Cybersecurity professionals to enhance the overall cyber posture. On-site only, no telework. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems … including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in offensive tools and development techniques Perform development with at least two scripting or programming languages (Python, C++, Java, Rust, Assembly, C#, etc.) in support of exploit development … professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike. Mimicking threat behavior. Utilizing various operating systems (Linux, Windows, MAC OS); Utilizing Active Directory. Performing exploit development. Identifying gaps More ❯
and execute complex Red Team penetration tests and cyber adversary emulation operations. Design, develop, and employ offensive tools using platforms such as Metasploit, NMAP, KaliLinux, and Cobalt Strike. Emulate threat actor TTPs based on MITRE ATT&CK, APT profiles, and emerging threat intelligence. Conduct assessments and attacks … across various platforms, including Linux, Windows, and macOS. Exploit and manipulate Active Directory environments to assess internal and external threat postures. Perform exploit development and vulnerability research to identify and validate security flaws. Identify limitations in existing toolsets and develop custom techniques to improve effectiveness and stealth. Script and … years of full-time professional experience in Red Team operations and penetration testing, including: Developing and leveraging offensive tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike. Simulating adversary behavior and TTPs. Operating across Linux, Windows, and macOS environments. Utilizing and exploiting Active Directory infrastructures. Performing More ❯
RESPONSIBILITIES Plan, execute, and document full-scope penetration tests and adversary emulation exercises. Develop, modify, and utilize offensive security tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike. Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK. Conduct assessments across multiple operating systems … including Linux, Windows, and macOS. Perform exploit development and identify zero-day or previously unknown vulnerabilities. Analyze, identify, and remediate gaps in offensive tools and Red Team methodologies. Perform scripting and programming tasks in support of custom exploit development and automation. Work collaboratively with Blue Team, tool developers, and … full-time professional experience in each of the following: Conducting penetration testing or offensive cyber operations. Developing and using tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike. Mimicking threat behavior and adversary simulation. Working across Linux, Windows, and macOS environments. Utilizing and exploiting Active Directory More ❯
obtain the ISTQB Certified Tester Advanced Level-Test Analyst (CTAL-TA) certification within 2 years of hire. Advanced experience with Windows (Power Shell) and Linux (Kali and Ubuntu) command line interface. Intermediate ability to interface effectively with customers, end-users, technical leads, and program management throughout the full … the Agile mindset and methodologies, including Agile project management. DESIRED QUALIFICATIONS/SKILLS Knowledgeable on various Software Development Lifecycles. Advanced experience working in Windows, Linux (Kali and Ubuntu), and VMware environments. Intermediate experience with Agile/Scrum Framework and Issue Management Tools (e.g., Confluence, Jira, Azure DevOps). More ❯
tools (BASH, PowerShell, Python) Require Skills and Experience: Active DoD Security Clearance Active Security+ Certification Experience with BURP Suite in relation to penetration testing Linux, KaliLinux, RHEL experience Nessus/ACAS scanning and maintenance Scripting experience with one of the following: Bash, Shell, Python More ❯
Must obtain the ISTQB Certified Tester Advanced Level-Test Analyst (CTAL-TA) certification within 2 years of hire. Experience with Windows (Power Shell) and Linux (Kali and Ubuntu) command line interface. Intermediate ability to interface effectively with customers, end-users, technical leads, and program management throughout the full … and executing test plans, procedures, reports, and technical documentation. DESIRED QUALIFICATIONS/SKILLS Knowledgeable on various Software Development Lifecycles. Advanced experience working in Windows, Linux (Kali and Ubuntu), and VMware environments. Intermediate experience with Agile/Scrum Framework and Issue Management Tools (e.g., Confluence, Jira, Azure DevOps). More ❯
