to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Threat Hunting … Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & ReverseEngineering Network & Endpoint Security Monitoring (EDR, IDS/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working More ❯
to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Willingness to … Fine-Tuning & Optimisation (QRadar, Splunk, Sentinel, ArcSight) Incident Response & Forensics (MITRE ATT&CK, DFIR, Log Analysis) Threat Intelligence Analysis Security Analytics & Automation (SOAR, YARA Rules, Sigma Rules) Malware Analysis & ReverseEngineering Network & Endpoint Security Monitoring (EDR, IDS/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
Learn more at Experience and Skills Some information security experience working within a Security Operations Center or Cyber Security Incident Response Teams Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security or professional certification related to Digital Forensics, Incident Response, or Ethical Hacking (e.g., GCIH, CEH, GCFE, GCFA, and CFCE). Knowledge of main concepts related … using security tools including Defender for Cloud, GuardDuty, CloudTrail, or CloudWatch. System administration on Unix, Linux, or Windows Network forensics, logging, and event management Defensive network infrastructure (operations or engineering) Vulnerability assessment and penetration testing concepts Malware analysis concepts, techniques, and reverseengineering In-depth knowledge of network and host security technologies and products (such as firewalls More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Walsh Employment
databases , firewalls , VPNs , enterprise AntiVirus solutions Networking principles (e.g. TCP/IP, WAN, LAN, SMTP, HTTP, FTP, POP, LDAP) Desirable (Nice-to-Have): Experience in static malware analysis and reverseengineering Active DV Clearance Scripting or programming with Python , Perl , Bash , PowerShell , or C++ Recognised certifications such as CREST Practitioner Intrusion Analyst or Blue Team Level 1 Familiarity More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
including TCP/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: Static malware analysis and reverse engineering. DV Clearance. Programming and scripting such as Python, Perl, Bash, PowerShell, C++. CREST Practitioner Intrusion Analyst/Blue Teams Level 1 or other SOC related certifications. Experience with More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
Farnborough, Hampshire, South East, United Kingdom
Sopra Steria Limited
/IP, WANs, LANs, and commonly used Internet protocols such as SMTP, HTTP, FTP, POP, LDAP. It would be great if you had: ? Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst. Experience with SIEM technologies, namely Sentinel and Splunk, with some experience with QRadar appreciated. If you are interested in this role but not sure More ❯
Employment Type: Permanent
Salary: 25 days holidays, 6% Contributory pension, 4 x life Insurance
technical guidance and support to junior engineers and analysts on the team, fostering an environment of continuous learning and professional growth. QUALIFICATIONS 1. Demonstrated expertise in network security analysis, reverseengineering, vulnerability assessment, and exploit development. 2. Proficiency in programming languages such as Python, C, C++, and scripting languages relevant to CNO tasks. 3. Strong knowledge of networking More ❯
Job Level: Junior, Mid, or Senior We are seeking a highly motivated and skilled CNO Developer/Computer Scientist/Reverse Engineer to join our team. This role involves designing, developing, and maintaining complex software systems that support Computer Network Operations (CNO). As a member of our team, you will work on mission-critical projects, providing innovative solutions … software. • Develop custom tools and scripts to automate tasks, analyze data, and improve system performance. • Write clean, efficient, and well-documented code that meets security and performance standards. o ReverseEngineering: • Analyze, decompile, and reverse-engineer software binaries to understand vulnerabilities and potential exploits. • Develop proof-of-concept exploits to demonstrate potential vulnerabilities in targeted systems. o … and accessible to team members and stakeholders. Required Qualifications: o Clearance: Active TS/SCI with Full Scope Polygraph is mandatory. o Education: Bachelor degree in Computer Science, Computer Engineering, Electrical Engineering, or a related technical field. Relevant experience may substitute for education. Experience o Junior Level: 1-3 years of experience in CNO development, software engineeringMore ❯
