security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they cause. - Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. - Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. - Installing security measures and operating software to protect systems and information infrastructure, including More ❯
security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including More ❯
security breaches and other cybersecurity incidents. Document security breaches and assess the damage they cause. Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. Fix detected vulnerabilities to maintain a high-security standard. Recommend best practices for IT security. Installing security measures and operating software to protect systems and information infrastructure, including More ❯
Godalming, Surrey, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
/365 escalation team by providing cover for network related issues managed by a on-call rota (every other week) Proactive security focus and remediation of tasks highlighted by penetration testing. Cloud Operations Networ k Engineer - Requirements : Minimum of 5 years in a Network role A good level of understanding of Fortinet or Cisco Experience in maintaining a security More ❯
analyse, and evaluate security threats, vulnerabilities, risks and solutions across the organisation. Develop, advise and implement risk mitigation strategies to minimise security threats. Conduct regular security assessments, audits, and penetration testing. Undertake security threat assessments on assets across the London portfolio. Support, collaborate, and undertake taskings aligned to the wider strategy and specialist frameworks overseen by the Director of More ❯
analyse, and evaluate security threats, vulnerabilities, risks and solutions across the organisation. Develop, advise and implement risk mitigation strategies to minimise security threats. Conduct regular security assessments, audits, and penetration testing. Undertake security threat assessments on assets across the London portfolio. Support, collaborate, and undertake taskings aligned to the wider strategy and specialist frameworks overseen by the Director of More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Apacheix
technical risk assessments, recommend mitigations and able to produce a security documentation including; Security Architecture Documents, RMADS and SyOPs Advising on suitable methods of assessing cyber security e.g. Pen Testing Providing assurance on effective cyber security implementation Developing incident response plans to security breaches, and provide crisis management support to help respond to incidents, including media handling Communicating clearly More ❯
Minimum of 5 years of experience in 2 or more of the following: Cryptanalytic work in military or intelligence community organization Experience with either/or: Vulnerability assessment, pen testing, incident response, analysis networks and/or host forensics Computer Network Exploitation, Computer Network Attack - Minimum of at least 3 years of experience in 3 or more of the More ❯
Praescient Analytics has an immediate opening for a PenetrationTesting Engineer, Mid to support a DoD contract in Arlington, VA. An active security clearance and U.S. citizenship is required for this position. As a PenetrationTesting Engineer, you need experience in the following: Key Role: Perform penetrationtesting, vulnerability management, and software/system … assurance. Conduct penetrationtesting activities (e.g., reverse shell, SQL injections, social engineering, buffer overflows, trojan horses, password cracking tools and techniques, and privilege escalation). Conduct assessments of threats and vulnerabilities, assess risk, and develop and recommend appropriate mitigation countermeasures. Develop attack vectors, conduct reconnaissance, collect open-source intelligence, enumeration, and foot-printing of target platforms, networks, and … services, and develop exploit payloads and system backdoors to identify vulnerabilities or weaknesses. Required Experience/Certifications: At least 3+ years of Cyber Security or relevant Penetrationtesting experience Active Top Secret clearance or higher (Must Have) Demonstrate comprehensive mission knowledge and skills that affirms completion of all developmental training and experiences for a PenetrationTestingMore ❯
is a privately held minority owned, small-business headquarter in Fulton, MD just outside of Baltimore and Washington D.C. About the role Strategic Analytix is looking for a skilled Penetration Tester who will serve as the Subject Matter expert providing testing expertise of the Risk Management Framework. The Penetration Tester will direct and/or participate in … the testing phase of security controls assessments using specialized knowledge of network protocols, operating systems, architectures, equipment, services, and standards. What you'll do Penetration Tester Requirements Perform vulnerability and penetrationtesting using a wide variety of tools. Research and evaluate emerging technologies relevant to information systems security; interpret agency specific and federal security regulations. Perform … both network and application-level testing using established testing protocols and methods. Qualifications Clearance Level TS/SCI level clearance with a Full Scope Polygraph. Skill Level 3: Experience: Eight (8) experience of related work experience as a Penetration Tester performing both network and application-level testing using established test protocols and methods. Education: A Bachelor More ❯
