- Steampunk (Mclean, VA)
- …Professional (CISSP) + Certified Information Systems Auditor (CISA) + Certified Ethical Hacker (CEH) **Preferred Skills** + Demonstrated ability to rely on extensive ... experience and judgment to plan andaccomplishgoals + Able to work effectively independently to solve problems quickly and completely + Ability to lead effectively and direct the work of others + Experience reporting to, communicating with, and/or collaborating… more
- NVR (Reston, VA)
- …in offensive security, Red Teaming, or penetration testing. + Certified Ethical Hacker (CEH) or equivalent certification/training. + Proficiency with tools such as ... Cobalt Strike, Metasploit, Burp Suite, and custom scripting (Python, PowerShell). + Deep understanding of Windows and Linux internals, Active Directory attacks, and cloud exploitation techniques. + Certifications such as OSCP, OSCE, GPEN, or CRTO are highly… more
- Imagine One Technology & Management (Dahlgren, VA)
- …warfare system against known vulnerabilities based upon security approaches and known hacker techniques and exploits. + Lead and perform as Information Assurance ... Officer to be focal point for all security matters related to specific sets of information systems. + Lead the preparation and execution an Information Assurance Vulnerability Management (IAVM) Plan. + Lead the preparation and production of a System Security… more
- General Dynamics Information Technology (Springfield, VA)
- …**These Qualifications Would be Nice to Have:** + CEH - CERTIFIED ETHICAL HACKER - EC-COUNCIL + CASP+ - COMPTIA ADVANCED SECURITY PRACTITIONER - COMPTIA The ... likely salary range for this position is $97,258 - $131,584. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this… more
- GrammaTech, Inc. (Arlington, VA)
- …Explorer, CFF Explorer, Wireshark, Fiddler, Regshot, Process Monitor, and Process Hacker . + Knowledge of reverse engineering and file reconstruction practices. + ... Prior experience performing static and dynamic analysis; unpacking and de-obfuscating complex malicious applications. + Debugger experience identifying and defeating known or custom packers. + Disassembling/disassemblers experience. + US citizenship with… more
- GrammaTech, Inc. (Arlington, VA)
- …Process Explorer, CFF Explorer, Wireshark, Fiddler, Regshot, Process Monitor, and Process Hacker . + Experience with the common open source and commercial tools used ... in security event analysis and other areas of security operations. + Prior experience using a SIEM tool for pattern identification, anomaly detection, and trend analysis. + Prior experience analyzing a variety of industrial control systems network protocols,… more
- Shuvel Digital (Arlington, VA)
- …each year of degree level education. Desired Certification(s): * Certified Ethical Hacker (CEH), Windows/Linux Admin, Azure Sentinel or Other Cloud SIEM, CISSP, ... Security+, Network+, Cisco Certified Network Professional (CCNP), Cisco Certified Security Professional (CCSP) * Vendor specific certification for the aforementioned products or similar certification. more
- Shuvel Digital (Arlington, VA)
- …each year of degree level education. Desired Certification(s): + Certified Ethical Hacker (CEH), Windows/Linux Admin, Azure Sentinel or Other Cloud SIEM, CISSP, ... Security+, Network+, Cisco Certified Network Professional (CCNP), Cisco Certified Security Professional (CCSP) + Vendor specific certification for the aforementioned products or similar certification. more
- Imagine One Technology & Management (Dahlgren, VA)
- …Kali, Metasploit, NMAP, Cobalt Strike 2. Associated Training: Certified Ethical Hacker or Offensive Security Certified Professional and; 3. Documented experience in ... at least one of the following: 1. Penetration Testing (PENTEST) (government or contractor) 2. Red Team Operations (government or contractor) 3. Tool/Software Development (exploits/malware, C2, reverse engineering, bug bounties) 4. Python, C, C Sharp, C++, Go,… more
- Imagine One Technology & Management (Dahlgren, VA)
- …risk assessments against known vulnerabilities based upon security approaches and known hacker techniques and exploits. + Identify and perform security analysis of ... connectivity relationships between the subject US Naval warfare system and the equipment to which it interfaces, both physically and virtually. + Lead and perform as ISSO to be focal point for all security matters related to specific sets of information… more