First approach - providing a fun and challenging environment that promotes innovation, creative thinking, and treating one another like family. Located in Columbia, Maryland, our small business develops cutting-edge engineering solutions to protect our nation's assets. Our team specializes in vulnerability analysis and research, system emulation, software engineering, reverseengineering, embedded development, and cyber security. … with polygraph is required - Due to these clearance requirements, US citizenship is also required Responsibilities Include: - Perform network analysis using tools, such as Wireshark, NetworkMiner, for captures and analysis - Reverse engineer network protocols and perform static and dynamic analysis of software binaries - Decompile, disassemble, or debug software binaries to understand internal workings and behavior - Analyze Windows and Linux binaries … and evaluate potential impact on systems Required Skills & Qualifications: - Must have at least 5 years of hands-on relevant technical experience - Must possess Bachelor's in Computer Science, Computer Engineering, Electrical Engineering or relevant discipline (In lieu of degree must have 8+ years of hands-on relevant technical experience) - Must understand communication protocols (TCP/IP, etc) and More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
Sentinel, or Elastic Experience with forensics tools, including Magnet Axiom and FTK Experience performing forensic imaging, remote collection, and forensic analysis Experience with malware analysis, including static, dynamic, and reverseengineering Experience performing root cause analysis and following through with all phases of the incident response lifecycle Top Secret clearance Bachelor's degree Additional Qualifications Experience acquiring memory More ❯
security tools such as firewalls, VPNs, AV, IDS/IPS, and log management. Experience analysing log data and network security events. Desirable Skills: Understanding of static malware analysis and reverse engineering. CREST Practitioner Intrusion Analyst certification. Familiarity with additional SIEM tools such as QRadar. Benefits: 25 days annual leave, with the option to purchase more Health cash plan Life More ❯
skills. Good understanding of network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work independently with minimal supervision. Willingness to work in a 24/7 or More ❯
you! Set of X is looking for a software engineer who can develop software in C/C++, Python and Assembly language for operating system internals, network programming and reverse engineering. You will work on projects that involve virtualization, kernel modules, network devices and test frameworks. You will also have the opportunity to lead a team of engineers and … in a team It would be great if you also have: Experience writing software in Modern C++ (stdcpp17 and later) Experience with virtualization tools (e.g. VMWare, HyperV) Experience with reverseengineering tools (e.g. Ghidra, IDAPro, Binary Ninja, Radare2) Experience with version control systems (e.g. Git, Svn) Agile development skills Prior experience leading a team Experience writing kernel modules More ❯
you! Set of X is looking for a software engineer who can develop software in C/C++, Python and Assembly language for operating system internals, network programming and reverse engineering. You will work on projects that involve virtualization, kernel modules, network devices and test frameworks. You will also have the opportunity to lead a team of engineers and … in a team It would be great if you also have: Experience writing software in Modern C++ (stdcpp17 and later) Experience with virtualization tools (e.g. VMWare, HyperV) Experience with reverseengineering tools (e.g. Ghidra, IDAPro, Binary Ninja, Radare2) Experience with version control systems (e.g. Git, Svn) Agile development skills Prior experience leading a team Experience writing kernel modules More ❯
Analyst/Programmer II Location: MD Requisition#: 0273 Salary: $90k - $135k Clearance: Active Top Secret SCI clearance with a full-scope polygraph Education: Bachelor's degree in Computer Science, Engineering, Information Technology, or a related field, or equivalent experience Experience: 4-6 Years OVERVIEW We are seeking an experienced CNO Analyst Programmer II to join our team. This individual … Engage with cross-functional teams to identify and address complex technical challenges. QUALIFICATIONS 1. Strong proficiency in programming languages such as Python, C/C++, and Assembly. Experience with reverseengineering, penetration testing, and vulnerability analysis is preferred. 2. Understanding of networking protocols (TCP/IP, DNS, etc.), operating systems (Linux, Windows), and cyber defense strategies. Familiarity with More ❯
