Adapt Forward

HQ
North Charleston, SC, US
90 Total Employees
Year Founded: 2015

Jobs at Similar Companies

Similar Companies Hiring

Software • Security • Information Technology • Data Privacy • Cybersecurity • Cloud • Artificial Intelligence
3 Offices
286 Employees
Software • Security • Information Technology • Data Privacy • Cybersecurity • App development
2 Offices
550 Employees
Security • Sales • Information Technology • Cybersecurity • Automation
6 Offices
357 Employees
Jobs at Adapt Forward

Search the 14 jobs at Adapt Forward

Recently posted jobs

6 Days Ago
Pearl City, HI, USA
Security • Cybersecurity
As a CND Incident Response Analyst, responsible for identifying, isolating, investigating, and protecting data across various sources and locations. Validating suspicious events, determining incidents, and maintaining compliance with cybersecurity policies. Providing network intrusion detection, incident response support, and conducting digital forensics on systems. Possessing knowledge of various cybersecurity tools and solutions.
6 Days Ago
Stuttgart, Baden-Württemberg, DEU
Security • Cybersecurity
As a NetOps Administrator, you will support the Naval Information Warfare Center's critical project by managing enterprise network infrastructure systems, ensuring adherence to service level agreements, and maintaining security protocols. This role also involves attending planning sessions, providing status reports, and pursuing professional development opportunities.
6 Days Ago
Pearl City, HI, USA
Security • Cybersecurity
As a NetOps Administrator, your primary responsibility will be to support a mission critical project for the Naval Information Warfare Center-Atlantic (NIWC-LANT) Certified Cybersecurity Service Provider (CCSP). Your duties include attending planning sessions, adhering to change management policies, maintaining network infrastructure, and supporting various network technologies.
6 Days Ago
North Charleston, SC, USA
Security • Cybersecurity
The Subscriber Development Lead facilitates the onboarding of new customers to the NIWC CSSP service offering by coordinating discovery, maintaining onboarding checklists, and ensuring effective communication with leadership. Responsibilities include developing processes, maintaining positive relations, and complying with onboarding standards while ensuring customers understand the service model and available options.
6 Days Ago
Stuttgart, Baden-Württemberg, DEU
Security • Cybersecurity
The Operations Watch Analyst will identify, investigate, and respond to cybersecurity incidents, ensuring proper documentation and compliance with policies. Responsibilities include network monitoring, digital forensics, and collaboration with various entities to analyze incidents. The role involves 24/7 support, requiring flexibility in shifts and potential travel for incident response.
6 Days Ago
North Charleston, SC, USA
Security • Cybersecurity
The Linux Systems Administrator will manage and maintain RHEL-based systems, performing installation, configuration, troubleshooting, and ensuring system security compliance. This role involves daily operations to support systems performance and provide user configuration updates, along with virtualization management using VMware ESXi. Thorough documentation and adherence to security policies are required.
Security • Cybersecurity
The Red Team Specialist II will conduct penetration tests on various systems and networks, manage multiple engagements, research exploitation techniques, and create test environments to mimic threat behaviors.
Security • Cybersecurity
The Penetration Tester will design and develop tools for testing DoD environments, coordinate with Cyber Security Evaluation Teams, and perform penetration testing on Windows and Linux systems. Responsibilities include exploit and malware development, conducting cyber risk assessments, and leveraging pen testing tools and methodologies.
Security • Cybersecurity
The Red Team Specialist III will simulate threat behavior through penetration tests on customer networks, conduct research on exploitation techniques, and design test environments. They will manage multiple engagements while having a strong grasp of emerging threats and vulnerabilities.
6 Days Ago
North Charleston, SC, USA
Security • Cybersecurity
The Capture Lead is responsible for managing capture planning and execution across business units. This role involves market intelligence, business development processes, and proposal submissions, ensuring alignment with the strategic plan and corporate branding efforts. The Capture Lead collaborates with various stakeholders and manages capture budgets, while also required to travel as needed.
6 Days Ago
North Charleston, SC, USA
Security • Cybersecurity
As a NetOps Administrator, you'll support network infrastructure for mission critical projects, including deployment, maintenance, and documentation, while adhering to change management policies and service level agreements. You'll also support various networking technologies and participate in professional development opportunities.
6 Days Ago
North Charleston, SC, USA
Security • Cybersecurity
The CND Incident Response Analyst identifies, investigates, and implements measures to protect data. Responsibilities include validating suspicious events, entering incidents into reporting systems, providing network intrusion detection, performing digital forensics, and supporting incident response actions. The role requires communication with multiple entities during significant incidents and familiarity with cybersecurity policies and procedures.
15 Days Ago
Charleston, SC, USA
Security • Cybersecurity
Perform the installation, testing, operation, troubleshooting, and maintenance of Linux systems. Manage accounts and network rights. Resolve hardware/software problems. Ensure system availability, functionality, integrity, and efficiency. Maintain system configuration and security. Develop and document standard operating procedures.
21 Days Ago
United States
Remote
Security • Cybersecurity
Threat Detection Specialist responsible for maintaining knowledge on the current cyber threat landscape, creating and updating indicator logic, providing relevant alerts, and performing threat hunting missions based on TTPs. Must have at least 3 years of experience with IDS/IPS Solutions, Windows Event logs, Sysmon, and Linux logs.