Hack Your Way to the DoD: $15,000 Cybersecurity Challenge Awaits!
Hacker Job In Akron, OH
Correlation One is hosting the Cyber Sentinel Skills Challenge, a unique, one-day cybersecurity competition sponsored by the U.S. Department of Defense (DoD). Win your share of a $15,000 prize pool, solve fun cybersecurity challenges, and access new job opportunities at the DoD.
This event is designed to help you:
Unlock career opportunities and get on the radar of DoD recruiters
Test your skills and gain experience solving some of the most pressing security threats globally through 20+ Capture the Flag-style simulations
Connect with your peers and build a strong, supportive network of cybersecurity professionals
Competition details:
When: June 14, 2025
Where: Virtual
Duration: 8 hours (11am - 7pm ET)
Cost: Free
Early application deadline: May 6, 2025
Total prize pool: $15,000
Experience required: All levels of cybersecurity are welcome
Challenge categories: Forensics, Malware/ Reverse Engineering, Networking & Reconnaissance, Open-Source Intelligence Gathering (OSINT), Web Security
About you:
You must be a U.S. Citizen or a permanent resident with a valid Green Card.
You must be over the age of 18.
Individuals from all levels of cybersecurity experience, whether you are a seasoned cybersecurity professional or just starting in the field, are welcome to apply.
Senior Advanced Security Engineer
Hacker Job In Cincinnati, OH
**This role requires 4 days/ week onsite
Are you passionate about safeguarding applications and ensuring robust security? Do you thrive in dynamic environments where your expertise can make a real impact? If so, we have the perfect opportunity for you!
About the Role:
As a Sr. Advanced Security Engineer on our CIS Cyber Resilience Team, you'll be at the forefront of protecting Kroger's digital assets. Your mission, should you choose to accept it, involves diving deep into application security, pen-testing, and secure coding practices. You'll play a crucial role in identifying and mitigating vulnerabilities, ensuring our applications and infrastructure are rock-solid.
What You'll Do:
Assess & Protect: Conduct thorough security assessments and pen-tests on Kroger websites and services.
API Security: Lead the charge in supporting our new solution for API-based security issues.
Tool Mastery: Provide expert support for various application security tools, becoming the go-to person for all things security.
Educate & Advocate: Help developers understand vulnerabilities and articulate the risks, guiding them on effective remediation techniques.
Collaborate & Innovate: Work closely with architects, developers, and CIS counterparts, while also engaging with industry experts and utilizing cutting-edge tools to stay ahead of threats.
Skills Required:
Experience with Dynamic Application Security Tools (specifically HCL Appscan, Burp Suite)
Experience with Static Source Code Analysis Tools (specifically SNYK)
Experience with Software Composition Analysis Tools (specifically SNYK)
Experience with API Security Tools (specifically NoName Security)
Experience with PostMan API Platform
Proficiency in programming and scripting languages.
What Success Looks Like:
Subject Matter Expert: You're the go-to expert for application security tooling.
Risk Communicator: You can clearly explain vulnerabilities and their risks to developers.
Problem Solver: You provide practical solutions for remediation, ensuring our applications are secure.
Ready to make a difference? Apply now and join us in our mission to secure Kroger's digital future!
Senior Security Engineer
Remote Hacker Job
We are Bugcrowd. Since 2012, we've been empowering organizations to take back control and stay ahead of threat actors by uniting the collective ingenuity and expertise of our customers and trusted alliance of elite hackers, with our patented data and AI-powered Security Knowledge Platform. Our network of hackers brings diverse expertise to uncover hidden weaknesses, adapting swiftly to evolving threats, even against zero-day exploits. With unmatched scalability and adaptability, our data and AI-driven CrowdMatch technology in our platform finds the perfect talent for your unique fight. We aim to create a new era of modern crowdsourced security that outpaces threat actors. Unleash the ingenuity of the hacker community with Bugcrowd, visit ***************** Based in San Francisco and New Hampshire, Bugcrowd is supported by General Catalyst, Rally Ventures, Costanoa Ventures, and others.
Job Summary
The Senior Security Engineer's role is to aid the organizational security efforts of Bugcrowd, while proactively improving our security posture. As the last line of defense for one of the largest crowdsourced security platforms, you will be challenged regularly! Accordingly, we require a motivated team who are willing to push their own boundaries and step out of their comfort zones, while being supported by Bugcrowd and the director of Cybersecurity. The Senior Security Engineer will receive mentoring from the team, while providing mentoring to others, and you will be responsible for managing your individual engineering workload. This role also requires excellent communication skills as the cybersecurity department liaises with all other departments within the company.
Essential Duties and Responsibilities
Security Architecture and Application Security - Working with developers to uplift the current security controls and architecting solutions.
Tool Creation - Creating tools used internally for securing the company, majorly in Python and Golang.
Operations / Incident Response - Aiding with the process of Incident Response, and security operational activities when required.
Risk Management - Assessing the risk behind security issues, and tracking core metrics.
Pentesting - Performing security assessments of Bugcrowd assets (and vendors).
Quality Improvement - Contributing to the continual improvement of the Cybersecurity team's policies and standards of practice.
Experience Required
5+ years of experience in a similar role or its equivalent.
Familiarity with application security testing techniques (can perform a security assessment and code review should they be given a product, identifying weaknesses, ability to document findings, exploit development experience is a bonus).
Knowledge of OWASP Top 10 and common security vulnerabilities of modern web apps.
Knowledge of Incident Response and operating systems as this role requires responding to incidents within the specified timezone.
Knowledge of threat intelligence.
Ability to understand a vulnerability and work with developers to patch it.
Great communicator who is comfortable communicating across multiple teams.
Self-motivated, autonomous and organized - must be able to operate from a calendar, be punctual, and manage timelines of projects/tasks for self and others.
Cloud experience (AWS preferred).
Understanding of Identity and Access Management (IAM).
Ability to proactively find solutions (i.e., figure things out for themselves, look at configurations, learn what they mean, document potential solutions to solve the problems).
Has the ability to be self-sufficient.
Has some prior red teaming knowledge.
Familiarity with git and pull requests is a must.
Familiarity with a ticketing system / issue tracking system is a must (e.g: Notion and Jira).
Preferred Bachelor's Degree in Computer Science, MIS or equivalent experience.
Working Conditions
The ideal candidate must be able to complete all physical requirements of the job with or without reasonable accommodation.
Sitting and/or standing - Must be able to remain in a stationary position 50% of the time.
Carrying and/or lifting - Must be able to carry/move laptop as needed throughout the work day.
Environment - remote, work-from-home 100% of the time.
Culture
At Bugcrowd, we understand that diversity in the workplace is vital to a company's success and growth. We strive to make sure that people are included and have a sense of being part of making Bugcrowd not only a great product but a great place to work.
We regularly hear from both customers and researchers that Bugcrowd feels like a family, and we strive to maintain that internally as well.
Our team consists of a broad range of people: musicians, adventure sports junkies, nature lovers, parents, cereal enthusiasts, night owls, cyclists, artists-you get the point.
At Bugcrowd, we are solving security threats and vulnerabilities that are relevant to everyone, therefore we believe solving these problems takes all kinds of backgrounds. We value the perspectives and experiences people from underrepresented backgrounds bring.
Disclaimer
This position has access to highly confidential, sensitive information relating to the technologies of Bugcrowd. It is essential that the applicant possess the requisite integrity to maintain the information in the strictest confidence.
The company is authorized to obtain background checks for employment purposes under state and federal law. Background checks will be conducted for positions that involve access to confidential or proprietary information (including trade secrets).
