Experience with signal or intelligence-specific tools or databases for ELINT or telemetry Experience with programming or scripting for automation or forensics using languages such as Python Experience with penetrationtesting tools Knowledge of IT logging best practices Knowledge of log or data querying tools such as Splunk Ability to create network diagrams utilizing tools like Micro sof More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Boulder, Colorado, United States Hybrid / WFH Options
Lockheed Martin
and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings. Basic Qualifications: Demonstrable knowledge of cyber concepts, penetrationtesting methods, vulnerabilities, information assurance, and security methodology. Familiarity with Linux and Windows operating systems. Must have a current Top Secret clearance. Desired Skills: Experience with DoD cybersecurity More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
threats and vulnerabilities to the ISSO. Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals. Review reports from static code analysis, Pen Testing, and Scanning Results. Review network, data flow, org charts and etc for potential vulnerabilities related to processes or personnel. QUALIFICATIONS Bachelor's Degree in Information Technology, Cybersecurity, Data Science More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
to join our team in Austin, TX. The ideal candidate should have experience in automated red-teaming solutions, prompt engineering, and LLM applications, along with hands-on knowledge in penetration testing. Key Responsibilities: Develop and implement AI/ML models using Python. Work with automated red-teaming solutions like PyRIT, Garak, and Giskard. Optimize and fine-tune Large Language … Models (LLMs) for various applications. Implement and enhance Retrieval-Augmented Generation (RAG) systems. Conduct penetrationtesting to assess security vulnerabilities. Collaborate with cross-functional teams to integrate AI solutions into business processes. Stay updated with the latest advancements in AI, cybersecurity, and red-teaming tools. Required Skills & Qualifications: Strong proficiency in Python development and coding. Experience in prompt … engineering and working with LLM applications. Knowledge of automated red-teaming tools like PyRIT, Garak, and Giskard (preferred Hands-on experience in penetration testing. Familiarity with cybersecurity best practices. Strong problem-solving and analytical skills. Excellent communication and collaboration abilities. Preferred Qualifications: Experience with cloud-based AI/ML deployments. Understanding of ethical hacking methodologies. Prior experience in security More ❯
architecture and solution design Strong understanding of security standards and regulations (e.g. NCSC, ISO, NIST, PCI, GDPR) Background in application architecture, software development, or infrastructure architecture Experience with security testing tools and techniques Familiarity with CI/CD pipelines and continuous security practices Knowledge of network security (OSI, TCP/IP), web application security (OWASP), and cryptographic controls (PKI … a strong understanding of client engagement and delivery dynamics Desirable Experience Identity management and authentication/authorization patterns Involvement in governance, risk, compliance, operational security, and secure user management Penetrationtesting certifications (e.g. OSCP, CREST, TIGER or equivalent) Active participation in knowledge sharing and community engagement Benefits Competitive salary and comprehensive benefits package Flexible working arrangements Opportunities to More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
A Senior Expert CNO Software Engineer does work that requires a highly skilled individual with expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge … Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetrationtesting - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
A Senior Expert CNO Software Engineer does work that requires a highly skilled individual with expertise in computer network operations, programming, and analysis. Key responsibilities include designing, developing, and testing software applications, as well as analyzing and troubleshooting complex computer networks. Ideally you'll have experience with programming languages such as Java, C++, and Python, as well as knowledge … Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetrationtesting - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible More ❯
years in Cyber Security roles Defence Experience: A solid background in working on defence-related projects. Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. PenetrationTesting Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. More ❯
Computer Futures - London & S.E(Permanent and Contract)
years in Cyber Security roles Defence Experience: A solid background in working on defence-related projects. Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. PenetrationTesting Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols - JSP453 . More ❯
years in Cyber Security roles Defence Experience: A solid background in working on defence-related projects. Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. PenetrationTesting Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. More ❯
years in Cyber Security roles Defence Experience: A solid background in working on defence-related projects. Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. PenetrationTesting Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols - JSP453 . More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
in computer or information systems design/development/analysis. In addition, it may also include: Engineering hardware and/or software Programming Computer/network security Vulnerability analysis Penetrationtesting Computer forensics Information assurance Systems engineering and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
to perform security assessments in search of vulnerabilities and identify mitigations. Conduct vulnerability assessments on web applications, networked devices, standalone software products, and other technologies as assigned using the penetrationtesting life cycle. Qualifications: • Offensive Security Certified Professional a must • DoD 8570 IAT Level II certification (Security+ or equivalent). • Intermediate knowledge of Linux and Windows internals. • Thorough More ❯
progress Conduct sophisticated exploitation activities against complex targets, leveraging zero-day vulnerabilities, reverse engineering, and custom payload development Support and execute offensive cyber operations, including but not limited to, penetrationtesting, red teaming, and advanced cyber threat emulation Experience with APTs: Demonstrated experience in tracking, analyzing, and mitigating Advanced Persistent Threats Programming Skills: Proficiency in programming/scripting More ❯
progress Conduct sophisticated exploitation activities against complex targets, leveraging zero-day vulnerabilities, reverse engineering, and custom payload development Support and execute offensive cyber operations, including but not limited to, penetrationtesting, red teaming, and advanced cyber threat emulation Experience with APTs: Demonstrated experience in tracking, analyzing, and mitigating Advanced Persistent Threats Programming Skills: Proficiency in programming/scripting More ❯
progress Conduct sophisticated exploitation activities against complex targets, leveraging zero-day vulnerabilities, reverse engineering, and custom payload development Support and execute offensive cyber operations, including but not limited to, penetrationtesting, red teaming, and advanced cyber threat emulation Experience with APTs: Demonstrated experience in tracking, analyzing, and mitigating Advanced Persistent Threats Programming Skills: Proficiency in programming/scripting More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
Senior Security Engineer you will implement and maintain robust security systems and protocols across the company's IT infrastructure, conducting risk assessments and vulnerability scans, mitigating vulnerabilities identified in penetrationtesting and implementing preventative measures to protect against cyber threats with a focus on WAF, IDS, IPS, Windows Security and Palo Alto firewalls. You also manage the 3rd More ❯
london, south east england, united kingdom Hybrid / WFH Options
Client Server
Senior Security Engineer you will implement and maintain robust security systems and protocols across the company's IT infrastructure, conducting risk assessments and vulnerability scans, mitigating vulnerabilities identified in penetrationtesting and implementing preventative measures to protect against cyber threats with a focus on WAF, IDS, IPS, Windows Security and Palo Alto firewalls. You also manage the 3rd More ❯
of information assurance concepts, operations, and tools Bachelor's Degree TS/SCI clearance Requirements/Abilities: Experience requirements may include: RMF, COOP, disaster recovery, contingency planning, Vulnerability assessments, penetrationtesting, Security assessments, Web Application Security Program, web application scanning, web filtering, trusted sites, web site certifications, Sharepoint and Intelink Site administration, IA Complaince and reporting, IA Training More ❯
and DevOps Containerization. We also provide customer solutions in the areas of CND, CNE, and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, PenetrationTesting, Threat Hunting, and Preventing Advanced Persistent Threat. More ❯