or signals intelligence analysis Nice If You Have: Experience with dataflow and signals intelligence architecture Experience with programming languages for scripting and automation, including Python or C++ Experience with penetrationtesting tools Knowledge of ports, protocols, and common network configurations Knowledge of IT logging best practices Bachelor's degree Network+, Security+, CEH, CCNA, or SANS Certification Clearance: Applicants More ❯
client needs. Conduct technical risk assessments and recommend appropriate mitigations. Produce high-quality security documentation including RMADS, SyOPs, and Security Architecture Documents. Advise on suitable cyber assessment methods, including penetrationtesting and vulnerability analysis. Provide assurance on the effective implementation of cyber security controls and frameworks. Develop incident response plans and support clients during security breaches, including crisis More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Lockheed Martin
and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Basic Qualifications: Demonstrable knowledge of cyber concepts, penetrationtesting methods, vulnerabilities, information assurance, and security methodology Familiarity with Linux and Windows operating systems Must have a Secret clearance with the ability to obtain and maintain a More ❯
Herndon, Virginia, United States Hybrid / WFH Options
Lockheed Martin
and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Basic Qualifications: Demonstrable knowledge of cyber concepts, penetrationtesting methods, vulnerabilities, information assurance, and security methodology Familiarity with Linux and Windows operating systems Must have a Secret clearance with the ability to obtain and maintain a More ❯
security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they cause. - Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. - Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. - Installing security measures and operating software to protect systems and information infrastructure, including More ❯
security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including More ❯
security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including More ❯
security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
facing migration, including service discovery, assessment, planning, execution, and operations. Experience with Google Cloud products. Experience with security concepts such as encryption, identity management, access control, attack vectors, and penetration testing. Experience with networking concepts such as software-defined networking, routing, virtual private networks, load balancers, and firewalls. Technical/Communication Skills: Ability to understand, debug, and contribute to More ❯
in developing robust systems, software, and cloud environments while overseeing operations and maintenance for essential systems. Your responsibilities will include offering technical expertise in the design, development, implementation, and testing of customer tools and applications. Operating within a DevOps framework, you will drive major project deliverables through the entire software development lifecycle, from scope and estimation to design, coding … designing and documenting microservice-based architectures Experience with relational and/or NoSQL databases Experience with distributed systems (services and databases) Strong background developing/debugging and/or testing of web applications and web services Experience with infrastructure as code (IaC) tools (e.g., Terraform, Ansible) Understanding of security best practices and tools (e.g., vulnerability scanning, penetrationtestingMore ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! Head of IT - Lead a Full-Stack Transformation More ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! CTO - Lead a Full-Stack Transformation More ❯
processes. Help proactively assess security risk through product deep dives, threat modeling, and design, architecture and implementation reviews. Review and improve existing security processes related to product assessments, pen testing, and bug bounty findings. Develop product security controls and supervising strategies to grow our threat detection capabilities. Seek opportunities for security tooling and automation. What You'll Bring 5+ … of common vulnerabilities and emerging threats. Experience with authentication and authorization standards, including OAuth and SAML, and their weaknesses. Detailed knowledge of system security vulnerabilities and remediation techniques, including penetrationtesting and the development of exploits. Experience with Cloud Computing providers like AWS, GCP, Azure. Problem solving skills to resolve problems effectively and creatively while maintaining a high More ❯
certification b. GIAC Open Source Intelligence (GOSI) c. Certified Threat Intelligence Analyst (CTIA) d. Certified Ethical Hacker (CEH) e. EC Council Certified Network Defender (CND) f. EC Council Licensed Penetration Tester- (Master) (LPT-Master) g. EC Council Certified Security Analyst (ECSA) h. EC Council Certified SOC Analyst (CSA) i. CompTIA Security+ j. EC Council Certified Cybersecurity Technician (CCT) k. … qualifying fields. Preferred Licenses and Certifications Current industry certification from one or more security organizations (for example CISSP, GIAC certifications, GPEN, C EH (M), OSCP, (or other vendor agnostic PenetrationTesting security certification), CHFI, SSCP, CND (or other vendor agnostic defensive security certification such as Security +), CSA (Certified SOC Analyst), CTIA, CCSP (ISC2, Cloud Security Alliance, or More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
Work: A CNO Software Expert does work that requires a highly skilled individual using their expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge … Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetrationtesting - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible More ❯
e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security). Relevant experience must be in vulnerability analysis, penetrationtesting, and/or computer forensics. In addition, may include computer of information systems design/development, programming, information/cyber/network security, systems engineering, and/ More ❯
machines, and related technologies with proper security controls. Perform forensic analysis of OT devices to support cyber incident response and investigation. Develop consultative OT security solutions including attack emulation, penetrationtesting, threat hunting, and deception operations. Travel to project sites to provide support of ICS networks, including management and maintenance of converged platforms, virtualization environments, networks, security platforms More ❯
San Jose, California, United States Hybrid / WFH Options
Zscaler
stakeholders including engineering, security, business teams, external assessors, federal agencies, and leadership Working knowledge and experience with the various cloud computing services (e.g., IaaS, PaaS, SaaS) Coordinating 3PAO assessments, penetrationtesting, audits, and implementing continuous monitoring programs to ensure ongoing compliance and address security findings What We're Looking for (Minimum Qualifications) 8+ years of experience in federal More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
operating in an agile development environment; • experience with container technologies such as Kubernetes and Docker; • experience in a fast-paced environment and working with flexible customer requirements; • knowledge of penetrationtesting or red team operations; and • a Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, Cybersecurity, or Information Systems. LEAD Endeavors is a defense intelligence and More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
environments, driving maturity and constant improvements to support the constantly changing threat landscape and define and monitor KPIs regarding detection, response and containment. You'll also manage 3rd party PenetrationTesting and manage key security controls, MSSPs and tolling providers. Location/WFH: There's a hybrid work from home model with three days a week in the More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
security breaches and other cybersecurity incidents Document security breaches and assess the damage they cause Work with the security team to perform tests and uncover network vulnerabilities, such as penetrationtesting Fix detected vulnerabilities to maintain a high-security standard As a Cyber Threat Intel Analyst, you will recommend best practices for IT security Installing security measures and More ❯