testing. • Proven ability to perform computer network vulnerability assessment and penetration testing. • Proficient in tools such as Nmap, Wireshark, Metasploit, Canvas, Kismet, Burp Suite, Kali Linuxetc. • Understanding of operating systems (MaxOS, Windows, Linux) and how clients/servers are built and secured. • Ability to research, prioritize, problem solve … infosec, system testing and client structures. TECHNOLOGIES USED: Operating Systems: • Microsoft Windows (7 - 10, Server ) • UNIX (Solaris, HP-UX, etc.,) Operating System versions • Common Linux distributions including RHEL/CentOS/Rocky and Debian/Ubuntu • OSX/iOS and Android • VMware/ESXi/KVM/OpenVZ or … other virtualized environments • Linux variant Operating Systems versions • BSD variant Operating Systems versions Software/Scripting: • Java/C++ • Bash/Perl/Powershell/Python Database Administration and application development with: • Oracle platforms • SQL Server • MySQL • Hadoop Wireless: • WiFi/WiMax/Bluetooth technology (hardware or core software More ❯
will allow you to expand both your offensive and defensive networks security skills by using tools like Shodan, Maltego and various tools in the KaliLinux environment. Applicants for this position should have a solid understanding of network engineering with some exposure to bash and/or Python … scripting. REQUIRED SKILLS: • Proficiency working in a Linux environment (CentOS, Ubuntu, Fedora, Solaris, Kali). • Experience configuring small business or home network (SOHO) devices (e.g., wifi routers, switches, etc.). • Comfortable working in a command-line environment (SSH, bash, telnet, etc.) • Experience monitoring network activity, to include performing … the design, implementation, procurement, tradecraft or maintenance of various layers within covert network infrastructure. • Proven ability to design and develop integrated network solutions using Linux and traditional appliance network devices. DESIRED SKILLS: • Scripting including Python, Bash and Perl and frameworks like Ansible. • Understanding of Linux network security tools More ❯
Minimum 7 years' professional experience in offensive cyber operations or penetration testing to include the following: Utilizing and developing tools such as Metasploit, NMAP, KaliLinux, and Cobalt Strike Emulating adversary Tactics, Techniques, and Procedures (TTPs) Working across Linux, Windows, and Mac OS environments Leveraging and attacking More ❯
professional experience in penetration testing and/or offensive cyber operations which include the following: Use and development of offensive tools including Metasploit, NMAP, KaliLinux, and Cobalt Strike Emulation of adversary Tactics, Techniques, and Procedures (TTPs) Operation within Linux, Windows, and macOS environments Exploiting and assessing More ❯
general computer networks concepts OWASP Top 10 and Sans Top 25 DevSecOps and Secure SDLC principles Cloud (AWS/Azure) principles Burp Suite Professional KaliLinux Agile practices Bonus You have the know-how required to develop your own exploits and participate in bug bounty programs You have More ❯
Northern Ireland, United Kingdom Hybrid / WFH Options
VanRath
best practices, including ethical hacking and vulnerability assessments. Proficiency in using common automated VAPT tools (e.g., Nessus, Appscan, Burp Suite ). Experienced with Metasploit, KaliLinux, Wireshark , and other attack tools. Expertise in mobile platform security and related vulnerabilities. Strong knowledge of OWASP , CVE , and general security controls. More ❯
and non-technical audiences. Requirements Proven experience in penetration testing and ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP More ❯
and/or offensive Cyber operations including demonstrated experience in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike Mimicking threat behavior Utilizing various operating systems (Linux, Windows, MAC OS) Utilizing Active Directory Exploit development Identifying gaps in More ❯
professional experience conducting penetration testing or offensive Cyber operations in each of the following areas: Developing and utilizing penetration tools such as Metasploit, NMAP, KaliLinux, Cobalt Strike; Mimicking threat behavior; Utilizing various operating systems (Linux, Windows, MAC OS); Utilizing Active Directory; Performing exploit development; Identifying gaps More ❯
similar position. In-depth understanding of protocol security design, cryptography, security frameworks, and common vulnerabilities. Familiarity with security tools such as Burp Suite, Nmap, KaliLinux, Nessus, Metasploit, IDA, Ghidra, etc. Ability to independently develop and customize penetration testing tools and fuzzing techniques. Skilled in performing code audits More ❯
or network penetration testing with track record of end to end testing of complex systems. Advanced knowledge of various web technologies, operating systems, particularly Linux, Windows, and Active Directory. Knowledge of Scripting Languages e.g. Python, Shell Scripting etc. Strong expertise with web application and network pen testing methodologies. Proficiency … in using penetration testing tools such as BurpSuite Pro, Nmap, Nessus, and Metasploit. Experienced in using KaliLinux and the associated penetration testing tool suite. Advanced completion of penetration testing simulations like Hack the Box or Capture the Flag or ideally one of the following certifications: CSTL/ More ❯