to work in a business where you stand to work alongside some very talented testers? CND are working with a boutique Cyber Security consultancy who are focused on the PenetrationTesting market. What makes them stand out? They are not interested in flashy marketing and would never be caught trying to pass off a Nessus scan as a … Penetration Test. The business has been built on delivering excellent testing and reports as well as ensuring that clients see the real benefits of their testing outputs. The company have an office in Cheltenham however you are welcome to work where is best for you. Key Responsibilities Lean into non-CHECK work where necessary. Work with the … team to flesh out technical input as needed. Deliver quality reports to customers. Stay up to date with industry trends and new attack methods. Take a broad approach to testing, working on INF, APP, Mobile, AD, or Cloud tests. Currently holds a CHECK equivalency certification. Eligibility to hold or currently hold clearance. Experience working with Linux and Windows OS. More ❯
BluOmega is looking for a Top Secret Cleared Penetration Tester to join our Cyber Solutions Practice in Atlanta, Ga and support a federal customer. Qualified candidates should have experience in software assurance, penetrationtesting with a range of automated tools, security patch management, secure cloud, and hybrid engineering and possess an active Top Secret. Responsibilities: • Perform penetrationtesting, software assurance, and vulnerability assessment in support of HHS customers. • Interpret penetrationtesting results to identify and recommend corrective actions and/or mitigation strategies. • Produce and deliver reports on individual and enterprise software assurance efforts, working with service providers and individual programs/systems. Deliverable: Software Assurance Reports. • Identify and address security implications during … participants from other organizations to integrate information assurance and cybersecurity needs and practices on a continuous basis throughout Agile development activities including, but not limited to: requirements, design, implementation, testing, and delivery of new IT solutions, applications, services, and systems, or updating and enhancing existing ones. • Perform and document vulnerability assessments of Government-identified HHS systems (Deliverable: Vulnerability Assessment More ❯
This position is contingent upon funding with an expected start date of December 2025 Top Secret/SCI Clearance required SRG is seeking a Red Team Penetration Tester III, you will be responsible for leading and executing complex penetrationtesting events and conducting offensive cybersecurity operations for the U.S. Government and DoD systems. You will work collaboratively … or Offensive Security Certified Expert (OSCE), or Offensive Security Exploitation Expert (OSEE), or Offensive Security Wireless Professional (OSWP) certification. Experience: • Seven (7) years of full-time professional experience conducting penetrationtesting or offensive Cyber operations in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. o Mimicking threat behavior. … Cyber Networking Certifications Cisco Certified Network Professional (CCNP) certification CCIE (Cisco Certified Internetwork Expert) CISSP (Certified Information Systems Security Professional) Seven (7) years of full-time professional experience conducting penetrationtesting or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. Mimicking threat behavior. More ❯
has grown to employ elite technical experts who have contributed to some of the world's largest technology and digital security projects. The NCSC-approved CHECK company specializes in penetrationtesting and security assessment services under the government-accredited CHECK scheme. They are currently seeking for a skilled Penetration Tester to join the growing team. This role … combination of industry-standard and in-house developed tools for security testing. Conduct manual reviews to identify issues within customer infrastructure and web applications. Perform various types of security testing, including network penetration, web application, mobile security assessments, and social engineering. Participate in red team engagements, employing creative strategies to outsmart defenders. Explore various approaches to gain unauthorized … solving capabilities. Possesses a solid understanding and fascination with fundamental concepts in operating systems and networking. Displays a keen interest in security principles and protocols. Demonstrates proven experience in penetrationtesting and/or security surveillance. Exhibits eagerness to absorb new knowledge and technologies. Programming Exposure A relevant Cyber Security certification is advantageous, e.g. (OSCP, CRT, CTM, CTL More ❯
This position is contingent upon funding with an expected start date of December 2025 Top Secret/SCI Clerance required SRG is seeking a Red Team Penetration Tester IV, you will be responsible for leading and executing complex penetrationtesting events and conducting offensive cybersecurity operations for the U.S. Government and DoD systems. You will work collaboratively … following certifications: Offensive Security Certified Expert (OSCE), Offensive Security Exploitation Expert (OSEE), or Offensive Security Wireless Professional (OSWP) certification. Experience: • Ten (10) years of full-time professional experience conducting penetrationtesting or offensive Cyber operations including demonstrated experience in the following areas: o Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. o … Cyber Networking Certifications Cisco Certified Network Professional (CCNP) certification CCIE (Cisco Certified Internetwork Expert) CISSP (Certified Information Systems Security Professional) Seven (7) years of full-time professional experience conducting penetrationtesting or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, Kali Linux, Cobalt Strike. Mimicking threat behavior. More ❯