Background checks may include Social Security verification, prior employment verification, personal and professional references, educational verification, and criminal history. Applicants with conviction histories will not be excluded from consideration to the extent required by law.
Bugcrowd is EOE, Disability/Age Employer.
Individuals seeking employment at Bugcrowd are considered without regards to race, color, religion, national origin, age, sex, marital status, ancestry, physical or mental disability, veteran status, gender identity, or sexual orientation.
#J-18808-Ljbffr
Security Engineer
Remote Hacker Job
About Us At the Commonwealth of Kentucky, we are committed to enhancing our community through technology and innovation. Our healthcare professionals and application specialists work to ensure the safety and well-being of our residents. If you are seeking a meaningful role where you can make a tangible impact on healthcare and technological advancement, this opportunity may be the perfect fit.
The Opportunity
The Office of Application and Technology Services (OATS) is seeking a highly motivated Information Security Architect to join our team. Reporting to the Chief Information Security Officer (CISO), this role serves as the principal security advisor responsible for planning, designing, implementing, and maintaining security frameworks across the division.
As the Subject Matter Expert (SME) for security operations, you will collaborate with internal development teams and vendor partners to strengthen the security posture of our systems. This role requires expertise in risk assessment, compliance, security architecture, and strategic planning to protect sensitive information and assets.
Key Responsibilities
Security Program Development & Strategy
* Assess the current security program, define future security strategies, and develop an implementation roadmap.
* Develop key performance indicators (KPIs) to measure security program effectiveness.
* Collaborate with division leaders to ensure security initiatives align with business objectives.
Security Policy & Compliance
* Design and enforce security policies and procedures aligned with industry best practices.
* Ensure compliance with regulatory frameworks such as FISMA, FedRAMP, ISO 27001, NIST, and COBIT.
* Provide guidance on security decisions based on organizational vision and mission.
Security Architecture & Infrastructure
* Develop a security architecture framework aligned with business and technology needs.
* Design security strategies and roadmaps for cloud and on-premise environments.
* Establish baseline security configurations for operating systems, network segmentation, and access management.
Risk Assessment & Incident Response
* Conduct risk assessments, threat modeling, and vulnerability analysis for applications and services.
* Develop and maintain incident response plans to effectively mitigate security threats.
* Perform forensic investigations to analyze and prevent future security incidents.
Collaboration & Secure Development
* Work closely with DevOps teams to integrate security best practices into the development lifecycle.
* Advocate for secure coding standards and escalate concerns regarding insecure coding practices.
* Partner with privacy and compliance teams to safeguard sensitive data.
Security Awareness & Training
* Develop and deliver security awareness training to educate employees on risks and best practices.
* Provide ongoing support to teams regarding security-related inquiries.
Preferred Qualifications
Education & Experience
* Bachelor's degree in Computer Science, Information Security, or a related field (advanced degree preferred).
* 5+ years of experience in information security architecture, design, and implementation.
* Strong background in security regulations, compliance, and risk management.
Certifications (Preferred but Not Required)
* Certified Information Systems Security Professional (CISSP)
* Certified Information Security Manager (CISM)
* Certified Information System Auditor (CISA)
* Other relevant security certifications
Technical & Leadership Skills
* In-depth knowledge of network security, encryption, authentication, and identity management.
* Experience implementing security tools and technologies (firewalls, IDS/IPS, endpoint protection, etc.).
* Strong communication skills to translate security concepts for technical and non-technical stakeholders.
* Ability to work independently and lead security initiatives across teams.
* Strong problem-solving and analytical skills with an innovative mindset.
Job Type: Contract
Pay: $50.00 per hour
Schedule:
* Monday to Friday
Work Location: Remote
Senior Security Engineer - AppSec (Remote)
Remote Hacker Job
AbbVie's mission is to discover and deliver innovative medicines and solutions that solve serious health issues today and address the medical challenges of tomorrow. We strive to have a remarkable impact on people's lives across several key therapeutic areas - immunology, oncology, neuroscience, and eye care - and products and services in our Allergan Aesthetics portfolio. For more information about AbbVie, please visit us at *************** Follow @abbvie on X, Facebook, Instagram, YouTube, LinkedIn and Tik Tok.
Job Description
AbbVie is looking for a talented Senior Security Engineer to join our application security program.
This new role will focus on the design, building, and automating new components of our application security program. You will leverage your expertise in AppDev, secure software development, scripting, and data analytics to automatically collect, normalize, and analyze intelligence artifacts, as well as to automate the generation of an assessment product supporting different intelligence requirements.
The focus of this role is to grow a foundational part of our application security program through building out new capabilities, integrating with both new and existing DevSecOps tooling, and partnering with stakeholders across the security group and major technology teams.
This position can be based anywhere in the U.S. virtually.
Qualifications
Ideal candidates will have hands-on experience in modern DevOps environments with exposure to the following:
Bachelor's Degree with 7 years experience OR Master's Degree with 6 years experience OR PhD with 2 years experience in Information Security
You should have experience building and implementing apps in a production-like environment
Python, PowerShell, or other scripting languages
Software composition analysis / software bill of materials
Cloud platforms and automation tools (i.e. Terraform, Ansible, Chef, Puppet)
Container and platform technology
Experience in cybersecurity or DevSecOps will benefit applicants, as will exhibiting a strong interest in developing cybersecurity expertise
Candidates should also possess strong written and oral communication skills and have exposure to communicating at different levels of an organization
Additional Information
Applicable only to applicants applying to a position in any location with pay disclosure requirements under state or local law:
The compensation range described below is the range of possible base pay compensation that the Company believes in good faith it will pay for this role at the time of this posting based on the job grade for this position. Individual compensation paid within this range will depend on many factors including geographic location, and we may ultimately pay more or less than the posted range. This range may be modified in the future.
We offer a comprehensive package of benefits including paid time off (vacation, holidays, sick), medical/dental/vision insurance, and 401(k) to eligible employees.
This job is eligible to participate in our short-term incentive programs.
This job is eligible to participate in our long-term incentive programs.
Note: No amount of pay is considered to be wages or compensation until such amount is earned, vested, and determinable. The amount and availability of any bonus, commission, incentive, benefits, or any other form of compensation and benefits that are allocable to a particular employee remains in the Company's sole and absolute discretion unless and until paid and may be modified at the Company's sole and absolute discretion, consistent with applicable law.
AbbVie is an equal opportunity employer and is committed to operating with integrity, driving innovation, transforming lives, serving our community and embracing diversity and inclusion. It is AbbVie's policy to employ qualified persons of the greatest ability without discrimination against any employee or applicant for employment because of race, color, religion, national origin, age, sex (including pregnancy), physical or mental disability, medical condition, genetic information, gender identity or expression, sexual orientation, marital status, status as a protected veteran, or any other legally protected group status.
US & Puerto Rico only - to learn more, visit *************************************************************************
US & Puerto Rico applicants seeking a reasonable accommodation, click here to learn more:
*************************************************************
#J-18808-Ljbffr
Remote Ethical Hacker / Penetration Tester
Remote Hacker Job
We are seeking a skilled and flexible Ethical Hacker / Penetration Tester to join our team on a project-based contract. This remote position is ideal for a professional with experience in networking penetration testing and web application security. The role will initially require 5-10 hours per week, with the potential to increase as projects expand. The successful candidate will be responsible for conducting ethical hacking, security testing, and reporting findings to clients. You may also have the opportunity to lead projects, with support from our team.
