This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
As a Limited Cyberspace Operator, you will support cyberspace operations by developing and conducting access development, target engagement, and support of effects delivery on behalf of national security objectives. This role emphasizes tradecraft precision, long-term operational viability, counterintelligence awareness, and compartmented mission execution.
Job Responsibility:
Develop and conduct access development, target engagement, and support of effects delivery on behalf of national security objectives
6+ years of experience supporting and conducting cyber operations
Experience with vulnerability enumeration and exploitation frameworks, including Burp Suite, Metasploit, Cobalt Strike, and Mythic
Experience assessing large-scale enterprise environments with diverse technologies, including Windows and non-Windows systems, hybrid infrastructures, segmented networks, and non-traditional domain architectures
Knowledge of Linux/Unix operating systems and endpoint forensic artifacts, including storage subsystems, package management, system logging, persistence mechanisms, and incident response or threat hunting methodologies
Knowledge of modern web application security principles and common attack vectors, including authentication flaws, injection vulnerabilities, insecure deserialization, SSRF, XSS, and access control weaknesses aligned with OWASP guidance
Ability to navigate complex enterprise networks, including pivoting across systems, enumerating logging posture, differentiating secure subnets, and maintaining ingress or egress communication paths
TS/SCI clearance with a polygraph
Bachelor’s degree and 2+ years of experience conducting or planning cyber operations, or 6+ years of experience conducting or planning cyber operations in lieu of a degree
Nice to have:
Experience with commercial offensive security training platforms such as Hack The Box, TryHackMe, and Proving Grounds, or participation in commercial bug bounty programs
Experience with databases, backend systems, and supporting infrastructure technologies
Experience scripting and programming focused on automating forensic, endpoint, and network operations, including repetitive analysis, system diagnostics, secure connectivity management, and incident response workflows
Knowledge of corporate network security best practices across network, server, and endpoint environments
Industry Certifications such as OSCP, OSWE, or GXPN Certification
What we offer:
Health, life, disability, financial, and retirement benefits