All active Penetration Tester roles based in Colorado.
Pick a job to read the details
Tap any role on the left — its description and apply link will open here.
Dark Wolf is looking for summer interns to join us at our offices in Herndon, VA, Colorado Springs, CO, Omaha, NE or Tampa, FL. Outside of the office, you’ll join a community of interns with access to local networking events, professional development workshops, and the vibrant culture of Dark Wolf, spanning multiple areas. Software Development, Google Cloud Delivery, Data&AI, Cybersecurity and Mission Enablement.
Duration: June 2026 – August 2026
Type: Full-Time Internship (Paid)
As an intern in our NoVA technology hub, you will work at the intersection of modern software delivery and emerging intelligence. This role is designed for students who are passionate about building scalable applications, leveraging cloud infrastructure, and implementing data-driven AI solutions. You won't just be shadowing; you will be an active member of an Agile squad contributing to production-level code.
Software Development: Design, develop, and test features using languages such as Python, Java, or Node.js
Cloud & Delivery: Assist in deploying applications to cloud environments (AWS, Azure, or GCP) and managing CI/CD pipelines to automate software delivery.
Data Engineering: Build and optimize data pipelines to ensure high-quality data is available for analysis and model training.
AI & Machine Learning: Support the integration of Generative AI and LLMs into existing workflows, performing prompt engineering and model fine-tuning.
Agile Collaboration: Participate in daily stand-ups, sprint planning, and retrospectives to experience the full Software Development Life Cycle (SDLC).
Current Enrollment: Pursuing a Bachelor’s or Master’s degree in Computer Science, Data Science, Computer Engineering, or a related technical field at the University of Florida.
Technical Proficiency: Foundational knowledge in at least one major programming language (Python preferred for AI/Data tracks).
Problem Solving: Strong analytical skills and a "Go Gator" attitude toward tackling complex technical challenges.
Communication: Ability to clearly communicate technical concepts to both technical and non-technical team members.
Familiarity with containerization tools like Docker or Kubernetes.
Knowledge of SQL and NoSQL databases.
Exposure to AI frameworks such as PyTorch, TensorFlow, or LangChain.
Previous project work involving cloud-native architecture.
Are you ready to go beyond the textbook ?
The Dark Wolf Cyber Academy (DWCA) internship is an immersive program designed to turn aspiring students into cybersecurity professionals. Unlike standard internships, we challenge you to navigate the complexities of cybersecurity through three critical lenses: Risk Management, Penetration Testing, and Cyber Engineering. This internship is built for people who want to grow fast.
The DWCA Internship is designed to be cyber intensive where you won’t just talk about security—you’ll build it. This program is structured into dedicated 2-3 week blocks where you work alongside professionals and are exposed to real-world tools and frameworks. From breaking into systems to building resilient cloud architectures, you will gain hands-on experience that bridges the gap between theory and implementation. This internship is designed to help you figure out your path—and give you experience to back it up.
Desired Majors
Desired Skillsets
Help us build and extend our Secure Cloud Landing Zone (SCLZ) codebase which automates the entire process of fielding an authorized cloud solution from cloud org -> app. Our SCLZ allows DoD & National Security customers to scale their missions securely and efficiently using our IL5 and FedRAMP High P-ATO’d landing zone architecture which provides IAM Best Practices, Tenant Isolation, Shared Services, and monitoring through Infrastructure-as-Code (IAC). In this internship you will work across the core SCLZ codebase and build cloud-native solutions running on top of the SCLZ within Google Cloud in support of Defense and National Security mission use cases.
Skillsets:
We are proud to be an EEO/AA employer Minorities/Women/Veterans/Disabled and other protected categories.
In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification form upon hire.
Ready to apply?
Apply to Dark Wolf SolutionsJob Summary
A Rampant Technologies Cybersecurity Engineer (CSE) is a key resource that is a part of the Rampant team
reporting to the Principal Engineer overseeing the CSE team to deliver innovative Cyber Security solutions that are
in alignment with the company’s goals.
Essential Duties & Responsibilities
SME on problem identification, diagnosis, and resolution of problems
Develop best practices for processes and standards that will better the system
Perform vulnerability assessments using standardized tools (Nessus, DISA STIGs) and configuration updates as
required to comply with security requirements.
Track and fulfill liens associated with A&A activities as documented in the Plan of Actions and Milestones.
Perform hardening of ops systems, COTS and open-source product
Validate best practices in Penetration testing, Configuration analysis, and Security
Prepare comprehensive security assessment testing documentation to validate applied security controls in
support of Assessment and Authorization (A&A) testing. Generating/maintaining security accreditation artifacts
associated with RMF process to include, but not limited to Security Requirements Traceability Matrix, Security
Plans, Certification Test Plans, Continuous Monitoring Plans)2
Perform timely updates in accreditation DB
Provide technical guidance focused on information security architecture.
Key Skills, Education & Experience
Minimum of eight (3) years’ relevant experience as a Cybersecurity Engineer in programs and contracts of
similar scope, type, and complexity is required; ideally three (3+) years of direct experience in the same
level/grade for like role.
Techno functional knowledge of/experience in:
Execution of the Assessment & Authorization (A&A process) in accordance with government
requirements (e.g. ICD-503)
Information systems security and continuous monitoring practices and how to assess their
effectiveness per NIST SP 800-53 and NIST SP 800-53A.
DCID 6/3, ICD 503, CNSSI 1253, NIST SP 800-53, NIST SP 800-53A, NIST SP 800-37, and security controls
assessment criteria/procedures
Integrity, availability, authentication, and non-repudiation concepts
IT security principles and methods (e.g., firewalls, demilitarized zones, encryption)
Network access, identity, and access management (e.g., public key infrastructure [PKI])
Security system design tools, methods, and techniques
Relevant laws, policies, procedures, or governance as they relate to work that may impact critical
infrastructure.
TCP/IP networking technologies, Linux account administration, Linux folder permissions, Patch
Management best practices on Operating Systems and applications, known vulnerabilities associated
with Windows and Linux platforms.
Continuous monitoring processes as outlined in NIST SP 800-137 appropriate for systems, leveraging
existing tools, efforts, and incorporating new automation techniques.
Virtualization technologies (e.g. VMWare, Docker)
OSI model and how specific devices and protocols interoperate, including knowledge of protocols, and
services for common network traffic
DoD/IC system security control requirements
XACTA and SNOW
Security testing and penetration tools that include Assured Compliance Assessment Solution (ACAS),
Wireshark, Retina, Tripwire, etc…
Hands on experience and proficiency with the full Microsoft Office Suite and tools such as Microsoft
Project, Microsoft Visio
Self-starter/motivator and
Certifications and Clearance
Must have certifications (certifications with * indicate willing to hire if certification is within 3-6 months of
finalizing):
Active TS/SCI w/ Poly clearance required
Current certification compliant with DoD 8570 IAM or IAT level 3OR obtain certification within 6 months of
hire and maintain certification throughout employment.
MUST meet DoD 8570 IAT Level III requirements
IAT Level II Certifications (Security+ or equivalent)
Ready to apply?
Apply to Rampant Technologies
Cookies & analytics
This site uses cookies from third-party services to deliver its features and to analyze traffic.