Key Responsibilities:
Penetration Testing: Conduct network and web application penetration tests using tools such as OWASP and Nessus to identify vulnerabilities and security weaknesses.
Security Assessments: Perform thorough security assessments across various industries, including Managed Service Providers (MSPs), ensuring adherence to best practices and industry standards.
Reporting: Prepare detailed reports outlining findings, vulnerabilities, and recommended remediation steps. Present these reports to clients in a clear and actionable manner.
Client Communication: Collaborate closely with clients to understand their security needs, provide updates on testing progress, and deliver results within agreed timelines.
Project Management: Potentially lead security testing projects, coordinating with internal and external stakeholders to ensure project success and client satisfaction.
Continuous Improvement: Stay updated with the latest security trends, tools, and techniques. Gradually take on more complex projects and responsibilities as you grow within the role.
Qualifications:
Experience: Demonstrated experience in ethical hacking, with a focus on network and web application penetration testing.
Technical Skills: Proficiency with security tools such as OWASP, Nessus, and other industry-standard penetration testing frameworks.
Certifications: Relevant certifications such as CEH (Certified Ethical Hacker), OSCP (Offensive Security Certified Professional), or similar credentials are preferred.
Flexibility: Ability to commit to project-based work with flexibility in hours. Must be reliable in meeting deadlines and available for client interactions as needed.
Business Acumen: Understanding of the business aspects of security testing, including the importance of delivering high-quality work efficiently and cost-effectively.
Communication: Strong verbal and written communication skills, with the ability to produce comprehensive and client-friendly reports.
We are seeking a skilled and flexible Ethical Hacker / Penetration Tester to join our team on a project-based contract. This remote position is ideal for a professional with experience in networking penetration testing and web application security. The role will initially require 5-10 hours per week, with the potential to increase as projects expand. The successful candidate will be responsible for conducting ethical hacking, security testing, and reporting findings to clients. You may also have the opportunity to lead projects, with support from our team.
Key Responsibilities:
Penetration Testing: Conduct network and web application penetration tests using tools such as OWASP and Nessus to identify vulnerabilities and security weaknesses.
Security Assessments: Perform thorough security assessments across various industries, including Managed Service Providers (MSPs), ensuring adherence to best practices and industry standards.
Reporting: Prepare detailed reports outlining findings, vulnerabilities, and recommended remediation steps. Present these reports to clients in a clear and actionable manner.
Client Communication: Collaborate closely with clients to understand their security needs, provide updates on testing progress, and deliver results within agreed timelines.
Project Management: Potentially lead security testing projects, coordinating with internal and external stakeholders to ensure project success and client satisfaction.
Continuous Improvement: Stay updated with the latest security trends, tools, and techniques. Gradually take on more complex projects and responsibilities as you grow within the role.
Qualifications:
Experience: Demonstrated experience in ethical hacking, with a focus on network and web application penetration testing.
Technical Skills: Proficiency with security tools such as OWASP, Nessus, and other industry-standard penetration testing frameworks.
Certifications: Relevant certifications such as CEH (Certified Ethical Hacker), OSCP (Offensive Security Certified Professional), or similar credentials are preferred.
Flexibility: Ability to commit to project-based work with flexibility in hours. Must be reliable in meeting deadlines and available for client interactions as needed.
Business Acumen: Understanding of the business aspects of security testing, including the importance of delivering high-quality work efficiently and cost-effectively.
Communication: Strong verbal and written communication skills, with the ability to produce comprehensive and client-friendly reports.
CERTIFIED ETHICAL HACKER
Remote Hacker Job
About VikingCloud
VikingCloud is the leading Predict-to-Prevent cybersecurity and compliance company, offering businesses a single, integrated solution to make informed, predictive, and cost-effective risk mitigation decisions - faster. Powered by the Asgard Platform™, the industry's largest repository of anonymized cybersecurity and compliance event data, we continuously monitor and analyze over 6+ billion online events every day.
VikingCloud is the one-stop partner trusted by 4+ million customers to provide the predictive intelligence and competitive edge they need to stay one step ahead of cybersecurity and compliance disruptions to their business. Our 1,000 dedicated cybersecurity and compliance expert advisors understand that it's not just about technology. It's about transacting business and delivering an exceptional customer experience every day, without fail. That's the measurable value we deliver. And that's what we call, Business Uninterrupted.
This Position
VikingCloud is always looking for candidates seeking a Certified Ethical Hacker position to help us secure our clients' network against potential threats. You will be responsible for testing a vast array of global company networks, servers, and infrastructure to identify potential vulnerabilities.
As a Certified Ethical Hacker, you will be required to know how to use various network and cybersecurity tools and have an expert-level understanding of computer and network security. This will include an understanding of topics related to encryption and cryptography.
Responsibilities
Below are some of the main areas of responsibility a Certified Ethical hacker is expected to assume:
Ethical hacking and penetration testing
Vulnerability assessment
Malware analysis
Work with other penetration testers and information security analysts
Growth Hacker
Remote Hacker Job
Your career as a Growth Hacker at Booksy will give you the opportunity to drive local growth, build community, and amplify our brand in the United States. Working closely with the Director of US Marketing, you'll be responsible for designing and implementing growth activities that incrementally drive acquisition, user engagement, and marketplace revenue growth within core cities in the US.
You'll leverage a range of unconventional, low-cost, and scalable tactics across various marketing channels and customer touchpoints to rapidly grow the marketplace locally.
You'll be excited by the prospect of identifying new growth opportunities and leading the delivery of innovative local marketing campaigns. With a focus on the US , your natural tendency to help others succeed will see you regularly seeking and sharing best practices across peers, teams and markets.
Essentially, to ensure you succeed in this role, you'll need:
Requirements
Demonstrable experience in growth hacking, performance marketing, or growth-focused roles, preferably in marketplaces, SaaS, or wellness/beauty industries. Experience in both B2C and B2B growth strategies is a plus.
Proficiency in digital marketing tools (Google Ads, Facebook Ads, etc.), A/B testing platforms, analytics tools (Google Analytics, Mixpanel), email marketing platforms (Mailchimp, Klaviyo, Iterable), social media management tools (Hootsuite, Buffer, Meltwater) and Outbound Sales tools (Outreach, Salesloft, auto/predictive dialers) and social media automation (Phantombuster, ManyChat).
Strong analytical mindset: Ability to dive deep into data to track, measure, and optimize campaigns. A/B testing, cohort analysis, and understanding key metrics like CAC (Customer Acquisition Cost) and LTV (Lifetime Value) are essential.
Creative and Innovative Thinking: You thrive on pushing boundaries and are not afraid to experiment with new, creative approaches to growth. Ability to think outside the box while keeping a strong focus on results. Comfortable with ambiguity and able to work independently. Ability to manage multiple initiatives simultaneously while meeting deadlines.
Deep understanding of local culture(s), trends, and behavior in the wellness space. Ability to adapt global marketing strategies to the local market.
Benefits
Some of the benefits we offer in the US are:
Comprehensive health, dental, and vision coverage.
Secure your future with our 401K match program.
Generous parental leave policy to support your family; 12 weeks paid after 12 months with Booksy
Unlimited PTO for a healthy work-life balance.
Flexible work arrangements, including full-time remote work.
Pet insurance to help take care of your furry friends.
A bit about Booksy:
A career at Booksy means you're part of a global team focused on helping people around the world feel great about themselves, every day. From empowering entrepreneurs to build successful businesses, to supporting their customers to arrange 'me time' moments, we're in the business of helping people thrive and feel fantastic.
