• Senior Manual Ethical Hacker

    Bank of America (Seattle, WA)
    …the power to make a difference. Join us! **Job Description:** Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of ... to assess the security resilience of the bank's applications to malicious hacking activity. This senior technical role is responsible performing and leading ethical… more
    Bank of America (04/09/25)
    - Save Job - Related Jobs - Block Source
  • Principal Associate, Penetration Tester

    Capital One (Mclean, VA)
    …and weaknesses in the enterprise cyber environment through coordinated ethical hacking and penetration testing scenarios. This position works closely with team ... members to plan, coordinate, execute and report on sophisticated ethical hacking exercises, to identify cyber vulnerabilities and reduce the risk posture of… more
    Capital One (04/29/25)
    - Save Job - Related Jobs - Block Source
  • Cybersecurity Testing Engineer (In-Office/On-Site)

    Eurofins (Baltimore, MD)
    …+ Suite, Privilege escalation, firmware extraction, buffer Overflow Exploitation, Web, Hacking + Experience in cybersecurity consulting in an ICS environment, eg, ... privilege escalation, firmware extraction, buffer overflow exploitation, and web hacking . + Experience in cybersecurity consulting within Industrial Control Systems… more
    Eurofins (04/11/25)
    - Save Job - Related Jobs - Block Source
  • Senior Manager, Offensive Security (Penetration…

    Capital One (Mclean, VA)
    …and weaknesses in the enterprise cyber environment through coordinated ethical hacking and penetration testing scenarios. This position works closely with team ... members to plan, coordinate, execute and report on sophisticated ethical hacking exercises, to identify cyber vulnerabilities and reduce the risk posture of… more
    Capital One (03/23/25)
    - Save Job - Related Jobs - Block Source
  • Manual Ethical Hacker

    Bank of America (Washington, DC)
    …the power to make a difference. Join us! **Job Description:** Manual Ethical Hacking is part of the Application Development Security Framework Program within Bank of ... to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate technical role is responsible for performing application… more
    Bank of America (03/12/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Reverse Engineer

    CACI International (Sterling, VA)
    …and algorithms (3DES, AES, RSA, MD5, SHA, CRC, etc.)** **Background in ethical hacking and/or testing software vulnerabilities with a working knowledge of hacking ... tools and techniques such as memory corruption exploits, buffer overflows, rootkits, protocol poisoning, MetaSploit, nmap, etc.** **Cybersecurity certifications (eg CISSP, CEH, Security+)** - ** ** **What You Can Expect:** **A culture of integrity.** At CACI,… more
    CACI International (04/30/25)
    - Save Job - Related Jobs - Block Source
  • Growth Marketing Managing Consultant, Commercial…

    Mastercard (Harrison, NY)
    …emphasis on data-driven, results focused programs and campaigns. Preference for a growth hacking mindset that is highly credible as an expert internally and for our ... Business and Commercial portfolio. *Experience working within an agile, growth hacking approach with strong knowledge of digital marketing channels, training, and… more
    Mastercard (04/23/25)
    - Save Job - Related Jobs - Block Source
  • Penetration Tester

    Leidos (Herndon, VA)
    …for a cyber security professional to conduct penetration testing and ethical hacking to target, assess, and exploit risk and vulnerabilities of information systems. ... cyber security equities. We require specialized penetration testing and ethical hacking to target, assess, and exploit risk and vulnerabilities of information… more
    Leidos (04/19/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Security Analyst (Expert) - CSIA

    Amentum (Aberdeen, MD)
    …systems, resolving them, and then responding to cybersecurity breaches, such as hacking , when they occur. + Works closely with cybersecurity engineers, who develop ... relating to Cryptographic Modernization technologies + Must possess a Computer Hacking Forensic Investigator (CHFI), Certified Network Defense Architect (CNDA) and… more
    Amentum (04/19/25)
    - Save Job - Related Jobs - Block Source
  • Instructor of Cybersecurity - Tenure Track

    SUNY Brockport (Brockport, NY)
    …areas of Cybersecurity: Computer/Network Security, Information Assurance, Ethical hacking , Incident response, Database and Web security, Cryptography, Software ... following areas of Cybersecurity: Computer/Network Security, Information Assurance, Ethical hacking , Incident response, Database and Web security, Cryptography, Software… more
    SUNY Brockport (04/02/25)
    - Save Job - Related Jobs - Block Source
  • Red Team Operator (Cooperative Red/Blue Team…

    KBR (San Antonio, TX)
    …of NIWC CSSP and its subscribers. This role requires expertise in ethical hacking , attack emulation, and security bypass techniques to assess network resilience and ... mentor junior Red Team members on attack methodologies and ethical hacking techniques. Qualifications Information Systems Security Specialist I-III Education /… more
    KBR (03/13/25)
    - Save Job - Related Jobs - Block Source
  • Assistant or Associate Professor, Tenure-Track…

