Careers

Security Professionals wanted!

The Revolutionary Security Team assists Global 1000 and critical infrastructure clients by quantifying and reducing risk to fortify network defensive postures against all cyber threats.  From compartmentalized, safety-critical systems on process control networks to technology stacks hosted on globally-distributed infrastructure, the work we do secures every facet of our interconnected world.

With a people-first strategy, exciting projects, and an experienced leadership team, your career awaits at Revolutionary Security. If you’re up for the challenge, please submit your resume by selecting “Apply Now!” located at the bottom of the specific job posting or for general career inquiries please contact us at careers@rev-sec.com.

Introduction: This career opportunity is to join the Revolutionary Security team and make an impact transforming our clients’ cyber security defense capabilities across people, process, and technology.  This position supports the Enterprise Security Transformation practice at Revolutionary Security.

Job Description: A highly collaborative, fast paced, and agile team responsible for providing enterprise security transformation consulting services to clients across multiple industries, including; chemical, law firms, technology & communications, financial services, manufacturing, transportation, health & life sciences, oil & gas, and utilities.  Transformation services span across enterprise cyber defense, security operation centers, incident response, threat monitoring, vulnerability management, and cyber intelligence functions.  In this position the candidate will have the opportunity to lead and execute enterprise wide transformation projects that often include Security Operation Centers (SOC) and Cyber Threat Intelligence functions.

Required Qualifications:

  • Experience working in a Security Operations Center (SOC) or similar enterprise security position, or providing consulting services to support the design and development of cyber defense security functions.
  • Must be self-motivated and able to work both independently and as part of a team.
  • Previous experience designing and developing processes and procedures to include analyst workflows, run books, play books, etc.
  • Experience working across organizational lines of business to implement mitigations, remediations, and countermeasures resulting from cyber threat intrusions.
  • Practical experience and knowledge of various network and system security technologies to include SIEM, data analytics platforms, end-point tools, network technologies and appliances.
  • Previous experience leading technical projects and ensuring documented requirements are delivered with excellence.
  • Previous experience working with, designing, implementing, and operating knowledge management and/or cyber threat intelligence systems.
  • Previous experience developing and designing custom metrics packages disseminated to senior and executive leadership teams.
  • Knowledge of industry recognized analysis frameworks (Diamond Model, NIST Incident Response, Kill Chain, etc.).
  • Strong verbal and written communication and client intimacy skills with experience briefing corporate executives and professionals.
  • Bachelor’s Degree in an IT related field and/or equivalent work experience.

Desired Qualifications:

  • Relevant certifications (CISSP, CEH, GCIH, GCFE, etc.).
  • Previous experience providing consulting services to Fortune/Global 1000 clients.
  • Previous experience designing, organizing, and executing security table top exercises and training workshops.
  • Hands on experience working with Incident Response, Threat Monitoring, and Cyber Threat Intelligence functions.
  • Previous experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents.
  • Previous experience executing cyber security assessments and developing strategic implementation plans to improve and advance organizational cyber security capabilities.
  • Previous experience working with various SIEM technologies to include Splunk ES, IBM QRadar, HP ArcSight, and/or McAfee Nitro.
  • Previous experience working within Operational Technology (OT) Networks to include Integrated Controls Systems (ICS), SCADA, and Process Control Networks (PCN).
  • Previous experience developing proposals, statements of work, and general content to support business capture.
  • Previous experience with Business and/or Organizational Change Management.
  • Master’s Degree in an IT related field.

Position Type: Salaried / Exempt.  Position level and compensation commensurate with candidate’s knowledge and professional experience.

Primary Location: Remote/Virtual within Continental US

Travel Requirement: Up to 50%

Revolutionary Security LLC is an Equal Opportunity Employer

Apply Now!

Introduction: This career opportunity is to join the Revolutionary Security team and make an impact transforming the cybersecurity capabilities for our enterprise clients.  This position supports the Security Assessments & Strategy practice at Revolutionary Security.

