both technical teams and senior stakeholders. Desirable Skills 3CX VoIP solutions Email security and filtering (Mimecast, Barracuda) SonicWALL appliances Azure Site Recovery SQL Server, Power BI, and Data Visualisation Penetrationtesting or vulnerability scanning experience Project management appreciation Qualifications Required: Microsoft Certified: Azure Administrator Associate (AZ-104) Microsoft Certified: Azure Solutions Architect Expert (AZ-305) Preferred: Azure Network More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
and procedures Experience with computer programming languages, including PHP, Python, SQL, C++, Perl, or Java Experience with SIEM and Endpoint tools, including Splunk, Defender, QRadar, and ArcSight Experience with penetrationtesting TS/SCI clearance with a polygraph CEH and Security+ or CSA+ Certification, and GIAC Cyber Threat Intelligence (GCTI) Certification Clearance: Applicants selected will be subject to More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
authentication, system compatibility, and internet protocols. Implement security measures, governance, risk strategies, compliance practices, and the Risk Management Framework (RMF). Perform comprehensive cybersecurity assessments including joint vulnerability and penetrationtesting, supply chain risk evaluations, and security examinations of software/hardware. Utilize tools like Enterprise Mission Assurance Support Service for RMF-related certification activities. Required Education/ More ❯
/SCI Level clearance (must have). Preferred Experience: Experience with Cyberspace Operations Knowledge of a variety of ground-based EW and CEMA systems Knowledge of technical Red Teaming, penetrationtesting, and exploiting technical network vulnerabilities What you can expect from us: Real opportunity for career growth in an environment where your achievements will be celebrated Constant collaboration More ❯
experience with network exploitation Nice If You Have: Experience with dataflow and signals intelligence architecture Experience with programming languages for scripting and automation, including Python or C++ Experience with penetrationtesting tools Knowledge of ports, protocols, and common network configurations Knowledge of IT logging best practices Network+, Security+, CEH, CCNA, or GPEN Certification Clearance: Applicants selected will be More ❯