Analyst/Programmer I Location: MD Requisition#: 0278 Salary: $80k - $121k Clearance: Active Top Secret SCI clearance with a full-scope polygraph Education: Bachelor's degree in Computer Science, Engineering, Information Technology, or a related field, or equivalent experience Experience: 1-3 Years OVERVIEW We are seeking an experienced CNO Analyst Programmer I to join our team. This individual … Engage with cross-functional teams to identify and address complex technical challenges. QUALIFICATIONS 1. Strong proficiency in programming languages such as Python, C/C++, and Assembly. Experience with reverseengineering, penetration testing, and vulnerability analysis is preferred. 2. Understanding of networking protocols (TCP/IP, DNS, etc.), operating systems (Linux, Windows), and cyber defense strategies. Familiarity with More ❯
global, and space security. Location: MD Requisition#: 0279 Salary: $90k - $145k Clearance: Active Top Secret SCI clearance with a full-scope polygraph Education: Bachelor's degree in Computer Science, Engineering, Information Technology, or a related field, or equivalent experience Experience: 5-9 Years OVERVIEW We are seeking an experienced CNO Analyst Programmer III to join our team. This individual … Engage with cross-functional teams to identify and address complex technical challenges. QUALIFICATIONS 1. Strong proficiency in programming languages such as Python, C/C++, and Assembly. Experience with reverseengineering, penetration testing, and vulnerability analysis is preferred. 2. Understanding of networking protocols (TCP/IP, DNS, etc.), operating systems (Linux, Windows), and cyber defense strategies. Familiarity with More ❯
CNO Cyber Developer/Reverse Engineer Location: San Antonio, TX (On-site) Salary: $130,000 - $200,000 Ring0 Technologies ("Ring Zero") is hiring an advanced CNO Cyber Developer/Reverse Engineer passionate about producing custom capabilities for critical cyberspace operations. This developer will be integrated into a cutting-edge cybersecurity team and will be thrust into performing in … enhancements. Write clean, maintainable code following best practices (unit testing, source control, continuous integration, automation, design patterns, etc.). Program and debug low-level code and troubleshoot problems. Apply reverseengineering techniques to identify cyber tradecraft and enable capability implementation. Collaborate with other developers, testers, and system engineers to ensure quality product deliverables. Follow Agile Scrum methodology. Knowledgeable … of evolving trends in offensive and defensive cyber tools, tactics, and procedures . Work within a team environment. Basic Qualifications: BS/MS/PhD in Electronic Engineering, Electrical Engineering, Physics, Mathematics, Software Engineering, Computer Science, Information Technologies or Data Processing 5 yrs directly related experience Ability to convey technical information effectively and concisely to a wide More ❯
Clearance Requirement: Active Top Secret (TS) with SCI eligibility preferred Position Summary: Magnus Management Group LLC is seeking a highly skilled Malware Analyst to provide deep malware analysis and reverseengineering support aligned with our clients active incident response (IR) operations and evolving cybersecurity priorities. This position is mission-critical and will require an advanced understanding of malicious … candidate will work under government supervision and collaborate with multidisciplinary cyber response teams to produce actionable technical reports and threat intelligence. Key Responsibilities: Perform in-depth malware analysis and reverseengineering of binaries, scripts, and documents to determine their functionality, origin, and impact. Utilize government-furnished tools (e.g., IDA Pro, Ghidra, x64dbg, Wireshark, Cuckoo Sandbox, Volatility) to support … context on adversary infrastructure and capabilities. Research and stay abreast of emerging malware families, vulnerabilities, and novel exploitation techniques used by threat actors. Participate in threat hunts and detection engineering efforts to improve the clients proactive defense posture. Required Qualifications: U.S. Citizenship is required. Bachelor's degree in Computer Science, Information Security, or related field (or equivalent practical experience More ❯
come talk with us. Preferred Qualifications and/or willingness to learn: CNO capability development experience. Proficiency with networking (TCP/IP) and socket level programming. Software Analysis/ReverseEngineering experience. Proficiency in low-level internals in one or more technology areas (e.g. Windows, Unix, Mobile, Network devices). Understand assembly programming concepts. Unit Test experience. Experience … using Atlassian products (JIRA, Confluence, Crucible) Seniority LevelMid-Senior level Industry Software Development IT Services and IT Consulting Computer and Network Security Employment TypeFull-time Job Functions Engineering Research Information Technology Skills Atlassian Suite Skill Development Software Development Linux Programming Concepts Software Analysis ReverseEngineering Assembly Language Learning Multithreading Java Python More ❯