Job Description: Our highly-collaborative, fast-paced, and agile team is responsible for providing consulting services in the form of security assessments and strategy development activities to clients across multiple industries, including; chemical, law firms, technology & communications, financial services, manufacturing, transportation, health & life sciences, oil & gas, and utilities.  Assessments vary from standards-based models (e.g., the NIST Cybersecurity Framework) to tailored, intensive cyber defense assessments.  In this position, the candidate will have the opportunity to lead and execute enterprise-wide assessments and strategic projects that typically span the entirety of the client’s technology footprint.  The ideal candidate will be knowledgeable regarding security standards and technologies, experienced with designing and implementing security controls and solutions, diligent and thorough in generating written work products, and adept at interacting with clients at all levels of the organization.

Required Qualifications:

  • Experience providing cybersecurity consulting services or performing significant roles within enterprise security organizations.
  • Experience performing assessments and/or audits, including the authoring of detailed reports containing findings and recommendations to enhance the organization’s cybersecurity programs.
  • Experience developing strategic roadmaps, including the prioritization of high-value security initiatives and rationalization of investments.
  • Experience working across organizational lines of business to implement enhanced security controls and defensive mitigations.
  • Previous experience developing and delivering briefings to senior and executive leadership teams.
  • Knowledge of prevailing industry standard security control frameworks, including the NIST Cybersecurity Framework, CIS Critical Security Controls, etc.
  • Knowledge of various security program functions including: Cyber Architecture & Engineering, Security Operations, Incident Response, Cyber Threat Intelligence, Threat & Vulnerability Management, Identity & Access Management, Governance, Risk & Compliance, Security Education & Awareness, etc.
  • Knowledge of various network, system, and application security technologies including: SIEM, Firewall, IDS/IPS, Anti-Virus, DLP, Email Security Gateway, Web Proxy, Malware Sandbox, Vulnerability Scanner, EDR, WAF, CASB, etc.
  • Experience leading technical projects and ensuring contractual requirements are delivered with excellence.
  • Strong Microsoft Office skills, including Word, Excel, PowerPoint, OneNote, Visio, and Project.
  • Strong communication (both verbal and written), as well as the capacity to build strong relationships with client executive and technical leadership.
  • Self-motivated, able to work both independently and as part of a team.
  • Bachelor’s Degree in a technology-related field and/or equivalent work experience.

Desired Qualifications:

  • Relevant information security certifications such as CISSP, GCCC, GCIH, GCFE, CISM, CISA, and CEH.
  • Experience providing consulting services to Fortune/Global 1000 clients.
  • Experience designing, organizing, and executing security table top exercises and training workshops.
  • Experience designing and developing processes and procedures to include cyber analyst workflows, run books, playbooks, etc.
  • Experience designing, implementing, and operating enterprise-class solutions for network, server, endpoint, or application security domains.
  • Knowledge of industry-recognized cyber analysis frameworks (Diamond Model, ATT&CK, Kill Chain, NIST Incident Response, etc.).
  • Experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents.
  • Experience with offensive security testing and assessment tools and platforms such as Dradis, Nmap, Nessus, Metasploit, and Kali.
  • Experience working within Operational Technology (OT) networks, to include ICS, SCADA, and/or PCN environments.
  • Experience working within physical security operations environments and technologies.
  • Experience working with specialized industry cybersecurity standards, including FFIEC CAT, DHS CSET, ISO 27000 series, IEC-62443, DoE C2M2, NERC-CIP, and NRC RG 5.71/NEI 08-09
  • Experience developing proposals and statements of work to support business growth.
  • Experience with business and/or technology change management programs.
  • Master’s Degree in a technology-related field.

Position Type: Salaried / Exempt.  Position level and compensation commensurate with candidate’s knowledge and professional experience.

Primary Location: Remote/Virtual within Continental US

Travel Requirement: Up to 50%

Revolutionary Security LLC is an Equal Opportunity Employer

Apply Now!

Introduction: This career opportunity is to join the Revolutionary Security team and make an impact defending corporate networks from advanced and targeted attacks.  This position supports the Security Operations Center (SOC) Operations practice at Revolutionary Security.

