Ethical Hacking Jobs

RSS

529 Ethical Hacking jobs found on Monster.

Jobs 1 to 20 of 529
SQS is the world's leading independent specialist in software quality. SQS' position and expertise as the market leader are the result of over 30 years of successful consultancy. SQS offers a progressive working culture and a flexible approach to career development. We give you the opportunity to contribute your individual strengths. Continuous training and development keep our employees well educ...
About Us HLCG is a Washington, DC- based firm that specializes in Construction, Infrastructure, and IT services. At HLCG, we have earned a strong reputation for understanding the critical needs of our commercial and government clients and providing the services they need to meet their mission. Qualifications • 3-5 years of experience in the security aspects of multiple platforms, operating syst...
Job Title: IT Security Specialist – Vulnerability Testing / Ethical Hacker - *US Citizenship Required* Job Description: As an IT Security Specialist, you will participate in a variety of engagements, focusing on targets that may include network equipment, servers, applications, mobile devices, and other information systems. Job Requirements: Bachelor degree in Information Technology/Computer S...
enableIT New York, NY
Description As a member of the IT Immunity Security Solutions (www.itimmunity.com- a subsidiary of enableIT LLC) team you will engage in the assessment of security risks related to our clientsâ?? information technology platforms. The consultant will be required to work with both business and technology audiences within our clientsâ?? environments. Daily Responsibilities: Assess information secu...
The Ethical Hacker / Penetration Tester Job Description: The Ethical Hacker / Penetration Tester will be working individually and in teams mostly in a virtual capacity. This individual will be performing penetration testing or vulnerability assessment of web application, network, wireless, code review and firewall on multi-protocol enterprise systems. Job Requirements: Consulting Skills: Inde...
Ultimate SoftwareUltimate Software Miami, FL
About this job Job description Are you an extremely talented Ethical Hacker with a focus on Web Applications? We are looking for the best of the best at Ultimate Software and offer rewards that few companies do for those who qualify! Are you... ...fascinated by Web Security and software vulnerabilities? …intrigued by cross origin resource sharing? …known to code late into the night attemptin...
Hiring Dallas, TX
Company Description: Founded in 1970 by Martin E. Judge Jr., The Judge Group is a professional services firm offering Technology Consulting, Enterprise:Wide Staffing and Corporate Training. The Judge Group has long believed in strong companies and the talented people who help them grow. Forty years of experience have taught us how to best address the cultural and economic needs of our clients, e...
NetEffects St Louis, MO
Job Description We have 2 positions for a Sr. Security Consultants with Penetration Testing and Ethical Hacking experience on web applications and web services. We are looking for someone who can work closely with web development teams to test application for vulnerabilities. This will involve manual penetration testing, white and black box testing and multiple applications. Fundamental knowledge...
Company: Bank of America Printer-Friendly Job Description Ethical Hacking Analyst Charlotte, NC Description Key individual contributor, with accountability for researching, designing, engineering, implementing, and supporting information security & directory technology systems (software & hardware). Utilizes in-depth technical knowledge and business requirements to design & implement secure ...
State of South Carolina Columbia, SC, 29209
Job Responsibilities Benefits Supplemental Questions Additional Responsible for planning, conducting and documenting ongoing vulnerability assessments and white hat auditing of South Carolina Department of Health and Human Services as well as business partner systems to proactively defend against an ever evolving threat. Selects and configures applicable software and hardware solutions as need...
Application Vulnerability Testing Ft. Lauderdale, FL Position Description Duties will include providing infrastructure and application vulnerability assessment and penetration testing services to banks businesses globally through a comprehensive testing process, as well as identifying weaknesses and vulnerabilities within the system and proposing countermeasures. Perform vulnerability assessme...
Fiberlink, an IBM company, is an exciting, fast growing company delivering the next generation of cloud-based enterprise mobility management solutions, the hottest segment in technology today. Our award winning MaaS360 platform simplifies Mobile Device Management (MDM), Mobile Application Management (MAM), and secure document sharing in the Bring your own device (BYOD) era. Trusted by small busine...
Raytheon NetOps and Information Solutions is seeking an Information Assurance Analyst (IAA) that maintains security posture using DoD tools and processes. The IAA will also conduct all processes required for system accreditation Required Skills: Must have a minimum of 6 years professional experience. Must have a minimum of 2 years experience as an IA professional on a DoD system. Degree or equ...
Job Summary: The Embedded Systems Security Group requires an entry-level Engineer/Analyst/Research Engineer to perform security penetration testing and vulnerability analysis (ethical hacking) of embedded system software and hardware used in applications such as power grid sensors, engine control units, and mobile devices. Specific tasks include: software/firmware extraction, reverse engineering,...
Raytheon IIS is looking for individuals who can support the development and deployment of information technology services for an overseas location. Successful candidate will lead the Cyber Security Operations Center (CSOC) to monitor and defend the customer and client Enterprise Networks against all cyber threats. Provides direct support to the Cyber Security Operations Center Director as the Dep...
This position is located in our AZ, Ft Huachuca facility Provides technical support and troubleshooting to network, desktop, and/or systems hardware and software. 1. Screens, refers and diagnoses internal inquiries and work requests as they relate to maintenance of personal computers and related systems. 2. Assists with the installation, configuration, and upgrade of computer hardware and softw...
The Senior Information Systems Security Engineer will report to the Security Officer for a healthcare technology and payment solutions company. The Information Systems Security Engineer will be the primary person responsible for configuring, maintaining and running security systems for a healthcare payment and benefits solutions provider. Security systems include: Patch Management System, Anti-Vir...
Sr. Application Software Security Engineer Full Time Position with benefits Location : Houston TX Dynamic Testing Tools: (proficient in atleast one or more) IBM AppScan, HP WebInspect, Cenzic Hailstorm, Acuentix, NTO Spider, Netsparker, Burp Suite Proxy, ZAP Proxy, Fiddler Proxy Static Testing Tools: (proficient in atleast one or more) HP Fortify, AppScan Source, Checkmarx Source Code, Cover...
Blackstone Technology Group Blackstone is a global provider of contingent and direct staffing solutions. Our seasoned staffing professionals have a successful history of servicing the toughest demands of our staffing clients. Our agile and customized-to-client approach ensures that we meet our client’s specific needs and that we adapt to and fully support our client’s way of doing business. We so...
Raytheon is seeking an Information Assurance Analyst (IAA) that maintains security posture using DoD tools and processes. The IAA will also conduct all processes required for system accreditation Required Skills: Must have a minimum of 4 years professional experience. Must have a minimum of 2 years experience as an IA professional on a DoD system. Degree or equivalent experience. Must have an...

Get new jobs by email for this search
We'll keep looking and send you new jobs that match this search.
email me

Upload your resume and let employers find you!
It's that simple!

Popular Ethical Hacking Articles

Certification: Certified Ethical Hacker Article Rating
With this credential, techies hack in an above-the-board manner to uncover system and network vulnerabilities -- before criminals do.
For Employers: Post Jobs | Search Resumes | Advertise
About Monster | Work for Monster | Advertise with Us | AdChoices | Partner with Us | Investor Relations | Social Media
Terms of Use | Privacy Center | Accessibility Center | Help | Security | Contact Us | Sitemap | Mobile
©2014 Monster - All Rights Reserved U.S. Patents No. 5,832,497; 7,599,930 B1; 7,827,125 and 7,836,060 MWW - Looking for Monster Cable? - V: 2014.4.45.50-308
eTrustLogo