Working in a rapidly growing and evolving company comes with its own set of opportunities and challenges. If you prefer a stable environment, with clear processes and structures then, we've got to be honest, you won't always find that here. However, if you're a driven self-starter, with initiative and the motivation to grow your career in an environment that's rapidly changing as we scale-up globally, then the chances are that you'll love it at Booksy.
Our Diversity and Inclusion Commitment:
We work in a highly creative and diverse industry so it goes without saying that we strive to create an inclusive environment for all. We welcome people from all backgrounds and are committed to fair consideration in our hiring process. If you have any accessibility needs or require reasonable adjustments during the interview process, please contact us at ********************, so we can best support you.
Growth Hacker (Telecommute OK)
Remote Hacker Job
We are an independent software vendor for SlashDB. SlashDB is an automated REST API for databases. It works great as a gateway to databases for internal purposes like data science or use it for building new or extending legacy systems to web and mobile applications.
SlashDB clients reap between $35K-$75K a year in savings per developer.
Learn more about SlashDB at ******************
Job Description
This is a marketing job like no other. You will leverage our own engineering skills to implement your ideas so together we beat other marketers at this game.
Objectives are not uncommon from other high tech businesses, but we will win by combining your growth hacking with our tech hacking skills:
Devise and execute tactics to promote SlashDB offerings in Amazon Web Services Marketplace, Microsoft Azure and for on-premise installation.
Develop and execute lead generation programs
Fill calendar with demo and webinar appointments
Develop, launch, and optimize drip email communication and campaigns establish and strengthen engagement throughout the customer lifecycle
Reach out to industry bloggers, reporters, conferences and meetup organizers
Reach out to software consultancies with partnership opportunity
Manage website and blog content creation; write content if so inclined
Represent the company at trade shows and conferences
Add your best idea here: _______________________
Qualifications
You don't need to be told what to do, but you are responsive to CEO's ideas and take in any critique in stride. You are resourceful in finding cost effective marketing options.
Key skills:
1-3 years of overall work experience in a growth, email marketing or product marketing role
Know how to measure effectiveness while avoiding over-analyzing
Know how not get ripped off on display advertising
Know how to avoid pitfalls with affiliate marketing
You are a super-connector
Bonus skills:
Dabbled in software development or participated in such projects
Additional Information
In you application please state your desired compensation and time availability (number of hours per week). This will most likely be a contract-to-hire situation.
HackerX D&I Virtual Event
Remote Hacker Job
Thank you for checking out our booth at the HackerX D&IU Virtual Event. We are encouraging all individuals interested in 2U to submit their resume and information, including areas of interest. Our Recruiting team will be reviewing and following up on inquiries based on role alignment and availability.
At 2U, we are committed to creating and sustaining a culture that embodies diverse walks of life, ideas, genders, ages, races, cultures, sexual orientations, abilities and other unique qualities of our employees. We strive to offer a workplace where every employee feels empowered by the ways in which we are different, as well as the ways in which we are the same.
Benefits & Culture
Working at 2U means working with individuals that are passionate and mission driven. We collaborate on tough problems to deliver the best outcomes for our partners, students, and each other. You will find team members working together in our open office spaces, gathered in the kitchen grabbing a snack, or taking a break in our game rooms.
2U offers a comprehensive benefits package:
Medical, dental, and vision coverage
Life insurance, disability and 401(k)
Unlimited snacks and drinks
Tuition reimbursement program
Generous paid leave policies including unlimited PTO
Additional time off benefits include: volunteer days, parental leave, and a company-wide winter break from Christmas through New Years!
To learn more, visit 2U.com. #NoBackRow
Blockchain Infrastructure Security Researcher - Go/Rust
Remote Hacker Job
About us
Founded in 2015 with the mission to protect the open economy, OpenZeppelin is the world leader in securing blockchain applications and smart contracts.
It's Open Source Contract Libraries are a public good and industry standard for smart contract development.
OpenZeppelin's professional expertise integrates through clients' development lifecycles, so teams can plan, code, audit, deploy and operate projects faster and more safely.
Please note: Always refer to OpenZeppelin's official job page for the most accurate information about our open roles, as we have seen multiple third party job sites posting inaccurate information.
This opening is for a Security Researcher role within the company. If you would like to build and maintain the contracts library, Defender or any of our products, consider the product development openings.
What you'll be doing
Review Blockchain Infrastructure code for the top decentralized applications, and present findings and vulnerabilities that the protocol can have to the client.
Actively collaborate with other researchers to share findings related to Node Infrastructure audits.
Team up with one or two auditors and review code line by line and try to hack it.
Working on proposals to make code easier to understand and use in the future by sharing good practices
Conduct open-ended research around cutting edge blockchain technologies.
Paid time to conduct research and contribute to OpenZeppelin's projects and knowledge
Lead project estimations for large Blockchain Infrastructure codebases
You have
Hands-on and practical experience in one or more of the following areas: software development, cyber security, mathematics.
Experience with Rust or Golang.
Experience with Geth, Reth, Cosmos-sdk, Solana, or custom VMs.
Intellectual curiosity and the capability to learn complex topics
Above-average attention to detail skills.
The ability to work independently, with minimal supervision.
An advanced English level and great communication skills (oral and written).
Passion about the blockchain space and decentralization.
Ability to work collaboratively in a distributed team.
Nice to have
Experience in programming languages such as Solidity.
Experience performing code reviews.
Note
If you don't meet all of the listed requirements, but think you're a good fit for the position, please apply so we can review.
Logistics
Our interview process takes place on Zoom and tends to consist of the following stages:
Recruiter call (30 minutes)
Leadership interview (60 minutes)
Team member interview (60 minutes)
Paid work trial (lasting up to 10 days)
Reference checks
Please let us know if you require any accommodations for the interview process, and we'll do our best to provide assistance.
Benefits
Company in-person gatherings in different locations around the world 😎
Fully remote work 🌎
Flexible time off 🏝
Paid parental leave 💙
One time work-from-home equipment stipend of up to $500 USD 🪑
Medical insurance coverage 🏥
Learning & Development opportunities 🧠
Work with a global team in a fast-growing industry 🚀
At OpenZeppelin, we are an equal opportunity employer and we value different perspectives. We are committed to building a diverse workforce. This includes but is not limited to gender, race, sexual orientation, religion, national origin and other characteristics that make each one of us unique. In this uniqueness, we find the most value. Come join us!
Senior Security Researcher
Remote Hacker Job
About Us
Endor Labs is building the Application Security platform for the software development revolution. Modern software is complex and dependency-rich, making it increasingly difficult to pinpoint the risks that truly matter. Endor Labs solves this challenge by building a call graph of your entire software estate-enabling teams to clearly identify, prioritize, and fix critical risks faster.
Trusted by companies that are one or one hundred years old, Endor Labs secures code whether it was written by humans or AI, and whether it's 40-year old C++ code or cutting edge Bazel Monorepos. Endor Labs was founded by serial entrepreneurs Varun Badhwar and Dimitri Stiliadis, and is backed by leading VC firms such as Dell Technology Capital, Lightspeed, and Sierra Ventures.
About the Role
We are looking for a Senior Security Researcher to lead our offensive security research efforts in the domain of software supply chain security. This is a unique opportunity to work at the forefront of secure SDLC and software supply chain security, identifying zero-day vulnerabilities in software artifacts and CI/CD systems, analyzing attack trends, and influencing the next generation of security capabilities in our products.