Job Description: A highly collaborative, fast paced, and agile team responsible for providing incident response and cyber defense services to clients across multiple industries, including; chemical, law firms, technology & communications, financial services, manufacturing, transportation, health & life sciences, oil & gas, and utilities.  SOC Operations provides the opportunity to work in dedicated SOC environments with a focus on threat identification, incident response, cyber threat intelligence infusion, and mitigations to ensure defensive resiliency.   The incident response role is primarily responsible for system based defense to include forensic analysis of compromise devices, endpoint log analysis, and enforcement of remediation activities across the organization.  Daily activities will include collection and analysis of potentially compromised systems, malware analysis, root cause analysis, and remediation efforts.  In this role, candidates are expected to work collaboratively in a teaming environment with various touchpoints and handoffs.

Required Qualifications:

  • Prior experience working in a Security Operations Center or similar environment providing incident response, system forensics, threat determination, and driving mitigations processing and tracking.
  • Must be self-motivated and able to work both independently and as part of a team.
  • Previous experience triaging incidents resulting from internal handoffs, validated compromises, and user reported intrusions.
  • Knowledge of the incident response lifecycle from identification to recovery and validation of incident scope; lateral movement evaluation, indicator based hunting, and root cause analysis.
  • Experience working across organizational lines of business to implement mitigations, remediation’s, and countermeasures resulting from cyber threat intrusions.
  • Knowledge of the cyber threat landscape to include different types of adversaries, campaigns, and the motivations that drive them.
  • Previous experience working with and documenting analysis results in a knowledge or intelligence management system.
  • Previous experience working with automated malware analysis technologies such as Fireeye MAS, Joe Sandbox, etc.
  • Knowledge of industry recognized analysis frameworks (Diamond Model, Kill Chain, NIST Incident Response, etc.).
  • Strong verbal and written communication and client intimacy skills with experience briefing corporate executives and technical professionals.
  • Bachelor’s Degree in an IT related field and/or equivalent work experience.

Desired Qualifications:

  • Relevant certifications (Security +, CISSP, GSEC, GCIH, GCFE, GREM, GCED, GNFA, etc.).
  • Previous experience working in Security Operations Centers.
  • Hands on experience working with Incident Response and Cyber Threat Intelligence functions.
  • Previous experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents.
  • Previous experience working with various forensics technologies to include EnCase, FTK, etc.
  • Previous experience working with network tools and technologies such as firewall (FW), proxies, IPS/IDS devices, full packet capture (FPC), and email platforms.
  • Experience and knowledge conducting cyber threat analysis originating from phishing emails.
  • Previous experience conducting static, dynamic, and reverse engineering malware analysis.
  • Previous experience supporting incident response of Operational Technology (OT) Networks to include Integrated Controls Systems (ICS), SCADA, and Process Control Networks (PCN).
  • Master’s Degree in an IT related field.

Position Type: Salaried / Exempt.  Position level and compensation commensurate with candidate’s knowledge and professional experience.

Primary Location: On-site at client locations within the continental United States

Travel Requirement: Minimal travel required for on-site positions

Revolutionary Security LLC is an Equal Opportunity Employer

Apply Now!

Introduction: This career opportunity is to join the Revolutionary Security team and make an impact defending corporate networks from advanced and targeted attacks.  This position supports the Security Operations Center (SOC) Operations practice at Revolutionary Security.

Job Description: A highly collaborative, fast paced, and agile team responsible for providing cyber threat intelligence and reporting services to clients across multiple industries, including; chemical, law firms, technology & communications, financial services, manufacturing, transportation, health & life sciences, oil & gas, and utilities.  SOC Operations provides the opportunity to work in dedicated SOC environments with a focus on threat identification, incident response, cyber threat intelligence infusion, and mitigations to ensure defensive resiliency.    The cyber threat intelligence analyst is primarily responsible for processing internal and external intelligence for purposes of knowledge retention, network threat hunting, adversarial campaign attribution, and proactive mitigation processing.  Daily activities will include sourcing, processing, analyzing, reporting, and disseminating threat intelligence across organizational lines while providing direct support to active incident response activities. In this role, candidates are expected to work collaboratively in a teaming environment with various touchpoints and handoffs.

