- UpvoteDownvoteShare Job
- Suggest Revision
GPEN: GIAC Certified Penetration Tester. CPT: Certified Penetration Tester. CEPT: Certified Expert Penetration Tester. GPEN: GIAC Certified Penetration Tester. Experience or familiarity with vulnerability analysis, computer forensics tools, cryptography principles.
$141,300 - $237,400 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
CEH : Certified Ethical Hacker. Experience with database management software (Oracle, MongoDB, MySQL, DB2, etc.) Perform formal and informal targeted “Hunts” to identify vulnerabilities in cloud-hosted and web-based applications, API interfaces, databases, big data environments, networks, computer systems, mobile applications, Software Defined Networks and IoT (Internet of Things) devices and systems.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Solid understanding of cybersecurity processes and concepts (e.g. vulnerability management, security governance, software development, incident response, physical security, auditing and logging, micro segmentation, secure access service edges, zero trust architecture, SBOM, Secure Software Development Lifecycle, Insider Threat, Digital Supply Chain, Vendor Risk Management, PKI, penetration testing) as well as application controls and segregation of duties.
Full-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in penetration testing, developing proof-of-concept exploits and knowledge of remediation techniques. Bachelor's degree, or CCSP (Certified Cloud Security Professional) or CEH (Certified Ethical Hacker) or CFR (CyberSec First Responder) or Cloud+ or CySA+ (CompTIA Cybersecurity Analyst) or GCED (GIAC Certified Enterprise Defender) or GICSP (Global Industrial Cyber Security Professional) or PenTest.
$136,000 - $247,600 a yearFull-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Ability to execute in a fast paced, high demand, environment while balancing multiple prioritiesCertified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH), SANS certification(s), or Web Application Penetration Tester (WAPT) certification, Certification Identity and Access Manager (CIAM)Experience with security technology product evaluation, proof of concepts and testing.
Full-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Help with threat assessment and penetration testing as early as necessary/possible. Familiarity with working with data and databases (SQL, MySQL, PostgreSQL, Amazon Aurora, Redis, Amazon Redshift, Google BigQuery.
$112,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security tools (e.g., SAST, SCA, vulnerability scanning, penetration testing) For all SaaS offerings in HCE, support secure lifecycle process activities including threat modeling, risk assessment, analysis of findings from penetration tests, and tools (e.g., SAST, SCA, Container vulnerability scans.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience across Information Security and IT domains such as Governance, Risk, and Compliance, IT operations, incident response, identity and access management, penetration testing, vulnerability scanning, e-discovery & forensics, application development, infrastructure, or technical support.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop sales action plans to maximize penetration for each account to include specific Parts and Service plans, account by account, developing each ASR’s individual BOB. Must travel throughout the Region with ASRs in their AOR’s to call on conquest accounts, high potential sales accounts, declining sales accounts, and accounts with limited sales penetration.
$100,000 a yearFull-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on working experience with at least two or more of these security technologies (e.g., Vulnerability Management, Penetration Testing, Email Security, EDR, MFA, SIEM, IPS, Firewalls). Experience with security tools and technology such as, i.e., FireEye (Trellix), Tenable.io, Nessus, Client, SolarWinds, Varonis, GRC tools, CrowdStrike Falcon, and LogRhythm.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
This position’s primary goal is to create and execute the business model, strategy, and plans to build a portfolio of customers and product platforms that optimizes our Brands’ penetration and value while delivering on profitability goals.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and maintain the technical IT/cyber capabilities including all phases of the software development lifecycle and software stack which includes threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of security testing methods and technologies, including penetration testing, web application security assessments, vulnerability assessments. This team leverages their extensive technical and risk experience to perform third-party risk assessments using a unique industry leading utility methodology that covers multiple control domains including Infosec, Privacy, Cybersecurity, and Operational Risk.
$61,846 - $110,130 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Monitor welding processes to ensure proper heat, penetration, and adherence to welding specifications. Perform welding tasks using techniques such as MIG, TIG, arc, and oxy-acetylene welding. Proficiency in various welding techniques including MIG, TIG, arc, and oxy-acetylene welding.
$20 - $24 an hourFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with computer network penetration testing and techniques. Participate in penetration testing as requested. The IT Security Analyst is primarily responsible for performing CyberArk system administrator duties.
Full-timeExpandApply NowActive JobUpdated 1 month ago
penetration job in Atlanta, GA
FEATURED BLOG POSTS
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.