of information assurance concepts, operations, and tools Bachelor's Degree TS/SCI clearance Requirements/Abilities: Experience requirements may include: RMF, COOP, disaster recovery, contingency planning, Vulnerability assessments, penetrationtesting, Security assessments, Web Application Security Program, web application scanning, web filtering, trusted sites, web site certifications, Sharepoint and Intelink Site administration, IA Complaince and reporting, IA Training More ❯
UK-based organisation and multi award winning provider of data protection, cyber security and other IT solutions. They specialise in delivering cutting-edge services ranging from cyber-awareness training, penetrationtesting, and compliance and risk management. They offer a state-of-the-art data-protection solution that combines leading software, secure storage, and cloud recovery capabilities. Key Skills More ❯
UK-based organisation and multi award winning provider of data protection, cyber security and other IT solutions. They specialise in delivering cutting-edge services ranging from cyber-awareness training, penetrationtesting, and compliance and risk management. They offer a state-of-the-art data-protection solution that combines leading software, secure storage, and cloud recovery capabilities. Key Skills More ❯
Employment Type: Full-Time
Salary: £65,000 - £70,000 per annum, Inc benefits, OTE
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
Experience coordinating with other military units besides the one assigned to or multiple clients your organization is supporting • TS/SCI Clearance required Additional Qualifications • Experience with Cyberspace Operations, PenetrationTesting, or Cybersecurity • DoD recognized technical certifications • Strong verbal and written communication skills Clearance: Applicants selected will be subject to a security investigation and may need to meet More ❯
based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetrationtesting, security operations center analysis, defensive cyber operations, or offensive cyber operations. - Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or More ❯
cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed. Successful candidates may also have experience programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Required Experience: Level 3: At least 8 years demonstrated experience within the Department of More ❯
make the most out of your career. You'd like to do this Computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Network or system administration. Use information collected from a variety of sources (e.g., intrusion detection systems, firewalls, network More ❯
Relevant experience must be in computer or information systems design/development. Experience may also include hardware and/or software engineering, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance and/or system engineering. Compensation Range: $69,396.84 - $152,673.05 _ Compensation ranges encompass a total compensation package and are a general guideline More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Circle Group
or related field Desirable Existing security clearance (Secret or above) Knowledge of anti-reversing techniques, implants, and advanced threat emulation Proficiency in multiple architectures (e.g. x86, ARM) Background in penetrationtesting or red team work Package & Benefits Up to £135,000 base salary (or equivalent local currency) Health insurance, generous pension, bonus, and 25+ days holiday Fully remote More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
or related field Desirable Existing security clearance (Secret or above) Knowledge of anti-reversing techniques, implants, and advanced threat emulation Proficiency in multiple architectures (e.g. x86, ARM) Background in penetrationtesting or red team work Package & Benefits Up to £135,000 base salary (or equivalent local currency) Health insurance, generous pension, bonus, and 25+ days holiday Fully remote More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Circle Group
or related field Desirable Existing security clearance (Secret or above) Knowledge of anti-reversing techniques, implants, and advanced threat emulation Proficiency in multiple architectures (e.g. x86, ARM) Background in penetrationtesting or red team work Package & Benefits Up to £135,000 base salary (or equivalent local currency) Health insurance, generous pension, bonus, and 25+ days holiday Fully remote More ❯
systems, application behaviors, and network traffic analysis Nice to Have: Experience in an Agile development and DevOps environment Familiarity with container technologies such as Kubernetes and Docker Knowledge of penetrationtesting, red team operations, or defensive cyber security Experience utilizing and developing with Splunk Experience with Nutanix About us: We are an experienced advanced analytic development company providing More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetrationtesting, security operations center analysis, defensive cyber operations, or offensive cyber operation Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or More ❯
path to enhanced cybersecurity and compliance. You work side by side with your client, providing advisory and support to address challenges with precision and confidence. With our expertise in penetrationtesting , risk assessments , and independent OT security assessments, you empower your client to achieve exceptional cyber resilience. From securing industrial control systems to safeguarding critical processes, your efforts More ❯
of computer systems, network architectures, policies and procedures, applications, and/or facilities. Knowledge of or experience with creating/maintaining adversary emulation tool-sets. Knowledge of Red Teaming, penetrationtesting, and/or exploiting technical and human based security vulnerabilities. Counter Intelligence or Human Intelligence (HUMINT) experience. Experience with photography of any type. What you can expect More ❯
week JCAC course will count as 6 months of experience). You could also have this: Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. SALARY RANGE: $90,000 to $157,000 The BlueHalo, an AV Company, pay range More ❯
Licenses and Certifications are desired. Preferred Licenses and Certifications Current industry certifications from security organizations (for example CISSP, GIAC certifications, GPEN , C EH (M) , OSCP, (or other vendor agnostic PenetrationTesting security certification), CHFI, SSCP, CND (or other vendor agnostic defensive security certification such as Security +), CSA (Certified SOC Analyst), CTIA, CCSP (ISC2, Cloud Security Alliance, or More ❯
returns. Can place appropriate weight on prevailing (sometimes conflicting) evidence. Support and manage budget Responsibility Responsibility of information security incident management Responsibility for security assessments and assurance activities (e.g. penetrationtesting) and when to use them. Oversee and management of security compliance management and reporting in relation to any relevant regulatory or legal requirements Operational responsibility of management More ❯
next phase of growth. Since 1986, Autodata has supported mid-market organisations (200 - 10,000 users), evolving from its DEC OpenVMS roots to deliver cutting-edge services such as penetrationtesting, compliance and risk management, cyber awareness training, and our flagship Cloudlake Data Protection Solution , a powerful enterprise-grade platform that combines leading software, secure storage, and cloud More ❯
returns. Can place appropriate weight on prevailing (sometimes conflicting) evidence. Support and manage budget Responsibility Responsibility of information security incident management Responsibility for security assessments and assurance activities (e.g. penetrationtesting) and when to use them. Oversee and management of security compliance management and reporting in relation to any relevant regulatory or legal requirements Operational responsibility of management More ❯
programmatic use of APIs Experience working with containers at a technical level Experience leveraging interfaces and protocols such as I2C, JTAG, UART, SPI, USB, and Ethernet Desired: Experience with penetrationtesting or threat hunting Experience with digital forensics tools such as (FTK, Autopsy, EnCase) Experience with binary analysis tools and techniques such as Ghidra Familiarity with Android OS More ❯
such as: A+CE, CCNA-Security, CND, Network+CE, SSCP Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance and/or systems engineering. Additionally, must have experience in network or system administration. Strong Linux experience Experience in systems/network administration More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetrationtesting - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. Why Join Us: Your Health, Your Wealth, Your Life Our flexible More ❯
Writing and maintaining documentation on SRE processes and policies Recommending and implementing ways of driving operational efficiency and driving down our cost to run, without impacting service Assisting in penetrationtesting for Cloud through liaising with our provider, providing technical details, and environment setup Incident management Here's what we're looking for: Experience Strong collaboration skills Launching More ❯