- UpvoteDownvoteShare Job
- Suggest Revision
Analyze and investigate cybersecurity tickets and alerts, perform threat analysis, monitor client environments for signs of intrusion, assist in the deployment of cybersecurity solutions, as well as assist in security projects such as penetration testing, code evaluation, and security assessments.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Penetration testing (Ethical Hacking), Vulnerability assessments, Microsoft Best Practices, and CIS Baseline analysis will be required. Performing Internal Vulnerability and Penetration testing (Ethical Hacking.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Specific responsibilities include supporting R&D throughout a new product's development phases, review product security requirements and recommend security design solutions, help complete Quality documentation, threat modelling, penetration testing, software architecture review and design recommendations, code analysis and other security testing or work as needed.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Manulife’s Global Cybersecurity Services - Application Security is building up a penetration testing Centre of Excellence (COE) to deliver penetration test related capabilities for all segments in Manulife.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A strong candidate will have knowledge in one or more areas of Information Security, such as Cybersecurity principles, programming in cybersecurity, ethical hacking, penetration testing, cryptography, IOT Security, data privacy regulations, and compliance regulations ( PCI, HIPAA, and/or FERPA.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security tools and technologies such as firewalls, IDS/IPS, SIEM, vulnerability scanners, and penetration testing tools. Conduct vulnerability assessments, penetration testing, and security audits to identify and address potential vulnerabilities and weaknesses.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Has advanced in-depth knowledge of security protocols and standards, vulnerability assessment tools, security application suites, penetration testing tools and advanced understanding of countermeasures/mitigation techniques.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with ICS/SCADA/IOT devices and software, computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with conducting security assessments, vulnerability scans, and penetration testing. Relevant industry certifications (e.g., CISSP, CEH, CompTIA Security+) are a plus. Relevant industry certifications (e.g., CISSP, CEH, CompTIA Security+) are a plus.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security tools such as SIEM, IDS/IPS, endpoint protection, and penetration testing tools. Vulnerability Management: Coordinate and conduct regular security assessments, penetration testing, and vulnerability scans to identify and address security weaknesses proactively.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant certifications such as CISSP, CISM, or CEH are highly desirable. Relevant certifications such as CISSP, CISM, or CEH are highly desirable. Identity and Access Management: Manage user access controls, authentication mechanisms, and identity management systems to ensure appropriate levels of access and privilege.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in conducting vulnerability assessments, penetration testing, and incident response. Vulnerability Assessment and Penetration Testing: Conduct regular vulnerability assessments and penetration tests to identify system weaknesses, vulnerabilities, and potential exploits.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CISSP, CEH, MCSD, CSSLP or other certifications are preferred. Must possess understanding of pen testing, vulnerability scanning, CVSS and/or other general security testing principles with the ability to provide specific recommendations on how to fix resulting vulnerabilities.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct network terrain audits, penetration testing, basic digital forensics and software threat analysis. Certified Ethical Hacker (CEH). Conduct network terrain audits, penetration testing, basic digital forensics and software threat analysis.
Full-timeExpandApply NowActive JobUpdated 6 days ago
ceh penetration testing jobs
FEATURED BLOG POSTS
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).