- Bandwidth (Raleigh, NC)
- …our Programmable Voice software development team. We're seeking somebody who is a maker, a hacker , and a software craftsman. If your idea of fun is losing track of ... time while geeking out over a new web framework, we'd like to talk to you. What You'll Do: + You're gonna write great code and lots of it. + You'll be a member of an agile software development team, and a leading voice in your team's design and implementation… more
- Belay Technologies (Annapolis Junction, MD)
- …Penetration Tester (GWAPT) + GIAC Penetration Tester (GPEN) + Certified Ethical Hacker (CEH) + Certified Information Security Manager (CISM) + Certified Web ... Application Defender (GWEB) + Certified Information System Security Professional (CISSP) + Extensive experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus… more
- Crown Equipment Corporation (New Bremen, OH)
- …(CISSP), Certified Secure Software Lifecycle Professional (CISSP), Certified Ethical Hacker (CEH) certified. + Familiarity with container security (Docker, ... Kubernetes). + Experience in Threat Modeling. + Understanding of authentication protocols (Open Authorization (OAuth) and Security Assertion Markup Language (SAML)). + Experience with DEVSECOPStools and container security tools. **Work Authorization:** Crown… more
- Leidos (Annapolis Junction, MD)
- …Penetration Tester (GWAPT) + GIAC Penetration Tester (GPEN) + Certified Ethical Hacker (CEH) + Certified Information Security Manager (CISM) + Certified Web ... Application Defender (GWEB) + Certified Information System Security Professional (CISSP) + Extensive experience developing/implementing integrated security services management processes, such as assessing and auditing network penetration testing, anti-virus… more
- Tyto Athene (Ashburn, VA)
- …**Desired:** + CISSP - Certified Information Systems Security Professional + Certified Ethical Hacker (CEH) or one of the following: DoD 8570 IAT Level II or ... IAM Level I or CSSP Analyst / Incident Responder + GCFA - GIAC Certified Forensic Analyst + GCFE - GIAC Certified Forensic Examiner + GREM - GIAC Reverse Engineering Malware + GNFA - GIAC Network Forensic Analyst **Location:** + Ashburn, VA **Clearance:** +… more
- Rigid Tactical (Norfolk, VA)
- …(CySA+) + Certified Information Security Manager (CISM) + Certified Ethical Hacker (CEH) (Practical/Master) + Certified Data Privacy Solutions Engineer (CDPSE) or ... CIPP/G + TS/SCI clearance Key Responsibilities: The core function of this Key Personnel role is to serve as the independent assurance provider, ensuring critical DOD/DON systems meet strict security and authorization standards under the Risk Management… more
- Tyto Athene (Ashburn, VA)
- …skills. **Desired:** + CISSP - Certified Information Systems Security Professional + Certified Ethical Hacker (CEH) or one of the following: DoD 8570 IAT Level II or ... IAM Level I or CSSP Analyst / Incident Responder + GCFA - GIAC Certified Forensic Analyst + GCFE - GIAC Certified Forensic Examiner + GREM - GIAC Reverse Engineering Malware + GNFA - GIAC Network Forensic Analyst **Location:** + Ashburn, VA **Clearance:** +… more
- Rigid Tactical (Norfolk, VA)
- …Professional (OSCP) + GIAC Certified Penetration Tester (GPEN) + Certified Ethical Hacker (CEH) Practical (or Master) + Cisco Certified Network Professional (CCNP ... Security) + GIAC Exploit Developer (GXPN) + Certified Red Team Expert (CRTE) Key Responsibilities This Key Personnel role has an advanced focus on planning and executing offensive cyber operations within the DoD Cyber OT&E environment. 1. Exploitation Planning… more
- Nightwing (Arlington, VA)
- …7 years of directly relevant experience. Desired Certifications: Certified Ethical Hacker (CEH) CompTIA's Security Plus (SEC+) Intelligence Analyst Certified (IAC) ... Certified Threat Intelligence Analyst (C|TIA) Arlington, VA _At Nightwing, we value collaboration and teamwork. You'll have the opportunity to work alongside talented individuals who are passionate about what they do. Together, we'll leverage our collective… more
- Leidos (Pearl Harbor, HI)
- …(PERL, python, shell scripting) to automate analysis task. + Knowledge of hacker tactics, techniques and procedures (TTP). + Familiarity with computing security ... frameworks such as MITRE ATT&CK and Cyber Kill Chain. + Monitoring of intrusion detection and computer defense appliances (Splunk, Elastic), applications, and analysis of associated alerts. + Knowledge of advanced threat actor tactics, techniques, and… more