Required Qualifications:

  • Prior experience working in a cyber threat intelligence capacity in a Security Operations Center or similar environment.
  • Must be self-motivated and able to work both independently and as part of a team.
  • Previous experience sourcing cyber intelligence, synthesizing the information, converting it to actionable content, and evaluating network resources for impact; hunting.
  • Previous experience with proactive threat hunting for threat identification, and reactively for lateral movement and incident scope impact determination.
  • Previous experience developing and disseminating cyber threat intelligence content such as threat advisories across organizational lines.
  • Knowledge of the cyber threat landscape to include different types of adversaries, campaigns, and the motivations that drive them.
  • Previous experience working with and documenting analysis results in a knowledge or intelligence management system.
  • Previous experience working with automated malware analysis technologies such as Fireeye MAS, Joe Sandbox, etc.
  • Knowledge of industry recognized analysis frameworks (Diamond Model, Kill Chain, NIST Incident Response, etc.).
  • Strong verbal and written communication and client intimacy skills with experience briefing corporate executives and technical professionals.
  • Bachelor’s Degree in an IT related field and/or equivalent work experience.

Desired Qualifications:

  • Relevant certifications (Security +, CISSP, GIAC, etc.)
  • Previous experience providing cyber intelligence support for Fortune 1000 companies
  • Previous experience working with intelligence management platforms (Threat Connect, etc.)
  • Previous experience with various endpoint threat detection and response (ETDR) technologies
  • Experience leveraging technologies such as Maltego to support OSINT collection
  • Hands on experience working with Incident Response and Threat Monitoring SOC functions.
  • Previous experience working with various Forensics technologies to include EnCase, FTK, etc.
  • Previous experience working with network tools and technologies such as firewall (FW), proxies, IPS/IDS devices, full packet capture (FPC), and email platforms.
  • Experience and knowledge conducting cyber threat analysis originating from phishing emails
  • Previous experience conducting static, dynamic, and reverse engineering malware analysis
  • Previous experience supporting incident response of Operational Technology (OT) Networks to include Integrated Controls Systems (ICS), SCADA, and Process Control Networks (PCN).
  • Master’s Degree in an IT related field.

Position Type: Salaried / Exempt.  Position level and compensation commensurate with candidate’s knowledge and professional experience.

Primary Location: On-site at client locations within the continental United States

Travel Requirement: Minimal travel required for on-site positions

Revolutionary Security LLC is an Equal Opportunity Employer

Apply Now!

Introduction: This career opportunity is to join the Revolutionary Security team and make an impact defending corporate networks from advanced and targeted attacks.  This position supports the Security Operations Center (SOC) Operations practice at Revolutionary Security.

Job Description: A highly collaborative, fast paced, and agile team responsible for providing threat monitoring and cyber defense services to clients across multiple industries, including; chemical, law firms, technology & communications, financial services, manufacturing, transportation, health & life sciences, oil & gas, and utilities.  SOC Operations provides the opportunity to work in dedicated SOC environments with a focus on threat identification, incident response, cyber threat intelligence infusion, and mitigations to ensure defensive resiliency.   The threat monitoring role is primarily responsible for network based defense to include monitoring of the SIEM and security technologies to verify potential threat activity.  Daily activities will include analysis of network logs, processing of mitigations, determination and escalation of threat, and maintaining the defensive state of detection and alerting capabilities.  In this role, candidates are expected to work collaboratively in a teaming environment with various touchpoints and handoffs.