This role requires deep technical expertise in vulnerability research, application security, reverse engineering, and offensive security techniques. The ideal candidate will also play a key role in publishing groundbreaking research through blogs, white papers, and speaking engagements at top security conferences.
How You'll Make an Impact
Conduct offensive security research on software supply chain threats, identifying and analyzing zero-day vulnerabilities.
Develop and refine exploit techniques to understand modern attack vectors targeting software supply chain through malicious code, 3rd party libraries, and CI/CD systems.
Work closely with Product Management to translate research findings into innovative security capabilities within Endor Labs' products.
Publish research findings through technical blogs, white papers, and industry-leading security conferences.
Collaborate with security engineers and developers to prototype and implement detection and mitigation strategies for emerging threats.
Contribute to the security community by developing open-source tools, methodologies, or frameworks that enhance software supply chain security.
Stay ahead of the latest threats, attacker methodologies, and evolving security trends to continuously refine our research efforts.
What You Bring to the Table
5+ years of experience in security research, vulnerability discovery, and offensive security.
Deep expertise in reverse engineering, exploit development, and software vulnerability analysis.
Strong understanding of software supply chain security, including package management systems, CI/CD pipelines, and dependency analysis.
Experience discovering and responsibly disclosing zero-day vulnerabilities.
Proven track record of publishing high-quality research or presenting at top security conferences (e.g., Black Hat, DEF CON, RSAC, BSides).
Proficiency in programming languages such as Python, Rust, or Go.
Strong analytical skills and the ability to conduct complex security research autonomously.
Excellent communication skills, both written and verbal, to convey technical concepts to diverse audiences.
Why Join Endor Labs?
Work with a world-class team dedicated to pushing the boundaries of security research.
Directly influence the security of modern software supply chains.
A culture that values innovation, collaboration, and continuous learning.
Competitive compensation, flexible work environment, and a generous benefits package.
Opportunity to present groundbreaking research and contribute to the global security community.
If you are excited about making a real impact in cybersecurity and shaping the future of software supply chain security, we'd love to hear from you!
Apply now to join our team of world-class security experts!
Cyber Defense Analyst (Level 2) - Second Shift
Remote Hacker Job
Description:Lockheed Martin Enterprise Operations is seeking a skilled Cyber Defense Analyst to join the Classified Cybersecurity Operations (C2Ops) Team in a highly visible enterprise environment that provides security operations center (SOC) support, cyber analysis, application development, and an extended hours support staff with the mission of defending the enterprise's classified computing assets.
Key Responsibilities:
* Serve as the initial point of contact for security operations floor activities
* Develop, maintain, tune, and monitor cybersecurity content to enhance detection and prevention capabilities
* Investigate computer and information security incidents to determine the extent of compromise to information and automated information systems
* Provide network forensic and intrusion detection support for high-technology investigations
* Document cyber incident analysis thoroughly at an operational level
* Support the detection, response, mitigation, and reporting of cyber incidents
* Maintain consistent and effective communication across the team
* Stay updated on tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding, network security, and encryption
* Ideal Candidate Profile:
The ideal candidate should have experience in monitoring and detection, as well as incident response, to support the detection, containment, and eradication of malicious activities targeting customer networks. The ability to work independently and as part of a team, with a strong background in a variety of cyber defense tools, processes, and technologies, is essential.
What's In It For You
From onsite to remote, we offer flexible work schedules to comprehensive benefits investing in your future and security, Learn more about Lockheed Martin's comprehensive benefits package here.
Do you want to be part of a company culture that empowers employees to think big, lead with a growth mindset, and make the impossible a reality? We provide the resources and give you the flexibility to enable inspiration and focus -if you have the passion and courage to dream big, work hard, and have fun doing what you love then we want to build a better tomorrow with you.
Basic Qualifications:
* Valid Secret level security clearance with investigation or CV date within 5 years with ability to obtain Top Secret clearance and pass a Counterintelligence Polygraph.
* Ability to successfully complete additional enhanced security review in accordance with Government contract requirements and it is a condition of employment that individuals hired into positions requiring program clearance obtain and maintain such clearance within sufficient time to allow Lockheed Martin to meet its business needs.
* Bachelor's degree from an accredited college in a related discipline, or equivalent experience/combined education, with 2 years of professional experience; or no years of professional experience with a related master's degree.
* Experience with standard security and network environment tools and applications (Splunk, Trellix ePO, ACAS/Tenable.sc, Tanium, Microsoft Sentinel) for use in supporting the detection, response, mitigation, and reporting of cyber incidents.
* Understanding of threat models, attacker tactics, techniques, and procedures, operating system security requirements, information system auditing, and conducting cyber focused investigations.
Desired Skills:
* Minimum of current Top Secret security clearance with ability to obtain a Counterintelligence Polygraph.
* Knowledge of other security disciplines and how they impact and interact with information system security.
* Experience with Splunk and the ability to write queries, create dashboards.
* Experience with QMulos Products.
* Experience with using and building Tanium products.
* Understanding of basic usage of languages such as Python, PowerShell, and Bash for automation and data analysis.
* Experience with network design processes, to include understanding of security objectives, operational objectives, and risk mitigation strategy for the information system.
* Recognized cloud proficiency and experience with Cloud Security (CCSP, AWS, CSA, CompTIA Cloud+, CCSK, or others).
* Experience working in an Information System Security Operations Center conducting incident response and recovery.
* Understanding of malware functionality, static and dynamic analysis, and ability to identify IOCs, attributes and understanding of signatures.
Security Clearance Statement: This position requires a government security clearance, you must be a US Citizen for consideration.
Clearance Level: Top Secret with Investigation or CV date within 5 years
Other Important Information You Should Know
Expression of Interest: By applying to this job, you are expressing interest in this position and could be considered for other career opportunities where similar skills and requirements have been identified as a match. Should this match be identified you may be contacted for this and future openings.
Ability to Work Remotely: Part-time Remote Telework: The employee selected for this position will work part of their work schedule remotely and part of their work schedule at a designated Lockheed Martin facility. The specific weekly schedule will be discussed during the hiring process.
Work Schedules: Lockheed Martin supports a variety of alternate work schedules that provide additional flexibility to our employees. Schedules range from standard 40 hours over a five day work week while others may be condensed. These condensed schedules provide employees with additional time away from the office and are in addition to our Paid Time off benefits.
Schedule for this Position: 4x10 hour day, 3 days off per week
Lockheed Martin is an equal opportunity employer. Qualified candidates will be considered without regard to legally protected characteristics.
The application window will close in 90 days; applicants are encouraged to apply within 5 - 30 days of the requisition posting date in order to receive optimal consideration.
At Lockheed Martin, we use our passion for purposeful innovation to help keep people safe and solve the world's most complex challenges. Our people are some of the greatest minds in the industry and truly make Lockheed Martin a great place to work.
With our employees as our priority, we provide diverse career opportunities designed to propel, develop, and boost agility. Our flexible schedules, competitive pay, and comprehensive benefits enable our employees to live a healthy, fulfilling life at and outside of work. We place an emphasis on empowering our employees by fostering an inclusive environment built upon integrity and corporate responsibility.
If this sounds like a culture you connect with, you're invited to apply for this role. Or, if you are unsure whether your experience aligns with the requirements of this position, we encourage you to search on Lockheed Martin Jobs, and apply for roles that align with your qualifications.