At Instil we specialise in providing human-focused security and penetrationtesting services for web applications, cloud infrastructure and mobile applications. The Role We are looking for a Mid/Senior Penetration Tester to join our dynamic team based in Belfast. As a Pen Tester, you will be part of the delivery team, conducting penetration tests … Healthcare Life Assurance Cycle to Work Scheme Day to Day Probe & exploit security vulnerabilities in client's Infrastructure/cloud, Web Applications and Mobile Applications using a variety of penetration tests. Write detailed reports outlining vulnerabilities and providing actionable recommendations. Collaborate with clients during kick-off and discovery sessions, providing expert advice. Stay current with the latest security threats … techniques to assess and validate infrastructure and technologies, including cloud-based systems continuously incorporating new techniques into the team's methodology. Automate repetitive tasks by developing scripts to streamline testing processes. Mentor junior penetration testers and contribute to their professional development. Play a key role in enhancing existing tools, methodologies, and reports. Support pre-sales efforts by acting More ❯
Title Secure Software Assessor/Penetration Tester - Intermediate Full-Time/Part-Time Full-Time Description RiVidium Inc (dba, TripleCyber) is seeking a Secure Software Assessor/Penetration Tester who analyzes the security of new or existing computer applications, software, or specialized utility programs and provides actionable results. TASKS: Apply coding and testing standards, apply security testing … issues around steady state operation and management of software and incorporate security measures that must be taken when a product reaches its end of life. Perform integrated quality assurance testing for security functionality and resiliency attack. Perform risk analysis (e.g., threat, vulnerability, and probability of occurrence) whenever an application or system undergoes a major change. Address security implications in … capabilities and requirements. Translate security requirements into application design elements including documenting the elements of the software attack surfaces, conducting threat modeling, and defining any specific security criteria. Perform penetrationtesting as required for new or updated applications. Consult with customers about software system design and maintenance.ABILITIES: Ability to use and understand complex mathematical concepts (e.g., discrete math More ❯
Job Title: LLM Penetration Tester Location: DMV Area Clearance: TS/SCI w Full Scope Poly Employment Type: Full Time Education: Bachelor's in Cybersecurity, Information Security, or a related field Work Status: DMV Area Salary: $150,000+ Benefits: Competitive salary and bonus structure, comprehensive health insurance, 401(k) with company match, generous PTO and flexible work options. Application … Apply here or on our Careers - Metronome, or email your resume to Overview: Metronome is seeking a highly skilled and creative LLM Penetration Tester to join our AI Red Team. This role focuses on evaluating the security posture and behavioral integrity of large language models (LLMs) through the design and execution of advanced linguistic adversarial attacks. You'll be … to various attack vectors. Red-Teaming LLMs: Actively engage in red-teaming exercises, attempting to "trick" LLMs into following instructions or commands that they are designed to resist, thereby testing their guardrails and security boundaries. Behavioral Analysis: Observe and analyze LLM behavior under attack conditions, understanding how different linguistic manipulations impact their responses and security posture. Required Skills 5+ More ❯
Job Description Job Title: LLM Penetration Tester Location: DMV Area Clearance: TS/SCI w Full Scope Poly Employment Type: Full Time Education: Bachelor's in Cybersecurity, Information Security, or a related field Work Status: DMV Area Benefits: Competitive salary and bonus structure, comprehensive health insurance, 401(k) with company match, generous PTO and flexible work options. Application: Apply … here or on our Careers - Metronome, or email your resume to Overview: Metronome is seeking a highly skilled and creative LLM Penetration Tester to join our AI Red Team. This role focuses on evaluating the security posture and behavioral integrity of large language models (LLMs) through the design and execution of advanced linguistic adversarial attacks. You'll be responsible … to various attack vectors. Red-Teaming LLMs: Actively engage in red-teaming exercises, attempting to "trick" LLMs into following instructions or commands that they are designed to resist, thereby testing their guardrails and security boundaries. Behavioral Analysis: Observe and analyze LLM behavior under attack conditions, understanding how different linguistic manipulations impact their responses and security posture. Required Skills Required More ❯