    Tarleton State University (Stephenville, TX)
    …emphasizes hands-on learning and covers essential topics such as ethical hacking , network security, and computer forensics, equipping students with the technical ... as specialized Cybersecurity courses such as principles of cybersecurity, ethical hacking , computer forensics, and network security. + Active involvement in… more
    Tarleton State University (02/25/25)
    - Save Job - Related Jobs - Block Source
  • Lead Cyber Security Research Consultant

    Wells Fargo (Columbus, OH)
    …can result in higher impact. This team member must be able to utilize complex hacking tools, create proof of concept exploits, and document attack chains so they can ... be re-created and defensive tactics developed for them. This role will research, analyze, design, test, and implement complex technologies, systems, and applications. This position reports to the Cyber Threat Management - Offensive Security Research Team. **In… more
    Wells Fargo (05/03/25)
    - Save Job - Related Jobs - Block Source
  • Network Security Lead - NDR

    Fiserv (Columbus, OH)
    …Security solutions + 8+ years' experience in cybersecurity trends and hacking techniques, with a solid understanding of security principles, infrastructure, and ... data protection practices + 8+ years' experience in modern, large-scale corporate network environments, with expert-level understanding of core network switching/routing concepts, protocols, and implementations + 5+ years' experience in Network Security… more
    Fiserv (04/23/25)
    - Save Job - Related Jobs - Block Source
  • Senior Penetration Tester (Web/API/Thick-Clients)…

    JPMorgan Chase (Columbus, OH)
    …engineering standalone, thick client and mobile applications + Experience with hardware hacking tools and techniques + Ability to analyze binary firmware images and ... reverse engineer code + Certifications like OSWE, CREST (CRT, CCT), OSCP, OSCE, GXPN, GWAPT, GPEN, BSCP This role is also open to Atlanta GA | Chicago IL | Washington, DC | Houston TX | Jersey City NJ | McLean VA | Plano TX | Tampa FL | Brooklyn, NY |… more
    JPMorgan Chase (03/26/25)
    - Save Job - Related Jobs - Block Source
  • Transport R&D Intern, Summer

    Netflix (Los Gatos, CA)
    …network measurements, testbed orchestration, traffic data analysis, and/or protocol stack hacking . You are comfortable with software engineering best practices (eg ... version control, testing, code review, etc.) Bonus Points: + Experience with SVOD or cloud gaming. + Involvement in open-source and networking projects (eg iperf, httperf, tcpdump, wireshark, nmap, or similar). Internships at Netflix: At Netflix, we offer a… more
    Netflix (05/05/25)
    - Save Job - Related Jobs - Block Source
  • Senior Cyber Security Research Consultant

    Wells Fargo (New York, NY)
    …network systems and applications + Act as professional ethical penetration tester utilizing hacking tools to modify or create proof of concept exploits that mimic ... techniques of the most sophisticated attackers + Review and analyze complex advanced computer security incident response activities and technical investigations of information security related incidents + Identify vulnerabilities and associate those to a… more
    Wells Fargo (05/03/25)
    - Save Job - Related Jobs - Block Source
  • Security Analyst

    Robert Half Technology (Nashville, TN)
    …of hands-on offensive security experience, including penetration testing and ethical hacking . + Proficiency with industry-standard penetration testing tools such as ... Burp Suite, Metasploit, Nmap, Kali Linux, and Wireshark. + Strong scripting and programming skills in languages such as Python, PowerShell, Bash, or JavaScript to craft custom tools and automate tasks. + Solid understanding of offensive security techniques,… more
    Robert Half Technology (05/03/25)
    - Save Job - Related Jobs - Block Source
  • Principal Security Research Manager

    Microsoft Corporation (Redmond, WA)
    …in areas of subject matter expertise, including coordinated disclosure and ethical hacking . + Drives participation in conferences and industry events. Ensures best ... practices are shared within and across teams. + Collaborates with leaders of other engineering teams to identify and propose potential business opportunities, services, and/or product offerings. + Manages efforts to research, develop, and implement new tools,… more
    Microsoft Corporation (05/03/25)
    - Save Job - Related Jobs - Block Source
  • Cyber Incident Response Analyst III

    Nightwing (Sterling, VA)
    …**Responsibilities:** + Conducting incident response for breaches, data exfiltration, hacking and malware investigations. + Correlating forensic findings to network ... events in support of developing an intrusion narrative + Performing forensic triage of an incident to include determining scope, urgency and potential impact + Tracking and documenting forensic analysis from initial participation through resolution +… more
    Nightwing (05/02/25)
    - Save Job - Related Jobs - Block Source