City of London, London, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
environments, driving maturity and constant improvements to support the constantly changing threat landscape and define and monitor KPIs regarding detection, response and containment. You'll also manage 3rd party PenetrationTesting and manage key security controls, MSSPs and tolling providers. Location/WFH: There's a hybrid work from home model with three days a week in the More ❯
methods of exploitation, malware research, researching innovative tools and techniques, and manipulating code execution • Securing development environments and software through application security architecture software evaluations, web application vulnerability assessment penetrationtesting and fuzzing, malware research and vulnerability mitigation • Excellent written and verbal communication skills with the ability to successfully brief and interact with personnel at all levels of More ❯
Provides expertise in network protection needs assessment, requirements elicitation, security architecture, threat assessment, computer security, communication security, networking, security technologies, hardware and software development, test and evaluation, vulnerability assessment, penetrationtesting, and supply chain risk. Provides input to analyses of alternatives and to requirements, engineering, and risk trade-off analyses to achieve a cost-effective security architectural design More ❯
analysis, and metadata analysis. Education and Training Qualifications: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
Provides expertise in network protection needs assessment, requirements elicitation, security architecture, threat assessment, computer security, communication security, networking, security technologies, hardware and software development, test and evaluation, vulnerability assessment, penetrationtesting, and supply chain risk. Provides input to analyses of alternatives and to requirements, engineering, and risk trade-off analyses to achieve a cost-effective security architectural design More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
Desire to mentor and be mentored • Vulnerability Analysis • Knowledge of Open Source Intelligence and similar methodologies • Technical writing and presentation skills • Networking fundamentals • Familiar with Risk Management Framework (RMF) • PenetrationTesting/Red Team experience Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level: Secret Other Important More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
Desire to mentor and be mentored • Vulnerability Analysis • Knowledge of Open Source Intelligence and similar methodologies • Technical writing and presentation skills • Networking fundamentals • Familiar with Risk Management Framework (RMF) • PenetrationTesting/Red Team experience Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level: Secret Other Important More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Lockheed Martin
Desire to mentor and be mentored • Vulnerability Analysis • Knowledge of Open Source Intelligence and similar methodologies • Technical writing and presentation skills • Networking fundamentals • Familiar with Risk Management Framework (RMF) • PenetrationTesting/Red Team experience Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration. Clearance Level: Secret Other Important More ❯
years may be considered. • Degree in Network Engineering, Systems Engineering, Information Technology, or a related field. • Experience in computer or information systems design/development, programming, cybersecurity, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. • Strong Linux experience. • Experience with systems/network administration, application administration, IT support/management, and hardware installation. More ❯
Licenses and Certifications are desired. Preferred Licenses and Certifications Current industry certifications from security organizations (for example CISSP, GIAC certifications, GPEN , C EH (M) , OSCP, (or other vendor agnostic PenetrationTesting security certification), CHFI, SSCP, CND (or other vendor agnostic defensive security certification such as Security +), CSA (Certified SOC Analyst), CTIA, CCSP (ISC2, Cloud Security Alliance, or More ❯
such as: A+CE, CCNA-Security, CND, Network+CE, SSCP Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance and/or systems engineering. Additionally, must have experience in network or system administration. Strong Linux experience Experience in systems/network administration More ❯
such as: A+CE, CCNA-Security, CND, Network+CE, SSCP Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance and/or systems engineering. Additionally, must have experience in network or system administration. Required Technical Skills Strong Linux experience Experience in systems More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
develops, documents, tests, and maintains full spectrum cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Conducts vulnerability research, reverse engineering, penetrationtesting (red/blue teams), develops and integrates low-level firmware, and/or develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge More ❯
Chippenham, Wiltshire, England, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
VLANS, TCP/IP ect. Azure Qualifications (e.g. AZ-104, AZ-305, AZ-700, AZ-500, AZ-140). Desirable: Experience with filtering tools, Data (PowerBI, SQL), SonicWALL, Pen testing, VoIP and site recovery. Duties of the Azure Solutions Architect: Design and architect modern IT infrastructure solutions, focusing on Azure and Microsoft 365 technologies. Lead and end to end More ❯
Corsham, Wiltshire, South West, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
VLANS, TCP/IP ect. Azure Qualifications (e.g. AZ-104, AZ-305, AZ-700, AZ-500, AZ-140). Desirable: Experience with filtering tools, Data (PowerBI, SQL), SonicWALL, Pen testing, VoIP and site recovery. Duties of the Azure Solutions Architect: Design and architect modern IT infrastructure solutions, focusing on Azure and Microsoft 365 technologies. Lead and end to end More ❯
swindon, wiltshire, south west england, united kingdom Hybrid / WFH Options
VIQU IT Recruitment
VLANS, TCP/IP ect. Azure Qualifications (e.g. AZ-104, AZ-305, AZ-700, AZ-500, AZ-140). Desirable: Experience with filtering tools, Data (PowerBI, SQL), SonicWALL, Pen testing, VoIP and site recovery. Duties of the Azure Solutions Architect: Design and architect modern IT infrastructure solutions, focusing on Azure and Microsoft 365 technologies. Lead and end to end More ❯
systems security. Guide clients in establishing cybersecurity policies, standards, and procedures. Manage cybersecurity training & awareness services for clients from design to implementation. Understanding of security analysis, security events, and penetration testing. Soft Skills: Strong interpersonal and communication skills; experience with cross-cultural communications. Calmness and clarity of thought under pressure and ability to maintain positive attitude. Agile and flexible More ❯
improvement model for security Ensure Information Security controls are operating effectively Ensure where gaps are identified that these have remediation plans agreed and delivered Ensure effective Information Security pen testing co-ordination along with Vulnerability Security assessments Help embed security best practices throughout the business and early in projects Assist in 3rd party assurance Skills, Experience and Knowledge: Strong More ❯
improvement model for security Ensure Information Security controls are operating effectively Ensure where gaps are identified that these have remediation plans agreed and delivered Ensure effective Information Security pen testing co-ordination along with Vulnerability Security assessments Help embed security best practices throughout the business and early in projects Assist in 3rd party assurance Skills, Experience and Knowledge: Strong More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
MBDA
and internationally as well as an opportunity to work in a lab-based environment. There will also be further opportunities to develop practical cyber security skills such as "pen testing", "capability and vulnerability analysis" in the new cyber lab. Other things that this role can provide is an opportunity to engage with stakeholders, engineering teams and sub-contractors to More ❯
experience around Security, Data, Cloud, Service and Solution. You will be seeing designs through from start to finish incorporating everything from technology to solution, assurance, governance, and security (pen testing) - Not from a hands-on perspective but from a design perspective. You will need to be client facing and be able to make complex designs seem simple to customers. More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
Community; • documentation of completion of at least one of the following courses: Windermere, RIOT, FORGE, Advanced Cyber Operations Course - Procedures (AOC-P), Offensive Security Certified Professional (OSCP), GIAC Expert Penetration Tester (GXPN), or Zero Point Security Certified Red Tram Operator (CRTO); • experience operating in an agile development environment; • experience with container technologies, such as Kubernetes and Docker; • experience in … a fast-paced environment with flexible customer requirements; • knowledge of penetrationtesting or red team operations; and • a Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, Cybersecurity, or Information Systems. LEAD Endeavors is a defense intelligence and cyber security analysis and solutions company. Our solutions aid the nation's defense industry in creating offensive and defensive More ❯