First approach - providing a fun and challenging environment that promotes innovation, creative thinking, and treating one another like family. Located in Columbia, Maryland, our small business develops cutting-edge engineering solutions to protect our nation's assets. Our team specializes in vulnerability analysis and research, system emulation, software engineering, reverseengineering, embedded development, and cyber security. More ❯
understand Data objectives and requirements, and partner with the Principle Data Engineer to create Solutions. The core tech stack is Snowflake, AWS, DBT. Overview of the role: Work with Engineering, Product, Data, and Commercial leaders to identify and prioritise architectural opportunities. Align data architecture principles with strategic business and technology goals. Present architectural findings, roadmaps, and decisions to both … Establish integration patterns between customer platforms and back-office systems (e.g. Finance, HR, CRM). Recommend standards for data modelling, master/reference data, and metadata governance. Collaborate with engineering, product, and commercial leaders to align architecture with business needs. Evaluate third-party APIs and reverse-engineer live system data models as needed. Author agile stories and support … engineering teams throughout development. Support testing, reconciliation, and integration verification activities. Key Deliverables Delivers work packages collaboratively, with clarity on scope, measures of success, and technical integrity A comprehensive Enterprise Data Domain Map, aligned with organisational functions and platforms Evaluation and recommendation of semantic and physical data architecture alignment across customer and operational systems Support the development of the More ❯
understand Data objectives and requirements, and partner with the Principle Data Engineer to create Solutions. The core tech stack is Snowflake, AWS, DBT. Overview of the role: Work with Engineering, Product, Data, and Commercial leaders to identify and prioritise architectural opportunities. Align data architecture principles with strategic business and technology goals. Present architectural findings, roadmaps, and decisions to both … Establish integration patterns between customer platforms and back-office systems (e.g. Finance, HR, CRM). Recommend standards for data modelling, master/reference data, and metadata governance. Collaborate with engineering, product, and commercial leaders to align architecture with business needs. Evaluate third-party APIs and reverse-engineer live system data models as needed. Author agile stories and support … engineering teams throughout development. Support testing, reconciliation, and integration verification activities. Key Deliverables Delivers work packages collaboratively, with clarity on scope, measures of success, and technical integrity A comprehensive Enterprise Data Domain Map, aligned with organisational functions and platforms Evaluation and recommendation of semantic and physical data architecture alignment across customer and operational systems Support the development of the More ❯
compliance, resilience, and security across cloud-based environments. Establish integration patterns between customer platforms and back-office systems (e.g. Finance, HR, CRM). Overview of the role: Work with Engineering, Product, Data, and Commercial leaders to identify and prioritise architectural opportunities. Align data architecture principles with strategic business and technology goals. Present architectural findings, roadmaps, and decisions to both … Establish integration patterns between customer platforms and back-office systems (e.g. Finance, HR, CRM). Recommend standards for data modelling, master/reference data, and metadata governance. Collaborate with engineering, product, and commercial leaders to align architecture with business needs. Evaluate third-party APIs and reverse-engineer live system data models as needed. Author agile stories and support … engineering teams throughout development. Support testing, reconciliation, and integration verification activities. Core skills and experience: Proven experience designing scalable data architectures in cloud and hybrid environments. Expertise in data modelling, SQL, and platforms like Snowflake, dbt, Power BI, and Databricks. Fluency in Python and knowledge of multiple cloud providers (AWS, Azure, GCP). Understanding of security principles including role More ❯