cyber security career in a dynamic and supportive setting? Apply now to make an impact across diverse sectors. Key Responsibilities: Lead or support the delivery of vulnerability assessments and penetrationtesting projects Provide technical security consultancy and basic to intermediate-level training to clients across the UK and internationally Occasionally deputise for the Head of Cyber Operations Work … directly with clients to define and deliver tailored security solutions Contribute to business development through proposal writing and client engagement Skills/Must have: Strong understanding of penetrationtesting, vulnerability assessments, EDR, and endpoint protection Experience working in or with government or defence clients Previous consultancy experience with client-facing responsibilities SC clearance (or willingness to undergo clearance More ❯
Platform Infrastructure Engineer include: Deploy & manage servers & virtual machines using VMware, vCenter, Kickstart, Puppet, Foreman, & CIS-CAT Patch & maintain systems using Red Hat Satellite Server Conduct cybersecurity vulnerability assessments & penetrationtesting Develop & maintain security incident response plans Configure & manage host-based security systems Develop & implement automation scripts & tools to streamline deployments & system management Apply DevOps methodologies & support IaC … Satellite Server Experience with DevOps tools and Infrastructure as Code (IaC) Experience with monitoring/logging tools (Prometheus, Grafana, ELK, IBM NetCool, SolarWinds Experience with cybersecurity practices: vulnerability assessments, penetrationtesting, incident response Experience with network concepts: TCP/IP, routing, firewalls Preferred: Red Hat Certified Specialist in OpenShift Administration or Red Hat Certified Engineer (RHCE) or Red More ❯
Madison, AL, and Tupelo, MS. Mission: s a member of the National Geospatial-Intelligence Agency (NGA) DEFENDER Computer Network Exploitation (CNE) team, the contractor executes computer network operations via penetrationtesting and emulating Advanced Adversaries, Insider Threats, and Purple Team against NGA systems for the purpose of strengthening information system security. Cyber Vulnerability Assessment Analysts will help develop … at NGA headquarters in Springfield, VA Responsibilities: Analyze organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives. Conduct and/or support authorized penetrationtesting on enterprise network assets. Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions. Maintain knowledge of applicable … cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes). Requirements: TS/SCI clearance, subject to CI Polygraph. IAT Level 2 and Two PenetrationTesting certifications (OSCP, GPEN, GWAT, GCIH, CEH, CEH Master, GPYC, LPT, CPT, etc) DoD 8570 IAT II certification Bachelor's degree. In lieu of degree, Sec+, GICSP, Cloud+ More ❯
in developing robust systems, software, and cloud environments while overseeing operations and maintenance for essential systems. Your responsibilities will include offering technical expertise in the design, development, implementation, and testing of customer tools and applications. Operating within a DevOps framework, you will drive major project deliverables through the entire software development lifecycle, from scope and estimation to design, coding … designing and documenting microservice-based architectures Experience with relational and/or NoSQL databases Experience with distributed systems (services and databases) Strong background developing/debugging and/or testing of web applications and web services Experience with infrastructure as code (IaC) tools (e.g., Terraform, Ansible) Understanding of security best practices and tools (e.g., vulnerability scanning, penetrationtestingMore ❯
CNO support teams and CNO reach back capabilities to gain and maintain information dominance throughout Cyberspace. Will support Computer Defense Assistance Program, computer network operations planning and exercise support, penetrationtesting and network damage assessment. Required Training/Certification: Active TS/SCI clearance or higher (Must Have) Army Information Operations Planner Course (AIOPC) after employment begins Must … operations (FUOPS), an/or plans (deliberate planning using the Military Decision Making Process MDMP ). Experience working a joint environment. Desired Experience/Education: Experience with cyberspace operations, penetrationtesting or cybersecurity DoD recognized technical certifications Strong verbal and written communication skills. What you can expect from us: Real opportunity for career growth in an environment where More ❯
Current JOB DESCRIPTION: Inferno Systems is searching for Network Security Analysts to work on our red team to identify target network infrastructure and vulnerabilities. You will work closely with penetration testers and other team members to map out target networks (SIGDEV) using many different network artifacts. You will assist with identifying target objectives, understanding internal network connections and architectures … your findings. You will help scope, guide and analyze network exploitation activities and risks. You will be responsible for mapping out target networks, identifying opportunities for expansion and assisting Penetration Testers in planning out next steps. You can also assist the Penetration Testers to better hone their operational security, evade detection and find new ways to penetrate and … information and coordinate future operations. • Proven ability to communicate technical requirements to development teams and represent stakeholder equities through ongoing relationships. • Knowledge of IT defensive best practices and the penetrationtesting lifecycle DESIRED SKILLS: • Experience using scripting languages for automation, parsing data sets, and data visualization/analytics (e.g. python, perl, etc.). • Knowledge of stand-alone automated More ❯