Experience Level: Experienced Professional
Business Unit: CORPORATE HEADQUARTERS
Relocation Available: Possible
Career Area: Cyber Security
Type: Full-Time
Shift: Second
Securities Research Analyst
Remote Hacker Job
Do you have experience in equity research and analysis or capital markets? Fisher Investment's Securities Research Group supports the portfolio management team, which manages over $250 billion in AUM and serves high-net-worth private clients and some of the world's preeminent institutions. We are now searching for finance and research-oriented professionals to join our team of Securities Research Analysts.
The Opportunity:
Securities Analysts guide portfolio outperformance through timely and impactful coverage of stock holdings across firm strategies and industry/thematic research for the IPC. Analysts cover specific industries and learn about trends in their space.
You'll cultivate research and market knowledge alongside motivated peers who share a passion for markets and learn the quantitative and qualitative skills used by successful analysts with in-depth training and a diverse, supportive environment. You will develop an expertise in your sector/industry coverage and an understanding of emerging trends and how they relate to FI's key top-down themes. You will report to the Securities Research Manager. You'll deliver timely and relevant research to the IPC and create impactful portfolio recommendations.
The Day-to-Day:
Develop a comprehensive knowledge of our investment philosophy, process, portfolio themes and rationales
Build expertise on an assigned sector to understand how market events impact forward relative returns, and develop and hone new and/or existing portfolio themes and views
Provide the Investment Policy Committee (IPC) with regular and ad hoc performance analysis and commentary, and proactively help to identify industries and stocks likely to outperform selected benchmarks
Participate in Investment Roundtables, Fisher Client Forums, and client/prospect meetings, and provide critical commentary to our Private Client Group, Fisher International and Institutional Group via written and oral communications
Your Qualifications:
2+ years of professional equity research experience
Experience working in a buy and/or sell-side firm conducting applicable qualitative equity research
Experience communicating with multiple audiences over several platforms, including executive-level stakeholders
Communicate in a Relevant, Concise, and Efficient manner to positively impact portfolios
Have the intellectual flexibility and drive to rapidly learn and test new ways of thinking, doing and communicating, while being comfortable with ambiguity
Experience writing equity research reports utilizing data and qualitative findings to support investment decision-making
Experience working with Bloomberg, Factset, Excel, or similar tools to produce applicable insights-centric to equity performance
Compensation:
$85,000 - $125,000 base salary per year in the state of WA - New hires should expect to start at the lower end of the range depending on experience
Eligible for a discretionary bonus based on firm and individual performance
Why Fisher Investments:
We work for a bigger purpose: bettering the investment universe. We take great pride in our inclusive culture, our learning and development framework customized for every employee, and our Great Place to Work Certification. It's the people that make the Fisher purpose possible, and we invest in them by offering exceptional benefits like:
100% paid medical, dental and vision premiums for you and your qualifying dependents
A 50% 401(k) match, up to the IRS maximum
20 days of PTO, plus 10 paid holidays
Family Support programs including 8 week Paid Primary Caregiver Leave, $10,000 fertility, family forming, and hormonal health assistance, and back-up child, adult, and elder care
This is an in-office role. Based on your role, tenure, and performance eligibility you may have the opportunity to participate in our hybrid work from home program. This program is subject to change.
FISHER INVESTMENTS IS AN EQUAL OPPORTUNITY EMPLOYER
Security Researcher
Remote Hacker Job
Prelude Research is a small team of security researchers and software developers working to reinvent the way we protect endpoints in a world where threats are complex, emergent, and accelerating. Backed by Sequoia Capital, Insight Partners, and other leading investors, we are building an advanced security solution currently in early-access release. Greater detail about this initiative will be shared as conversations progress.
Role
Prelude is seeking a Principal Security Researcher to conduct in-depth technical analysis of modern and adaptive adversary tactics, Windows internals, and operating system telemetry sources, enabling the development of relevant tests and effective detections within Prelude's products.
As a subject matter expert, you will specialize in one or more areas crucial to Prelude's research, such as operating system internals, reverse engineering, malware development, offensive security, or detection engineering. Success in this role hinges on delivering high-quality research, driving innovation, adapting swiftly, and fostering collaboration across teams and business units.
Given the confidential nature of our work, we require an NDA to be signed after an introductory call if there is mutual interest in moving forward.
Responsibilities
Conduct in-depth research on operating system internals to pinpoint sources of defensive telemetry crucial for detecting adversary tactics
Analyze modern adversary tradecraft, deciphering technique relevance, inner workings, and detectability
Translate and implement research findings into actionable improvements for Prelude's products
Produce high-quality, public-facing security research content, including blog posts and conference talks
Stay abreast of cutting-edge offensive and defensive security techniques through continuous self-study and research
Serve as the subject matter expert in adversary tradecraft and security operations, supporting other business units on their projects as needed
Support other Researchers on the team with their research and actively engage in team-driven initiatives
Skills and Experience
Deep knowledge of Windows operating system internals and reverse engineering
Our most commonly used tools: IDA Pro, Binary Ninja, Ghidra, and WinDbg
5+ years of experience in one or more of the following areas:
Offensive security, specifically red team operations or purple teaming
Detection engineering, specifically, writing robust, production-scale queries in any major EDR
Systems programming, ideally using Rust or C/C++
Strong understanding of how modern EDRs/XDRs work internally
Ability to explain complex technical concepts and research outputs to both executive-level and highly technical consumers
Aptitude for working in a fast-paced, adaptive startup environment
Nice to Haves
Prior experience in enterprise software development using Rust
Prior vulnerability research and exploit development experience
Kernel-mode software (i.e., driver) development experience
Working at Prelude
Prelude is a fully remote team across the US & Canada, built on trust, autonomy, and excellence. We empower our team to take ownership, move with purpose, and continuously improve. Our culture values top performers who align with our mission and embrace high standards. We offer generous healthcare, flexible PTO, and home-office support, ensuring our team has the freedom and resources to thrive. While we move fast, we prioritize quality, collaboration, and remain committed to building impactful security solutions with precision.
Senior Cyber Defense Analyst - Pratt and Whitney (Remote)
Remote Hacker Job
Country: United States of America Remote RTX Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Its 185,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Arlington, VA.
The following position is to join our RTX Enterprise Services team:
Summary of Role
The RTX Enterprise Cybersecurity team is seeking a self-motivated, experienced cybersecurity professional to join as a Senior Cyber Defense Analyst (CDA) in support of the RTX Pratt and Whitney business. This highly visible role is crucial to the overall success of the RTX Enterprise and business cybersecurity program.
You will collaborate closely with the Cyber Defense Leader (CDL) and the Business Unit (BU) Functions & Compliance Leaders (CCLs) to ensure the standard delivery, execution, and integration of cyber defense capabilities within their assigned BUs.
You will work to understand the unique cyber defense needs and environments of their BU/Function/Region, enhancing the delivery of cyber defense capabilities. You will be responsible for implementing these services to mitigate cyber and compliance risks through effective processes, tools, and organizational relationships.
What You Will Do
* Represent RTX Enterprise Cyber Defense functional services to ensure alignment and consumption of resources, priorities, and support across the Pratt and Whitney business unit (BU) and sub-functions. Additionally, advocate for BU/function/region business cyber defense needs to drive appropriate prioritization within RTX Enterprise Cybersecurity.
* Maintain situational awareness of cyber events and incidents impacting Pratt and Whitney BU, represent the business area during crisis management engagements, and coordinate response activities in collaboration with RTX CIRT within the business area.
* Translate knowledge of the supported business area and its critical programs into specific threat intelligence requirements that can initiate awareness campaigns or drive significant actions within the business area.
* Provide input into Sub-BU threat detection content and collaborate on threat hunt or red team engagements when impacting your business area.
