to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
Community; • documentation of completion of at least one of the following courses: Windermere, RIOT, FORGE, Advanced Cyber Operations Course - Procedures (AOC-P), Offensive Security Certified Professional (OSCP), GIAC Expert Penetration Tester (GXPN), or Zero Point Security Certified Red Tram Operator (CRTO); • experience operating in an agile development environment; • experience with container technologies, such as Kubernetes and Docker; • experience in … a fast-paced environment with flexible customer requirements; • knowledge of penetrationtesting or red team operations; and • a Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, Cybersecurity, or Information Systems. LEAD Endeavors is a defense intelligence and cyber security analysis and solutions company. Our solutions aid the nation's defense industry in creating offensive and defensive More ❯
based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetrationtesting, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or … software exploit development. In addition, desired skills/certifications are: o Offensive Security Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM) Security Clearance Requirement: An active Top Secret SCI security clearance is required for this position. This position is part of our Federal Solutions team. The Federal Solutions segment More ❯
and adhered to. Work with stakeholders to ensure that technical security patterns, standards, and sub-standards are developed and maintained. Lead and further develop and mature our extensive Pen testing & other testing programmes. Undertake assurance reviews and assessments, including 3rd Parties, new technical solutions and processes, producing relevant recommendations and reporting. Understand the business and information risk context … required. Ensure compliance with company and other relevant standards/regulations at all times. Experience & Knowledge: Extensive Information & IT Cyber Security experience. Experience of maturing extensive Pen test & other testing programmes. Proficiency in technical security controls and frameworks, including experience and proficiency in cloud security. Experience and expertise in Azure environment security, vulnerability management, and associated processes. Detailed knowledge More ❯
delivering, and driving the security of our mobile platform. The key aspect of this role is the design and delivery of a world-class security framework, including associated services (penetrationtesting, research, consultancy etc.). What we need from you/essential skills & experience: Experience of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular … reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and automation frameworks. Have deep knowledge and experience using the mobile security tools. Good More ❯
delivering, and driving the security of our mobile platform. The key aspect of this role is the design and delivery of a world-class security framework, including associated services (penetrationtesting, research, consultancy etc.). What we need from you/essential skills & experience: Experience of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular … reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and automation frameworks. Have deep knowledge and experience using the mobile security tools. Good More ❯
delivering, and driving the security of our mobile platform. The key aspect of this role is the design and delivery of a world-class security framework, including associated services (penetrationtesting, research, consultancy etc.). What we need from you/essential skills & experience: Experience of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular … reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and automation frameworks. Have deep knowledge and experience using the mobile security tools. Good More ❯
delivering, and driving the security of our mobile platform. The key aspect of this role is the design and delivery of a world-class security framework, including associated services (penetrationtesting, research, consultancy etc.). What we need from you/essential skills & experience: Experience of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular … reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and automation frameworks. Have deep knowledge and experience using the mobile security tools. Good More ❯
london (city of london), south east england, united kingdom
Bonhill Partners
Role: Red Team Operator Rate: TBC Location: London, City. Contract length: 5 months -> Perm Conversion Requirements: 3+ years of experience in offensive security, including red teaming and penetrationtesting Strong understanding of the MITRE ATT&CK framework and threat emulation methodologies Proficiency in offensive tools (Cobalt Strike, Sliver, Metasploit, etc.) and custom payload development Experience with evasion techniques More ❯
cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Provides DevOps solutions enabling software quality assurance for vulnerability research, reverse engineering, penetrationtesting (red/blue teams), and develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge. of subject matter (hardware, software, networks, cloud, etc. More ❯
team Our team isaccountable for security within the mobile channel. Weprovide a suite of mobile security components,that provides an all-round security posture in mobile appsincluding associated services (penetrationtesting, obfuscation, consultancy etc.). Our mission is tobuild a scalable, adaptable, and proactive approach to securing customers mobile apps, enabling mobile engineers across the bank to operate More ❯
team Our team isaccountable for security within the mobile channel. Weprovide a suite of mobile security components,that provides an all-round security posture in mobile appsincluding associated services (penetrationtesting, obfuscation, consultancy etc.). Our mission is tobuild a scalable, adaptable, and proactive approach to securing LBGs mobile apps, enabling mobile engineers across the bank to operate More ❯
and Android internal processing and kernels (OS and apps) DESIRED QUALIFICATIONS Familiarity with Android OS and mobile device debugging techniques Experience analyzing APK files Experience in threat hunting or penetrationtesting Experience with electrical hardware and circuit board analysis Proficient with benchtop equipment: Oscilloscopes Signal/power analyzers Multimeters Experience performing micro-soldering Experience with unmanned systems such More ❯
and DevOps Containerization. We also provide customer solutions in the areas of CND, CNE, and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, PenetrationTesting, Threat Hunting, and Preventing Advanced Persistent Threat. More ❯
You will also lead on third-party supply chain reviews, prepare the business for certifications, and run engaging training sessions to keep compliance front of mind! You’ll manage penetrationtesting with external providers, support IT audits, and investigations, and work closely with internal teams to identify and close compliance gaps. Ideally experience in OT – Operational technology environments. More ❯
network-based forensics, cyber incident response, cyber-criminal investigations, intrusion detection/analysis, and designing countermeasures and mitigations for programming language weaknesses and vulnerabilities. Advanced cyber red teaming, network penetrationtesting, security operations center analysis, defensive and offensive cyber operations. Malware development and analysis, including binary disassembly, binary decomplication, dynamic analysis, and network/communication protocol analysis. Software More ❯
APIs. Experience working with containers at a technical level. Experience leveraging interfaces and protocols such as I2C, JTAG, UART, SPI, USB, and Ethernet. DESIRED SKILLS AND EXPERIENCE: Experience with penetrationtesting or threat hunting. Experience with digital forensics tools such as (FTK, Autopsy, EnCase). Experience with binary analysis tools and techniques such as Ghidra. Familiarity with Android More ❯
page: VORPAL Jobs . Qualifications: Required: An active TS/SCI with Poly clearance University Degree (BA/BS) or equivalent experience Experience of operations management processes Familiar with PenetrationTesting life cycle Strong written communication Familiar with variety of Computer Operating Systems Desired : Experience with Kali Linux tools This position is contingent on funding and may not More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in Vulnerability Research, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer More ❯
Leicester, Leicestershire, East Midlands, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
cycles, QA, CI/CD, and DevOps . Technical knowledge: Development : C# , JavaScript, JSON, GitHub workflows Platform : Azure, Microsoft stack Data : CRM data models & integration Infrastructure : Security, cyber, pen-testing, scalable environment If this role sounds of interest and you would like to know more, do not hesitate to contact me on Reasonable Adjustments: Respect and equality are core More ❯
Reston, Virginia, United States Hybrid / WFH Options
SOSi
excel skills are preferred. Experience identifying system failures, documenting issues objectively, and developing proactive solutions. Experience briefing senior-level Client managers. Preferred Qualifications Expertise in technical operations, including pen testing and PCAP analysis. Experience managing administrative aspect of operations, including budgets, approvals, and financial paperwork. Strong PowerPoint skills, including preparing diagrams of system logic and translating complex topics into More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