Required Qualifications:

  • Prior experience working in a Security Operations Center or similar environment providing threat monitoring, intrusion detection, analysis, threat determination, and mitigations processing and tracking.
  • Must be self-motivated and able to work both independently and as part of a team.
  • Previous experience triaging threats derived from various intakes to include security technology alerts, user reported tickets, and other internal SOC organizations.
  • Previous experience working with various network and system security technologies to include SIEM, data analytics platforms, end-point tools, network technologies and appliances, etc.
  • Experience working across organizational lines of business to implement mitigations, remediation’s, and countermeasures resulting from cyber threat intrusions.
  • Knowledge of the cyber threat landscape to include different types of adversaries, campaigns, and the motivations that drive them.
  • Previous experience working with and documenting analysis results in a knowledge or intelligence management system.
  • Knowledge of industry recognized analysis frameworks (Diamond Model, Kill Chain, NIST Incident Response, etc.).
  • Strong verbal and written commination and client intimacy skills with experience briefing corporate executives and technical professionals.
  • Bachelor’s Degree in an IT related field and/or equivalent work experience.

Desired Qualifications:

  • Relevant certifications (Security +, CISSP, GCIA, GCIH, GISF, GCED, GMON, etc.)
  • Previous experience working in Security Operations Centers.
  • Hands on experience working with Incident Response and Cyber Threat Intelligence functions.
  • Previous experience working with analysis techniques, identifying indicators of compromise, threat hunting, and identification of intrusions and potential incidents.
  • Previous experience working with various SIEM technologies to include but not limited to Splunk ES, IBM QRadar, HP ArcSight, and/or McAfee Nitro.
  • Previous experience working with network tools and technologies such as firewall (FW), proxies, IPS/IDS devices, full packet capture (FPC), and email platforms.
  • Previous experience supporting cyber defense analysis of Operational Technology (OT) Networks to include Integrated Controls Systems (ICS), SCADA, and Process Control Networks (PCN).
  • Master’s Degree in an IT related field.

Position Type: Salaried / Exempt.  Position level and compensation commensurate with candidate’s knowledge and professional experience.

Primary Location: Remote/Virtual within Continental US

Travel Requirement: Limited

Revolutionary Security LLC is an Equal Opportunity Employer

Apply Now!

Introduction: This career opportunity is to join the Revolutionary Security team as a penetration tester. As a member of our team you will have the opportunity to conduct penetration tests for some of the world’s largest, most prominent, and targeted corporations.

Job Description: The Penetration Testing team is highly collaborative, fast paced, and agile, responsible for providing offensive security services to clients across the following industries: chemical, law firms, technology & communications, financial services, manufacturing, transportation, health & life sciences, oil & gas, and utilities. Penetration testing services span enterprise penetration testing, web application testing, social engineering, advanced threat emulation, cross-functional cyber analysis, and intelligence and architecture.

In this position the candidate will have the opportunity to lead and execute on enterprise wide testing engagements that regularly include compromising the networks, systems, and services of the world’s largest organizations.

Required Qualifications:

  • Prior experience performing penetration testing on enterprise networks, web applications, mobile devices, etc.
  • Familiarity with incident response, threat monitoring, and cyber threat intelligence functions, and a functional knowledge of how to fuse threat intelligence into attack methodologies.
  • Previous experience designing pragmatic remediation guidance for discovered vulnerabilities.
  • Practical experience and knowledge of various network and system security technologies to include SIEM, data analytics platforms, end-point tools, network technologies and appliances.
  • Previous experience leading technical projects and ensuring documented requirements are delivered with excellence.
  • Previous experience with gathering and developing actionable intelligence resulting from open-source intelligence repositories.
  • Previous experience developing and designing custom reports and metrics packages.
  • Knowledge of industry recognized attack frameworks (ATT&CK, Kill Chain, etc.) and security control guidance (NIST, ISO, etc.).
  • Strong experience across all modern Microsoft Windows operating systems.
  • Experience with attack tools and platforms including: Metasploit, Canvas, Cobalt Strike, Kali, Back Box, SET, and the like.
  • Bachelor’s Degree in an IT related field or equivalent relevant work experience.