* Collaborate with Cyber Compliance Leaders (CCL) and system/application owners to drive the remediation of identified vulnerabilities within your business area.
* Regularly provide cyber defense updates and reports to demonstrate progress towards assigned tasks, expected outcomes, and identify the need to address any challenges.
* Assist the CDL and CCLs by providing strategic and tactical guidance to ensure the effective delivery of the full portfolio of Cyber Defense capabilities.
* Collaborate with cross-functional teams to resolve crisis management events and implement risk mitigation activities.
* Support process improvement initiatives to enhance integration between RTX businesses, Cyber Defense, and CISO teams.
* Travel up to 15%
Qualifications You Must Have
* Typically requires a University Degree or equivalent experience and a minimum of 10 years of experience, or an Advanced Degree and a minimum of 7 years of experience.
* 7+ years in information security practices/frameworks including identifying risks, emerging cyber security threats and tactics, and risk mitigation processes.
* 7+ years with infrastructure components, cloud environments (AWS and Azure) and operational technology (OT)
* 7+ years in at least one cybersecurity discipline such as vulnerability management, incident response, endpoint protection, threat intelligence and application security.
* The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance.
Qualifications We Prefer
* Ability to adapt to change and apply emotional intelligence to remain calm under pressure.
* Capable of being able to manage oneself and effectively in a collaborative team.
* Proven experience with cybersecurity tools related to vulnerability management, SIEM, EDR, DLP, etc.
* Certified security expert, such as CISSP, GCIH, CISA, GEVA, or similar certifications.
* Proven communication experience at the Senior/Executive level.
* Demonstrated knowledge of cybersecurity processes and operations.
What We Offer: Whether you're just starting out on your career journey or are an experienced professional, we offer a robust total rewards package with compensation; healthcare, wellness, retirement and work/life benefits; career development and recognition programs. Some of the benefits we offer include parental (including paternal) leave, flexible work schedules, achievement awards, educational assistance and child/adult backup care.
Learn More & Apply Now!
Work Location: Remote
Please consider the following role type definition as you apply for this role:
Remote: This position is currently designated as remote. However, the successful candidate will be required to work from one of the 50 U.S. states (excluding U.S. Territories). Employees who are working in Remote roles will work primarily offsite (from home). An employee may be expected to travel to the site location as needed
The salary range for this role is 124,000 USD - 250,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.
Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.
Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.
This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.
RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
Corporate Cyber Defense Analyst (Remote)
Remote Hacker Job
Country:
United States of America Remote
RTX Corporation is an Aerospace and Defense company that provides advanced systems and services for commercial, military and government customers worldwide. It comprises three industry-leading businesses - Collins Aerospace Systems, Pratt & Whitney, and Raytheon. Its 185,000 employees enable the company to operate at the edge of known science as they imagine and deliver solutions that push the boundaries in quantum physics, electric propulsion, directed energy, hypersonics, avionics and cybersecurity. The company, formed in 2020 through the combination of Raytheon Company and the United Technologies Corporation aerospace businesses, is headquartered in Arlington, VA.
The following position is to join our RTX Enterprise Services team:
Summary of Role
The RTX Enterprise Cybersecurity team is seeking a self-motivated, experienced cybersecurity professional to join as a Cyber Defense Analyst (CDA) in support of the RTX Corporate Business. This highly visible role is crucial to the overall success of the RTX Enterprise and business cybersecurity program.
The CDA will collaborate closely with the Cyber Defense Leader (CDL) and the Business Unit (BU) Functions & Compliance Leaders (CCLs) to ensure the standard delivery, execution, and integration of cyber defense capabilities within their assigned BUs.
The ideal candidate will work to understand the unique cyber defense needs and environments of their BU/Function/Region, enhancing the delivery of cyber defense capabilities. They will be responsible for implementing these services to mitigate cyber and compliance risks through effective processes, tools, and organizational relationships.
What You Will Do
Represent RTX Enterprise Cyber Defense functional services to ensure alignment and consumption of resources, priorities, and support across Corporate business unit (BU) and sub-functions. Additionally, advocate for BU/function/region business cyber defense needs to drive appropriate prioritization within RTX Enterprise Cybersecurity.
Maintain situational awareness of cyber events and incidents impacting Corporate BU, represent the business area during crisis management engagements, and coordinate response activities in collaboration with RTX CIRT within the business area.
Translate knowledge of the supported business area and its critical programs into specific threat intelligence requirements that can initiate awareness campaigns or drive significant actions within the business area.
Provide input into Sub-BU threat detection content and collaborate on threat hunt or red team engagements when impacting their business area.
Collaborate with Cyber Compliance Leaders (CCL) and system/application owners to drive the remediation of identified vulnerabilities within their business area.
Regularly provide cyber defense updates and reports to demonstrate progress towards assigned tasks, expected outcomes, and identify the need to address any challenges.
Assist the CDL and CCLs by providing strategic and tactical guidance to ensure the effective delivery of the full portfolio of Cyber Defense capabilities.
Collaborate with cross-functional teams to resolve crisis management events and implement risk mitigation activities.
Support process improvement initiatives to enhance integration between RTX businesses, Cyber Defense, and CISO teams.
Travel up to 15%
Qualifications You Must Have
Typically requires a University Degree or equivalent experience and a minimum of 8 years of experience, or an Advanced Degree and a minimum of 5 years of experience.
5+ years in information security practices/frameworks including identifying risks, emerging cyber security threats and tactics, and risk mitigation processes.
5+ years with infrastructure components, cloud environments (AWS and Azure) and operational technology (OT)
5+ years in at least one cybersecurity discipline such as vulnerability management, incident response, endpoint protection, threat intelligence and application security.
The ability to obtain and maintain a U.S. government issued security clearance is required. U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance.
Qualifications We Prefer
Ability to adapt to change and apply emotional intelligence to remain calm under pressure.
Capable of being able to manage oneself and effectively in a collaborative team.
Proven experience with cybersecurity tools related to vulnerability management, SIEM, EDR, DLP, etc.
Certified security expert, such as CISSP, GCIH, CISA, GEVA, or similar certifications.
Proven communication experience at the Senior/Executive level.
Demonstrated knowledge of cybersecurity processes and operations.
What We Offer: Whether you're just starting out on your career journey or are an experienced professional, we offer a robust total rewards package with compensation; healthcare, wellness, retirement and work/life benefits; career development and recognition programs. Some of the benefits we offer include parental (including paternal) leave, flexible work schedules, achievement awards, educational assistance and child/adult backup care.
Learn More & Apply Now!
Work Location: Remote
Please consider the following role type definition as you apply for this role:
Remote: This position is currently designated as remote. However, the successful candidate will be required to work from one of the 50 U.S. states (excluding U.S. Territories). Employees who are working in Remote roles will work primarily offsite (from home). An employee may be expected to travel to the site location as needed.
The salary range for this role is 101,000 USD - 203,000 USD. The salary range provided is a good faith estimate representative of all experience levels. RTX considers several factors when extending an offer, including but not limited to, the role, function and associated responsibilities, a candidate's work experience, location, education/training, and key skills.Hired applicants may be eligible for benefits, including but not limited to, medical, dental, vision, life insurance, short-term disability, long-term disability, 401(k) match, flexible spending accounts, flexible work schedules, employee assistance program, Employee Scholar Program, parental leave, paid time off, and holidays. Specific benefits are dependent upon the specific business unit as well as whether or not the position is covered by a collective-bargaining agreement.Hired applicants may be eligible for annual short-term and/or long-term incentive compensation programs depending on the level of the position and whether or not it is covered by a collective-bargaining agreement. Payments under these annual programs are not guaranteed and are dependent upon a variety of factors including, but not limited to, individual performance, business unit performance, and/or the company's performance.This role is a U.S.-based role. If the successful candidate resides in a U.S. territory, the appropriate pay structure and benefits will apply.RTX anticipates the application window closing approximately 40 days from the date the notice was posted. However, factors such as candidate flow and business necessity may require RTX to shorten or extend the application window.