activities, and current Cyber updates while adhering to 319CTS instructions, security classification guides, and other guidance as identified in lesson plans. Fully versed in LINUX OS Fundamentals, administration, processes, services, command shells, networking, scripting, partitions, and surveying Interface with internal and external Cyber agencies as required to update and … Ethical Hacker (CIEH) (Optional) Skills, including, but not limited to, using any of the following tools, capabilities: NMAP Endpoint Detection and Response (EDR) tools Linux CLI, Powershell, Windows CLI Metasploit KaliLinux Protocol Analyzers, Password Crackers, Vulnerability Assessment Command Line Tools: netstat, nslookup, netcat etc Pyhton, Bash More ❯
testing that identifies weaknesses in web applications, supporting infrastructure, and endpoints. Knowledge of security testing environments and tools, to include but not limited to Kali, Metasploit, Burp Suite, Wireshark, and Fiddler. Experience enumerating vulnerabilities and performing exploits on the vulnerabilities to include, but not limited to remote code execution … support detecting and containing vulnerabilities. Have knowledge of tools such as the Elastic Stack, SQL, stream editors, spreadsheet pivot tables, LDAP queries, Unix/Linux CLI, Nmap, tcpdump, Wireshark, shell scripting, and Puppet. Be able to maintain and utilize Blue Team tools. Have knowledge of current vulnerability trends and … in San Diego, CA. US Citizenship Required. WHAT WE'D LOVE FOR YOU TO HAVE (Preferred): Knowledge of Burp Suite security tools Experience with KaliLinux tools such as nMAP, TCPDump, WireShark Knowledge of web development and HTML structure Working knowledge of OSI network model and network traffic More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
and penetration testing. Demonstrable experience in infrastructure and web application testing; experience in API testing is desirable. Demonstrable experience using common pentesting tools including KaliLinux, Burpsuite, Nessus and other industry standard tools. Hold or working towards an industry recognised certification including CompTIA PenTest+; CHECK, CREST; Offensive Security More ❯
Arlington, Virginia, United States Hybrid / WFH Options
Coalfire Federal
to win against. We do our best to continue learning, finding risks, and improving our client's security. We leverage several different tools including KaliLinux, Burp Suite, and Cobalt Strike. Why be a Penetration Tester at Coalfire Federal Our name is well-known in the cybersecurity space More ❯
Injection, SQLi, single sign-on limitations, etc. Must be proficient in any of the following: PowerShell Empire, Metasploit Framework, Cobalt Strike, Burp Suite, Canvas, KaliLinux, IPTables, Sysinternals, A/V evasion methodologies, Exploit Dev. Must have solid working experience and knowledge of Windows operating systems (incl. Active … Directory), Linux operating systems; ESXi or similar; mobile platforms are a plus. Solid understanding of networking, TCP/IP, virtualization and cloud/data center architecture. Strong familiarity with some of the following: OWASP top 10, DoD and NSA Vulnerability and Penetration Testing Standards. Knowledge of exploitation concepts including More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
HS diploma or GED and 7+ years of experience in Information Technology, or Bachelor's degree and 3+ years of experience in Information Technology Linux Computing Environment (CE) Certification Windows CE Certification Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN) Certification DoD Approved 8570 Information Assurance Technician … IAT) Level III Certification, including CASP+ CE, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP Certification Additional Qualifications Experience with Cobalt Strike, Metasploit, and KaliLinux Python Certification Completion of the Red Team Apprentice, Offensive Methodology Analysis, or Red Team Operations Training Clearance: Applicants selected will be subject More ❯
and 7+ years of experience in Information Te chn ology, or Bachelor's degree and 3+ years of experience in Information Te chn ology Linux Computing Environment ( CE ) Certification Windows CE Certification Offensive Security Certified Professional ( OSCP ) or GIAC Penetration Tester ( GPEN ) Certification DoD Approved 8570 Information Assurance Te … III Certification, including CASP+ CE, CCNP Security, CISA, CISSP, GCED, GCIH, or CCSP Certification Nice If You Have: Experience with Cobalt Strike, Metasploit, and KaliLinux Python Certification Completion of the Red Team Apprentice, Offensive Methodology Analysis, or Red Team Operations Training Clearance: Applicants selected will be subject More ❯
North Chicago, Illinois, United States Hybrid / WFH Options
AbbVie
access management Advanced, hands-on experience with manual vulnerability testing and static code analysis Advanced experience with tools including, but not limited to, the KaliLinux platform and its built-in tools Advanced experience performing manual testing with Burp Suite, OWASP ZAP, or similar tools Advanced understanding of More ❯