Desired Qualifications:

  • Relevant certifications (CISSP, CEH, OSCP, LPT, GPEN, CEPT, etc…).
  • Familiarity with scripting languages such as Bash, Python, Perl, PowerShell, etc…
  • Previous experience providing consulting services to Global 1000 customers.
  • Previous experience designing, organizing, and executing penetration tests and vulnerability assessments.
  • Strong verbal and written communication and client intimacy skills with experience briefing corporate executives and technical professionals.
  • Experience working across organizational lines of business to implement mitigations, remediation’s, and countermeasures resulting from penetration testing discoveries.
  • Previous experience working within Operational Technology (OT) Networks to include Integrated Controls Systems (ICS), SCADA, and Process Control Networks (PCN).
  • Previous experience developing proposals and statements of work to support business growth.
  • Master’s Degree in an IT related field.

Position Type: Salaried / Exempt.  Position level and compensation commensurate with candidate’s knowledge and professional experience. 

Primary Location: Remote/Virtual within Continental US 

Travel Requirement: Up to 50% 

Revolutionary Security LLC is an Equal Opportunity Employer

Apply Now!

Introduction: This career opportunity is to join the Revolutionary Security team as an ICS Cybersecurity Consultant. As a member of our team you will have the opportunity to perform testing and assessments for some of the world’s most advanced and targeted corporations.

Job Description: Our ICS Cybersecurity Consultants work in an environment that is highly collaborative, fast paced, and agile.  They are responsible for providing testing and assessment services to clients across the following industries: chemical, technology & communications, manufacturing, transportation, health & life sciences, oil & gas, and utilities. Our ICS services include network and architecture assessment, threat modeling, device testing, vulnerability assessment, FAT/SAT security testing, and penetration testing.

In this position the candidate will have the opportunity to lead and execute on ICS security engagements in mission critical operational environments, often having a direct impact on improving security across multiple critical infrastructure industries.

Required Qualifications:

  • Experience working with ICS technologies and/or environments. Examples include: SCADA, DCS, PCN, IACS, PLCs, HMIs, grid modernization technology, etc.
  • Familiarity with cybersecurity functions including vulnerability assessment and management processes, identity and access management in ICS environments, incident response and monitoring, etc.
  • Knowledge of common ICS protocols and technologies.
  • Practical experience and knowledge of various network and system security technologies to include SIEM, data analytics platforms, end-point tools, network technologies and appliances.
  • Previous experience leading technical projects and ensuring documented requirements are delivered with excellence.
  • Strong oral and written communication skills.
  • Experience with a variety of security testing and assessment tool and platforms such as nmap, Nessus, Metasploit, and Kali.
  • Bachelor’s Degree in a related field or equivalent relevant work experience.

Desired Qualifications:

  • Previous experience designing pragmatic remediation guidance for discovered vulnerabilities within ICS systems, networks, and environments.
  • Relevant certifications (GICSP, CISSP, CEH, OSCP, LPT, GPEN, CEPT, etc.)
  • Experience working with ICS-related standards such as IEC-62443, NIST 800-82, NERC CIP, NRC RG 5.71/NEI 08-09, and CFATS.
  • Experience working with the NIST Cybersecurity Framework and/or other assessment tools and taxonomies such as CSET and DOE C2M2.
  • Experience performing reverse engineering of embedded devices and/or industrial protocols.
  • Familiarity with scripting languages such as Bash, Python, Perl, PowerShell, etc.
  • Previous experience providing consulting services to Fortune / Global 1000 clients and/or domain experience within relevant industry verticals such as Oil and Gas, Utilities, Manufacturing, etc.
  • Previous experience designing, organizing, and executing security assessments and testing.
  • Experience working across organizational lines of business to implement various recommendations resulting from testing and assessment discoveries.
  • Previous experience developing proposals and statements of work to support business growth.
  • Master’s Degree in a relevant field of study.

Position Type: Salaried / Exempt.  Position level and compensation commensurate with candidate’s knowledge and professional experience.

Primary Location: Remote/Virtual within Continental US

Travel Requirement: Up to 50%

Revolutionary Security LLC is an Equal Opportunity Employer

Apply Now!