facing migration, including service discovery, assessment, planning, execution, and operations. Experience with Google Cloud products. Experience with security concepts such as encryption, identity management, access control, attack vectors, and penetration testing. Experience with networking concepts such as software-defined networking, routing, virtual private networks, load balancers, and firewalls. Technical/Communication Skills: Ability to understand, debug, and contribute to More ❯
in developing robust systems, software, and cloud environments while overseeing operations and maintenance for essential systems. Your responsibilities will include offering technical expertise in the design, development, implementation, and testing of customer tools and applications. Operating within a DevOps framework, you will drive major project deliverables through the entire software development lifecycle, from scope and estimation to design, coding … designing and documenting microservice-based architectures Experience with relational and/or NoSQL databases Experience with distributed systems (services and databases) Strong background developing/debugging and/or testing of web applications and web services Experience with infrastructure as code (IaC) tools (e.g., Terraform, Ansible) Understanding of security best practices and tools (e.g., vulnerability scanning, penetrationtestingMore ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! Head of IT - Lead a Full-Stack Transformation More ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! CTO - Lead a Full-Stack Transformation More ❯
processes. Help proactively assess security risk through product deep dives, threat modeling, and design, architecture and implementation reviews. Review and improve existing security processes related to product assessments, pen testing, and bug bounty findings. Develop product security controls and supervising strategies to grow our threat detection capabilities. Seek opportunities for security tooling and automation. What You'll Bring 5+ … of common vulnerabilities and emerging threats. Experience with authentication and authorization standards, including OAuth and SAML, and their weaknesses. Detailed knowledge of system security vulnerabilities and remediation techniques, including penetrationtesting and the development of exploits. Experience with Cloud Computing providers like AWS, GCP, Azure. Problem solving skills to resolve problems effectively and creatively while maintaining a high More ❯
certification b. GIAC Open Source Intelligence (GOSI) c. Certified Threat Intelligence Analyst (CTIA) d. Certified Ethical Hacker (CEH) e. EC Council Certified Network Defender (CND) f. EC Council Licensed Penetration Tester- (Master) (LPT-Master) g. EC Council Certified Security Analyst (ECSA) h. EC Council Certified SOC Analyst (CSA) i. CompTIA Security+ j. EC Council Certified Cybersecurity Technician (CCT) k. … qualifying fields. Preferred Licenses and Certifications Current industry certification from one or more security organizations (for example CISSP, GIAC certifications, GPEN, C EH (M), OSCP, (or other vendor agnostic PenetrationTesting security certification), CHFI, SSCP, CND (or other vendor agnostic defensive security certification such as Security +), CSA (Certified SOC Analyst), CTIA, CCSP (ISC2, Cloud Security Alliance, or More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
Work: A CNO Software Expert does work that requires a highly skilled individual using their expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge … Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetrationtesting - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible More ❯
and potential attacks against the systems or missions being studied. The principal level System Vulnerability Analyst shall possess the following capabilities: Candidate must have relevant experience in vulnerability analysis, penetrationtesting, and/or computer forensics. Requirements Active TS/SCI w/Polygraph security clearance is required. Information Assurance Certification may be required A Bachelor's Degree More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
machines, and related technologies with proper security controls. Perform forensic analysis of OT devices to support cyber incident response and investigation. Develop consultative OT security solutions including attack emulation, penetrationtesting, threat hunting, and deception operations. Travel to project sites to provide support of ICS networks, including management and maintenance of converged platforms, virtualization environments, networks, security platforms More ❯
San Jose, California, United States Hybrid / WFH Options
Zscaler
stakeholders including engineering, security, business teams, external assessors, federal agencies, and leadership Working knowledge and experience with the various cloud computing services (e.g., IaaS, PaaS, SaaS) Coordinating 3PAO assessments, penetrationtesting, audits, and implementing continuous monitoring programs to ensure ongoing compliance and address security findings What We're Looking for (Minimum Qualifications) 8+ years of experience in federal More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Digital Waffle
actors, and exploit techniques Mentor junior team members and contribute to tooling, methodology, and lab development Required Skills & Experience 3+ years' experience in red teaming, offensive security, or advanced penetrationtesting Strong knowledge of attacker frameworks (e.g., MITRE ATT&CK, NIST adversary simulation guidelines) Highly proficient with red team tools and techniques (e.g., Cobalt Strike, Mimikatz, Sliver, BloodHound More ❯
operating in an agile development environment; • experience with container technologies such as Kubernetes and Docker; • experience in a fast-paced environment and working with flexible customer requirements; • knowledge of penetrationtesting or red team operations; and • a Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, Cybersecurity, or Information Systems. LEAD Endeavors is a defense intelligence and More ❯
cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed. Successful candidates may also have experience programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Required Experience: Level 3: At least 8 years demonstrated experience within the Department of More ❯
Relevant experience must be in computer or information systems design/development. Experience may also include hardware and/or software engineering, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance and/or system engineering. Compensation Range: $81,583.84 - $179,484.45 _ Compensation ranges encompass a total compensation package and are a general guideline More ❯
security breaches and other cybersecurity incidents Document security breaches and assess the damage they cause Work with the security team to perform tests and uncover network vulnerabilities, such as penetrationtesting Fix detected vulnerabilities to maintain a high-security standard Recommend best practices for IT security Installing security measures and operating software to protect systems and information infrastructure More ❯
equivalent to an associate's degree. Specific Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering Completion of military training in a relevant area such as Joint Cyber Analysis Course (JCAC), Undergraduate Cyber Training More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Cybersecurity experience Strong analytical and problem-solving skills for resolving security issues Strong skills implementing and configuring networks and networks components Proven proficiency performing CCRI/vulnerability assessment/penetrationtesting on networks, databases, computer applications and IT frameworks Knowledge and understanding of DOD security regulations, DISA STIGs Expert experience in cybersecurity and evaluations Excellent knowledge of and More ❯
Conducts on-site evaluations Validates the security requirements of the information system Verifies and validates that the system meets the security requirements Provides vulnerability assessment of the system Coordinates penetrationtesting Provides a comprehensive verification and validation report (certification report) for the information system Provides process improvement recommendations Assists the Government to draft standards and guidelines for usage More ❯
of computer systems, network architectures, policies and procedures, applications, and/or facilities. Knowledge of or experience with creating/maintaining adversary emulation tool-sets. Knowledge of Red Teaming, penetrationtesting, and/or exploiting technical and human based security vulnerabilities. Counter Intelligence or Human Intelligence (HUMINT) experience. Experience with photography of any type. What you can expect More ❯
Plant Utilities background. o Industrial process, water/wastewater, nuclear, data centers, cogeneration plants, combined cooling, heating & power (CCHP) o Cooling towers, chillers, UPS, power monitoring. • Cybersecurity and or penetrationtesting experience • IT/Networking Certification (CISSP/SSCP, CEH, etc) • Familiarity with packet capture and analysis techniques; Wireshark, Netmap, Network Miner, GrassMarlin, Sceptre, Helics, IDS systems Come More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programing, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