Ethical Hacking Jobs

RSS

663 Ethical Hacking jobs found on Monster.

Jobs 1 to 20 of 663
Position Description: The successful candidate will report directly to the Head of the Security Lab and will perform network-based security vulnerability assessments based on the current Payment Card Industry ASV security scanning procedures. This person will also perform penetration tests in accordance with industry-accepted methods and protocols. Projects may include: Performing network-based...
SQS is the world's leading independent specialist in software quality. SQS' position and expertise as the market leader are the result of over 30 years of successful consultancy. SQS offers a progressive working culture and a flexible approach to career development. We give you the opportunity to contribute your individual strengths. Continuous training and development keep our employees well educ...
· Conduct Ethical Hacking Vulnerability Assessments & Penetration Testing in the following areas: o Operating System Security, Configuration and Integrity Assessments o General Controls, Database and Computer Application Assessments o Business Continuity Planning/​Disaster Recovery Planning (BCP/​DRP) o Performing technical IT audits and security reviews for the following technologies or areas...
Client is seeking an "Ethical Hacking Analyst" to perform the following duties and responsibilities: Conduct internal vulnerability assessments and penetration tests against networks, servers, application technologies, services, platforms and languages to find flaws and exploits (e.g., SQL Injection, Cross-Site Scripting, Cross-Site Request Forgery, Clickjacking, Authentication/Authorization, Pr...
The Ethical Hacker / Penetration Tester Job Description: The Ethical Hacker / Penetration Tester will be working individually and in teams mostly in a virtual capacity. This individual will be performing penetration testing or vulnerability assessment of web application, network, wireless, code review and firewall on multi-protocol enterprise systems. Job Requirements: Consulting Skills: Inde...
Job Title: IT Security Specialist – Vulnerability Testing / Ethical Hacker - *US Citizenship Required* Job Description: As an IT Security Specialist, you will participate in a variety of engagements, focusing on targets that may include network equipment, servers, applications, mobile devices, and other information systems. Job Requirements: Bachelor degree in Information Technology/Computer S...
Description Job Summary: The primary goal of the Information Security Ethical Hacker is to help verify that our cloud-based Software-as-a-Service (SaaS) web applications are secure. Responsibilities include performing threat modeling, security assessments and ethical hacking of our web applications. This role will help produce reports that document the risk of vulnerabilities identified by secu...
Intelatek Technology Staffing Pittsburgh, PA
Company Description: At Intelatek we pride ourselves on providing our clients and candidates with the best that IT staffing has to offer. Making the right connections between people, solutions and objectives is essential. With us you can take a strategic approach to improving performance through an optimal mix of internal staff, outside consulting resources and project outsourcing. Our continuous ...
reqrouteinc San Jose, CA
Title: Penetration Tester Key Responsibilities: Perform application and infrastructure penetration tests Perform security reviews of application designs, source code covering all types of applications (web application, web services, mobile applications, thick client applications, SaaS) Participate in Security Assessments of networks, systems and applications Work on improvements for provided ...
Cisco Systems , Inc. RESEARCH TRIANGLE PAR, NC
Business Entity Cisco Global Security Services Team is a leader in network security. Based on extensive training, sophisticated tools, and years of securing some of the most complex networks in the world, we have developed proven methodologies for actively assessing Customer infrastructure and conducting a detailed analysis. The Team Dynamic Ethical Hacking Team working globally to help provid...
Marten Transport Pittsburgh, PA
Company Description: At Intelatek we pride ourselves on providing our clients and candidates with the best that IT staffing has to offer. Making the right connections between people, solutions and objectives is essential. With us you can take a strategic approach to improving performance through an optimal mix of internal staff, outside consulting resources and project outsourcing. Our continuous ...
Company: Bank of America Printer-Friendly Job Description Ethical Hacking Analyst Charlotte, NC Description Key individual contributor, with accountability for researching, designing, engineering, implementing, and supporting information security & directory technology systems (software & hardware). Utilizes in-depth technical knowledge and business requirements to design & implement secure ...
Raytheon IIS is looking for individuals who can support the development and deployment of information technology services for an overseas location. Successful candidate will lead the Cyber Security Operations Center (CSOC) to monitor and defend the customer and client Enterprise Networks against all cyber threats. Provides direct support to the Cyber Security Operations Center Director as the Dep...
Raytheon NetOps and Information Solutions is seeking an IA Analyst who maintains security posture of the cloud environment using DoD tools and processes. The IA Analyst will also conduct all processes required for system accreditation Required Skills: Must have a minimum of 6 years professional experience. Must have a minimum of 5 years experience as an IA professional on a DoD system. Degree ...
Raytheon IIS is looking for individuals who can support the development and deployment of information technology services for an overseas location. Looking for a qualified individual to lead the Incident Response Team in the detection, response, mitigation, and reporting of cyber threats affecting client networks. The Team Lead is responsible for handling assignments of the Compute Incident Respon...
Raytheon NetOps and Information Solutions is seeking an Information Assurance Officer (IAO) who will be responsible for the implementation and maintenance of DoD Information Assurance Certification and Accreditation Process (DIACAP) IA controls. The IAO will lead the transition to the DoD Information Assurance Risk Management Framework (DIARMF). The successful candidate will be responsible for cer...
Information Assurance Officer *Knowledge of technical security configurations and vulnerabilities. *Ability to use/manage/analyze results using Army Scanning and Patching Tools: Retina Scan; Assured Compliance Assessment Solution (ACAS); System Center Configuration Manager (SCCM); Systems Management System (SYSMAN). *Other duties include Managing IA Vulnerability Management (IAVM) Compliance an...
Job Description: Embedded Software Development/ Cyber Engineer to work in a fast paced rapid turn environment with challenging, interesting, and unique project developments. Analyze binary files and reverse engineer software (including C/C++ and Assembly) with minimal product background using Disassembler tools; such as IDA Pro. Research the risks and vulnerabilities and develop prototypes of the...
The Information Systems Security Engineer will report to the Security Officer for a healthcare technology and payment solutions company. The Information Systems Security Engineer will be the primary person responsible for configuring, maintaining and running security systems for a healthcare payment and benefits solutions provider. Security systems include: Patch Management System, Anti-Virus, Web...
Job Description Do you like tearing things apart? Do you find malware as interesting as the people that wrote it? Do you want to have fun contributing to the better good of cyber protection on commercial networks? Look no further as we are seeking an experienced Malware Analyst to join our cyber Products team. In this position you will be given the chance to analyze the latest and greatest malwar...

Get new jobs by email for this search
We'll keep looking and send you new jobs that match this search.
email me

Upload your resume and let employers find you!
It's that simple!

Popular Ethical Hacking Articles

Certification: Certified Ethical Hacker Article Rating
With this credential, techies hack in an above-the-board manner to uncover system and network vulnerabilities -- before criminals do.
For Employers: Post Jobs | Search Resumes | Advertise
About Monster | Work for Monster | Advertise with Us | AdChoices | Partner with Us | Investor Relations | Social Media
Terms of Use | Privacy Center | Accessibility Center | Help | Security | Contact Us | Sitemap | Mobile
©2014 Monster - All Rights Reserved U.S. Patents No. 5,832,497; 7,599,930 B1; 7,827,125 and 7,836,060 MWW - Looking for Monster Cable? - V: 2014.4.50.56-220
eTrustLogo