CNO support teams and CNO reach back capabilities to gain and maintain information dominance throughout Cyberspace. Will support Computer Defense Assistance Program, computer network operations planning and exercise support, penetrationtesting and network damage assessment. Required Training/Certification: Active TS/SCI clearance or higher (Must Have) Army Information Operations Planner Course (AIOPC) after employment begins Must … operations (FUOPS), an/or plans (deliberate planning using the Military Decision Making Process MDMP ). Experience working a joint environment. Desired Experience/Education: Experience with cyberspace operations, penetrationtesting or cybersecurity DoD recognized technical certifications Strong verbal and written communication skills. What you can expect from us: Real opportunity for career growth in an environment where More ❯
Current JOB DESCRIPTION: Inferno Systems is searching for Network Security Analysts to work on our red team to identify target network infrastructure and vulnerabilities. You will work closely with penetration testers and other team members to map out target networks (SIGDEV) using many different network artifacts. You will assist with identifying target objectives, understanding internal network connections and architectures … your findings. You will help scope, guide and analyze network exploitation activities and risks. You will be responsible for mapping out target networks, identifying opportunities for expansion and assisting Penetration Testers in planning out next steps. You can also assist the Penetration Testers to better hone their operational security, evade detection and find new ways to penetrate and … information and coordinate future operations. • Proven ability to communicate technical requirements to development teams and represent stakeholder equities through ongoing relationships. • Knowledge of IT defensive best practices and the penetrationtesting lifecycle DESIRED SKILLS: • Experience using scripting languages for automation, parsing data sets, and data visualization/analytics (e.g. python, perl, etc.). • Knowledge of stand-alone automated More ❯
West London, London, United Kingdom Hybrid / WFH Options
Ashdown Group
the following skills and experience: - Relevant cyber certifications - Experience in either a Cyber Analyst or Cyber Engineer role - Knowledge on SIEM and EDR tools - Experience in network audits and penetrationtesting - Infrastructure support experience - Knowledge on security frameworks More ❯
Conducts on-site evaluations - Validates the security requirements of the information system - Verifies and validates that the system meets the security requirements - Provides vulnerability assessment of the system - Coordinates penetrationtesting - Provides a comprehensive verification and validation report (certification report) for the information system - Provides process improvement recommendations - Assists the Government to draft standards and guidelines for usage More ❯
Maidstone, Kent, United Kingdom Hybrid / WFH Options
Payter B.V
Wash Station Responsibilities: Working as part of a team to design, build, and deliver sustainable, scalable, reliable, and well-tested software into secure cloud infrastructure Advocating for and implementing testing best practices across all disciplines and promoting a quality/testable mindset within the team Creating a safe environment within the team where everyone shares the responsibility for quality … and testing from the outset Helping the team understand and estimate test efforts, test dependencies during planning and refinement sessions Pairing with Software Engineers during development and code review to ensure appropriate test coverage at different levels and to avoid any duplication of efforts Ensuring our automation test framework and coverage is targeted, relevant, efficient and resilient Develop tools … for integration, regression, load, performance, and security testing Working with the team to determine the root cause of issues, for example: using logs, and databases What do we have to offer? Competitive compensation, including a discretionary bonus based on business results; Great benefits like 25 leave days plus extra monthly "wellbeing days", a travel allowance and an attractive pension More ❯
We are seeking an enthusiastic Cyber Security Consultantto join our team. Working alongside ourexperienced team of specialists, you'll be delivering offensive securityservices including digital footprint reconnaissance, social engineering,penetrationtesting and vulnerability assessments and more to high profileclients across all industries. The purpose of this role is to deliver our offensivesecurity services including digital footprint reconnaissance, socialengineering … vulnerability assessments, penetrationtesting, threat modelling,cyber-attack simulation exercises, and more to high profile clients across allindustries. The purpose of this role is to deliver our Cyber Security services across our broad range of assurance and advisory engagementsto high profile clients across all industries. We are seeking an enthusiastic Cyber Security Consultantto join our team. Working alongside More ❯
e.g., General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cyber Security, Information Technology, Information Assurance, and Information Security). Relevant experience must be in vulnerability analysis, penetrationtesting, and/or computer forensics. In addition, may include computer of information systems design/development, programming, information/cyber/network security, systems engineering, and/ More ❯
