Renowned for their deep technical expertise, our client brings together comprehensive capabilities across all aspects of CNO, including software development, reverse engineering, SIGINT analysis, testing, penetrationtesting, network engineering, and program management. Founded and run by engineers, their team of CNO experts makes a direct impact on our nation's security every single day. They offer an More ❯
Renowned for their deep technical expertise, our client brings together comprehensive capabilities across all aspects of CNO, including software development, reverse engineering, SIGINT analysis, testing, penetrationtesting, network engineering, and program management. Founded and run by engineers, their team of CNO experts makes a direct impact on our nation's security every single day. They offer an More ❯
Renowned for their deep technical expertise, our client brings together comprehensive capabilities across all aspects of CNO, including software development, reverse engineering, SIGINT analysis, testing, penetrationtesting, network engineering, and program management. Founded and run by engineers, their team of CNO experts makes a direct impact on our nation's security every single day. They offer an More ❯
Renowned for their deep technical expertise, our client brings together comprehensive capabilities across all aspects of CNO, including software development, reverse engineering, SIGINT analysis, testing, penetrationtesting, network engineering, and program management. Founded and run by engineers, their team of CNO experts makes a direct impact on our nation's security every single day. They offer an More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Identify, analyze, map, and/or protect against vulnerabilities, intrusions and threats to computer More ❯
Experience must be in computer or info systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Provides DevOps solutions enabling software quality assurance for vulnerability research, reverse engineering, penetrationtesting (red/blue teams), and develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge. of subject matter (hardware, software, networks, cloud, etc. More ❯
must be in computer or information systems design/development/analysis, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC will be More ❯
Bachelors Degree + 11 years of experience Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training More ❯
Bachelors Degree + 11 years of experience Relevant experience: must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military training More ❯
in computer or information systems design/development/analysis. In addition, it may also include: Engineering hardware and/or software Programming Computer/network security Vulnerability analysis Penetrationtesting Computer forensics Information assurance Systems engineering and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
years of experience and a Bachelor's degree Relevant experience: Must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
years of experience and a Bachelor's degree Relevant experience: Must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
phishing campaigns to gain internal network access. Conduct exploitation of external facing assets to gain internal network access. Conduct post-exploitation actions towards exercise objectives. Conduct on-site physical penetration assessments at various federal courthouses and other Court locations in order to obtain access to the internal network. Use custom code and/or commercial-off-the-shelf (COTS … to say direct red team operations work and not just that which is in support of red team operations). Minimum 4 years of hands-on experience with using penetrationtesting and red teaming software frameworks (Cobalt Strike, Kali, etc.) in a production environment. Minimum 4 years of experience of network technologies and protocols (OSI model, routing, building … flavors, MacOS). Minimum 4 years of experience inscripting and programming languages (Bash, C#, Ruby, Perl, Python, PHP, etc.). Minimum 4 years of social engineering and physical security penetration testing. Minimum 4 years of experience writing cybersecurity assessment reports. CRTO certification (or ability to have CRTO within 3 months of onboarding) required. OSCP and/or GPEN certifications More ❯
based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetrationtesting, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or … software exploit development. In addition, desired skills/certifications are: o Offensive Security Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM) Security Clearance Requirement: An active Top Secret SCI security clearance is required for this position. This position is part of our Federal Solutions team. The Federal Solutions segment More ❯
in computer or information systems design/development/analysis roles may include may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Excellent communication and collaboration skills to interface across NSA Strong target and content discovery More ❯
Hanover, Maryland, United States Hybrid / WFH Options
Lockheed Martin
Cyber & Intelligence's Offensive Cyber community and be at the forefront of securing some of the most advanced systems and networks out there. Our team doesn't just do penetrationtesting - we create the techniques, tools, and exploits used in world-class offensive cyber operations and defense. The Work: The Test Engineer (TE) Skill Level 2, within the … assessment, and developing and applying modeling and simulation for T&E. Additionally, the Test Engineer analyzes performance data and estimates confidence and performance, plans and executes data collection and testing, and coordinates with systems engineering and program management to inform evaluation planning. The Test Engineer must also assess operational environments and prioritize T&E objectives, as well as design … Engineering, Statistics, Engineering Management, or related discipline. May substitute four years' experience in lieu of a Bachelor's Degree. • 5+ years in conducting both component and system integration level testing on complex software products Desired Skills: • Experience testing CNO tools and capabilities • Experience with Government test and evaluation concepts related to acquisition operations • Experience with applying statistical analysis More ❯
and DevOps Containerization. We also provide customer solutions in the areas of CND, CNE, and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, PenetrationTesting, Threat Hunting, and Preventing Advanced Persistent Threat. More ❯
drive to achieve Manages and prioritises daily tasks independently Role and responsibilities: Help maintain and align cybersecurity and privacy strategy with business and regulatory needs Conduct risk, vulnerability, and penetrationtesting to address security gaps Help develop and maintain cybersecurity policies and standards Stay updated on cyber threats and enhance overall security posture Assist in managing security incidents More ❯
phishing campaigns to gain internal network access. Conduct exploitation of external facing assets to gain internal network access. Conduct post-exploitation actions towards exercise objectives. Conduct on-site physical penetration assessments at various federal courthouses and other Court locations in order to obtain access to the internal network. Use custom code and/or commercial-off-the-shelf (COTS … operations leadership experience (note this is distinct experience from the above and cannot overlap). 3. Minimum of 3 years of hands-on experience with using modifying and customizing penetrationtesting and red teaming software frameworks (Cobalt Strike, Kali, etc.) to meet operational requirements. 4. Minimum of 2 years of independently conducting every phase of a red team More ❯
analysis, and metadata analysis. Education and Training Qualifications: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
driver development. Knowledge of ARM assembly, mobile OS internals, and debugging tools. Experience with hardware interface protocols (UART, SPI, I2C). Strong foundation in cryptography, obfuscation, and secure communications. Penetrationtesting certifications (OSCP, GPEN) or experience highly desirable. Must have currrent TS/SCI with Polygraph clearance required. Security Clearance Requirement: An active Top Secret SCI w/ More ❯
hardware Experience with Test and Evaluation of PCBs, ICs, or other board level hardware Strong background in hardware, firmware, software, networks, and RF for vulnerability discovery, exploit development, and penetration testing. Knowledge of emerging technologies, threats, and security strategies. Expertise across the entire acquisition lifecycle. Ability to manage technical programs, ensuring cost, schedule, and performance deliverables are met. Working … knowledge of DoD regulations, standards, and policies regarding Acquisitions, Hardware Security, Anti-Tamper, Supply Chains, and Cybersecurity. Experience in DoD research and testing laboratories, including Systems Integration Labs (SILs), Hardware-in-the-Loop (HIL) environments, and Cybersecurity labs. RESPONSIBILITIES Provide technical direction and oversight for the Threat Development Laboratory within the Cyber Test and Evaluation Complex. Act as a More ❯
page: VORPAL Jobs . Qualifications: Required: An active TS/SCI with Poly clearance University Degree (BA/BS) or equivalent experience Experience of operations management processes Familiar with PenetrationTesting life cycle Strong written communication Familiar with variety of Computer Operating Systems Desired : Experience with Kali Linux tools This position is contingent on funding and may not More ❯