RTX is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or veteran status, or any other applicable state or federal protected class. RTX provides affirmative action in employment for qualified Individuals with a Disability and Protected Veterans in compliance with Section 503 of the Rehabilitation Act and the Vietnam Era Veterans' Readjustment Assistance Act.
Privacy Policy and Terms:
Click on this link to read the Policy and Terms
Computer Network Defense (CND) Analyst
Hacker Job In Columbus, OH
Are you a Top Secret cleared mid-level cyber security professional looking to grow your career in a challenging yet rewarding environment with an employer who offers opportunities for growth while placing a high importance on providing a supportive management team? If so, we may have the perfect Computer Network Defense (CND) opening for you in Columbus, OH.
Due to the nature of the secure work being performed, the job is onsite in East Columbus, 43213, with NO remote or hybrid work options. However, we do have three shift work options:
· Shift 1: 8am - 6pm
· Shift 2: 2pm - 12 Midnight
· Shift 3: 10pm - 8am
The selected candidates will:
· Perform actions to protect, monitor, detect, analyze, and respond to unauthorized activity within assigned information systems and computer networks.
· Employ Cybersecurity capabilities and deliberate actions to respond to a CND alert or emerging situational awareness/threat.
· Be asked to serve as an expert on CND requirements and compliance to such requirements by using IA tools and techniques to perform compliance analysis and correlation, tracking and remediation, coordination and escalating CND non-compliance.
· Provide technical analysis and sustainment support for the enterprise for IA tools and applications and assist with the application of Defense-In-Depth signatures and perimeter defense controls to diminish network threats.
Experience Requirements:
Five (5) years of relevant experience or related formal education
Two (2) years of experience performing root cause analysis of cybersecurity events and incidents
Two (2) years of experience analyzing network traffic and/or system logs
Skills / Other Requirements:
Must possess a current DOD Top Secret Clearance and be eligible for SCI access
DOD Approved 8570/8140 Baseline Certification: Category IAT Level II (acceptable certifications are: CompTIA Sec+ CE, CompTIA CySA+, CCNA Security, GICSP, GSEC, SSCP)
Must also have, or be willing to obtain prior to work start, a DOD Approved 8570/8140 CSSP Certification: CSSP-IR (acceptable certifications are: CompTIA CySA+, CompTIA PenTest+, CEH, CFR, GCFA, GCIH and SCYBER)
Must possess written and verbal skills to appropriately document and brief Cybersecurity Incidents
Working knowledge of at least two of the following cybersecurity areas:
1. Firewall
2. IDS/IPS
3. Host based antivirus
4. Vulnerability Management
5. Forensics
6. Malware Analysis
7. Device Hardening
Understanding of Defense-in-Depth
The ability to build and read scripts in languages such as Perl, Bash, Powershell, Ruby, Python is a nice plus, but not mandatory.
If you feel you meet the above requirements and the related experience is reflected in your resume, please apply! We would like to consider you and open up a line of communication by providing further details and learning more about your background and career interests.
At GovStaff, we operate in strict confidence: We do not share resumes, names, or applications outside of GovStaff, unless given express consent by each candidate. We welcome all cleared professionals to our GovStaff Network, regardless of current job seeking status. GovStaff, and all our business partners, adhere to all EEOC regulations.
Computer Network Defense (CND) Analyst [JOB ID: 20241022]
Hacker Job In Columbus, OH
Top Secret Clearance Jobs is dedicated to helping those with the most exclusive security clearance find their next career opportunity and get interviews within 48 hours. Phoenix Cyber is looking for Computer Network Defense (CND) Analysts to support a government client. This position in onsite in Columbus, OH.
Job Responsibilities
Performs actions to protect, monitor, detect, analyze, and respond to unauthorized activity within assigned information systems and computer networks.
Employs Cybersecurity capabilities and deliberate actions to respond to a CND alert or emerging situational awareness/threat.
Serves as an expert on CND requirements and compliance to such requirements by using IA tools and techniques to perform compliance analysis and correlation, tracking and remediation coordination, and escalating CND non-compliance.
Provides technical analysis and sustainment support for the enterprise for IA tools and applications and assists with the application of Defense-In-Depth signatures and perimeter defense controls to diminish network threats.
Required Skills
Five years of relevant experience
Top Secret Clearance
CSSP Certification: CSSP-IR (CySA, CEH etc)
Computing Environment Cert: Incident Response
Must possess experience working within a SIEM
Must possess experience analyzing logs from multiple sources such as system event logs, F5, Firewall, etc.
Must possess experience reviewing and analyzing network traffic through packet captures
Must possess written and verbal skills to appropriately document and brief cybersecurity incidents
Phoenix Cyber is a national provider of cybersecurity engineering services, operations services, sustainment services and managed security services to organizations determined to strengthen their security posture and enhance the processes and technology used by their security operations team.
Phoenix Cyber is an equal opportunity employer and complies with Executive Order 11246, Section 503 of the Rehabilitation Act of 1973, the Vietnam Era Veteran's Readjustment Assistance Act (VEVRAA), all amendments to these regulations, and applicable executive orders, federal, and state regulations. Applicants are considered without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, and/or veteran status.
Phoenix Cyber participates in E-Verify to confirm the employment eligibility of all newly-hired employees. To learn more about E-Verify, including your rights and responsibilities, go to *************************
Powered by JazzHR
Computer Network Defense(CND)Analyst
Hacker Job In Columbus, OH
Overall Assignment Description:
The CND Analyst will perform actions to protect, monitor, detect, analyze and respond to unauthorized activity within assigned information systems and computer networks. Duties include: Employs Cybersecurity capabilities and
deliberate actions to respond to a CND alert or emerging situational awareness/threat.
Serves as an expert on CND requirements and compliance to such requirements by using IA
tools and techniques to perform compliance analysis and correlation, tracking and remediation,
coordination and escalating CND non-compliance.
Provides technical analysis and sustainment support for the enterprise for IA tools and
applications, and assists with the application of Defense-In-Depth signatures and perimeter
defense controls to diminish network threats
Skills and Experience:
Required:
Must possess a current DOD Top Secret Clearance and be eligible for SCI and IT-1 access at
time of proposal submission
Five (5) years of relevant experience or related formal education
Two (2) years of experience performing root cause analysis of cybersecurity events and incidents
Two (2) years of experience analyzing network traffic and/or system logs
DOD Approved 8570/8140 Baseline Certification : Category IAT Level II
DOD Approved 8570/8140 CSSP Certification : CSSP-IR
Must possess written and verbal skills to appropriately document and brief Cybersecurity
Incidents
Working knowledge of at least two cybersecurity areas:
Firewall
IDS/IPS
Host based antivirus
Vulnerability Management
JETS RFQ SP4709-24-Q-0002
DLA Cyber Emergency Response Team (CERT) Cyber Security Service Provider (CSSP)
Support
Forensics
Malware Analysis
Device Hardening
Understanding of Defense-in-Depth
Ability to build and read scripts in languages such as Perl, Bash, Powershell, Ruby, Python