with both physical and virtual infrastructure Skilled in automating network environments using scripting languages such as Bash, PowerShell, Batch, or Python Familiar with cybersecurity tools, network configurations, and operational testing in a cyber range environment Comfortable working in a fast-paced setting with evolving customer requirements A Day in the Life Of: Configuring and automating network environments to support … systems, application behaviors, and network traffic analysis Nice to Have: Experience in an Agile development and DevOps environment Familiarity with container technologies such as Kubernetes and Docker Knowledge of penetrationtesting, red team operations, or defensive cyber security Experience with Splunk, Nutanix, and other cybersecurity tools About us: We are an experienced advanced analytic development company providing Cyber More ❯
Level 3 SVA shall possess the following capabilities: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience. Analyst should be comfortable More ❯
respond to potential threats Utilise advanced tools and techniques to analyse security data and identify patterns or anomalies that may indicate a security breach Review regular vulnerability assessments and penetrationtesting to ensure the robustness of security measures Contribute to incident response plans to address security breaches promptly and effectively About you: You will have the following experiences More ❯
software solutions targeting Android, iOS, and Windows environments. Implement cryptographic capabilities and steganography techniques to enhance software resilience. Support hardware-based software development, including modification of physical devices. Perform penetrationtesting on custom and commercial systems to validate security posture. Provide rapid prototyping and field-ready tools in support of mission operators. Qualifications: Bachelor's or Master's … development roles. Experience in reverse engineering tools (IDA Pro, Ghidra, Radare2). Strong knowledge of mobile OS internals (Android/iOS) and Windows internals. Hands-on experience with pen testing frameworks and offensive security tools (e.g., Metasploit, Cobalt Strike). Proficiency in low-level programming languages (C, C++, Assembly) and scripting (Python, Bash). Familiarity with secure coding practices More ❯
experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
experience must be in computer or information systems design/development/analysis. May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
must be in computer or information systems design/development/analysis, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
posture. - Support secure operations across a variety of platforms and technologies. CNDA Requirements - Computer or information systems design and development - Programming - Information, cyber, or network security - Vulnerability analysis and penetrationtesting - Computer forensics - Information assurance - Systems engineering Qualifications - Clearance Level: Active TS/SCI clearance with a Full Scope Polygraph required. - Hiring Levels Skill Levels 1-4 Education More ❯
certification b. GIAC Open Source Intelligence (GOSI) c. Certified Threat Intelligence Analyst (CTIA) d. Certified Ethical Hacker (CEH) e. EC Council Certified Network Defender (CND) f. EC Council Licensed Penetration Tester- (Master) (LPT-Master) g. EC Council Certified Security Analyst (ECSA) h. EC Council Certified SOC Analyst (CSA) i. CompTIA Security+ j. EC Council Certified Cybersecurity Technician (CCT) k. … qualifying fields. Preferred Licenses and Certifications Current industry certification from one or more security organizations (for example CISSP, GIAC certifications, GPEN, C EH (M), OSCP, (or other vendor agnostic PenetrationTesting security certification), CHFI, SSCP, CND (or other vendor agnostic defensive security certification such as Security +), CSA (Certified SOC Analyst), CTIA, CCSP (ISC2, Cloud Security Alliance, or More ❯
for network and security infrastructure Lead threat detection and response using tools like SIEM, Sophos MTR, and Splunk Manage Firewalls, VPNs, intrusion detection systems, and endpoint protection Conduct annual penetrationtesting and remediate vulnerabilities Support disaster recovery planning and incident response Provide BAU support and mentor junior IT staff Tech Stack & Tools: Security: Checkpoint, Cisco ISE, Zscaler, Sophos More ❯
in conjunction with the Navy tactical configuration development and associated tactical applications, applying principles and techniques of network engineering, cybersecurity engineering, and systems administration. Conduct vulnerability research, malware analysis, penetrationtesting, and reverse engineering development of computer network operations, as required. Conduct installation and integration of Commercial Off-The-Shelf (COTS) cybersecurity tools and applications and perform proof More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
a focus on mitigating vulnerabilities and ensuring the development of robust, resilient, and trustworthy hardware solutions • Guide comprehensive security assessments of hardware designs, including SoC designs, reviewing schematics, informing penetrationtesting on prototypes, and identifying potential backdoors or vulnerabilities using reverse engineering techniques • Inform the design and implementation of cutting-edge solutions to enhance hardware platform security, including More ❯
Defense Analyst. CNDAs must have experience in network or system administration. Experience with Computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Foreign Language may count toward experience requirements. Desired: Relevant Certs or Specialized Training would include (but not limited More ❯