Ethical Hacking Jobs

RSS

603 Ethical Hacking jobs found on Monster.

Jobs 1 to 20 of 603
I have a very interesting Career Opportunity for a Hacker to take-on the duties of a Security Researcher who analyzes online security threats. You will be joining a recently well funded startup that is building anti-malware technologies for mobile devices and other systems that function online. You will analyze and research the various loopholes in present online security and anti-malware systems ...
Position Description: The successful candidate will report directly to the Head of the Security Lab and will perform network-based security vulnerability assessments based on the current Payment Card Industry ASV security scanning procedures. This person will also perform penetration tests in accordance with industry-accepted methods and protocols. Projects may include: · Performing network-base...
Job Summary: The Embedded Systems Security Group requires an entry-level Engineer/Analyst/Research Engineer to perform security penetration testing and vulnerability analysis (ethical hacking) of embedded system software and hardware used in applications such as power grid sensors, engine control units, and mobile devices. Specific tasks include: software/firmware extraction, reverse engineering,...
The Company Go beyond. At Towers Watson, we are more than individuals. We are a community focused on helping our colleagues and clients thrive and succeed. Towers Watson is a leading global professional services company that helps organizations improve performance through effective people, risk and financial management. With more than 14,000 associates around the world, we offer consulting, techn...
Berico is looking for an extremely talented and motivated Cyber SME Level 1 who wants to participate in an exciting mission supporting USARCYBER on a daily basis. Focus of contract support is to provide expertise in performing focused research and analysis to meet current cyberspace needs while enabling Army Cyber Command/2nd Army to establish a new and effective operating structure for addressing...
Camber Corporation has an immediate opening for a Intermediate Computer Security Systems Specialist located in Hagerstown, MD. The successful candidate will Conduct reviews of enterprises, enclaves, networks, systems and applications; certification and accreditation support; independent evaluation, based on national and DoD-level Information Assurance (IA) and Computer Network Defense (CND) requir...
Camber Corporation has an immediate opening for a Intermediate Computer Security Systems Specialist located in Frederick, MD. The successful candidate will Conduct reviews of enterprises, enclaves, networks, systems and applications; certification and accreditation support; independent evaluation, based on national and DoD-level Information Assurance (IA) and Computer Network Defense (CND) require...
Raytheon IIS is looking for individuals who can support the development and deployment of information technology services for an overseas location. Successful candidate will lead the Cyber Security Operations Center (CSOC) to monitor and defend the customer and client Enterprise Networks against all cyber threats. Provides direct support to the Cyber Security Operations Center Director as the Dep...
Raytheon NetOps and Information Solutions is seeking an Information Assurance Officer (IAO) who will be responsible for the implementation and maintenance of DoD Information Assurance Certification and Accreditation Process (DIACAP) IA controls. The IAO will lead the transition to the DoD Information Assurance Risk Management Framework (DIARMF). The successful candidate will be responsible for cer...
Raytheon IIS is looking for individuals who can support the development and deployment of information technology services for an overseas location. Looking for a qualified individual to lead the Incident Response Team in the detection, response, mitigation, and reporting of cyber threats affecting client networks. The Team Lead is responsible for handling assignments of the Compute Incident Respon...
Raytheon NetOps and Information Solutions is seeking an IA Analyst who maintains security posture of the cloud environment using DoD tools and processes. The IA Analyst will also conduct all processes required for system accreditation Required Skills: Must have a minimum of 6 years professional experience. Must have a minimum of 5 years experience as an IA professional on a DoD system. Degree ...
**Must have an active Secret Security Clearance** Please be aware that this position requires a security clearance, or the ability to obtain one. Security clearances may only be granted to U.S. Citizens. In addition, applicants who accept a conditional offer of employment may be subject to government security investigation(s) and must meet the eligibility requirements for access to classified inf...
Intrusion Detection Analyst - Scott AFB, O'Fallon, IL (NOMINAL RELOCATION WILL BE CONSIDERED) Job Code: HITS20140408-1963 Job Description: · Provide on-site intrusion detection on server and network based devices (Windows and Unix based) supporting the USTRANSCOM network. · Interpret network traffic using tools such as Snort IDS, Splunk, Scripts and various command line searches. · Track Inte...
Seeking Several Sr. Software Security Assurance Engineers for full time roles in Houston, TX The successful candidates will possess significant "ethical hacking" skills, to identify security vulnerabilities in the Client's Applications. He/she will also research and develop testing tools for use by the internal ethical hacking team. Other tasks and responsibilities include: Working with applica...
Description: In this newly created leadership role, you will be accountable for all Investigative Services for Cyber Defense Operations within our Information Risk Management organization. The Cyber Defense Operations team has identified an opportunity to significantly enhance the effectiveness of our current cyber defenses. The value proposition centers on the development of a holistic cyber de...
The Manager, Information Security and Privacy will provide leadership for ensuring information security and privacy protection for Afni. Manages the planning and implementation of people, process, and technology defenses against threats to information assets. Manages the development, implementation, and enforcement of policies, procedures, standards, and technology for protecting Afni information ...
This position is located in our AZ, Ft Huachuca facility Position Requirements Operate, maintain, and configure Security Management tools and databases. Defend the network and hosts from malicious activities. Lead analyst for 24x7 Event Analysis team. Duties and Responsibilities: • Follow, update and establish CND Event Analysis procedures. • Provide quality assurance for procedures and analy...
Founded in 1989, CALNET, Inc. has become one of the fastest growing privately held companies in the Technology, Intelligence Analysis, and Language Services consulting arena. Headquartered in Reston, VA and with a branch office in San Diego, CALNET employees deliver true value to our customers by employing best practices, world class technologies industry expertise in every project. CALNET is a CM...
Sr. Application Software Security Engineer Full Time Position with benefits Location : Houston TX Position Description Work alongside the development team for 1) source code analysis 2) vunerability assessment , 3) application Software Security Assessment (SSA). 4) Must have skill in static testing tool and dynamic testing tool 5) ethical hacking or penetration testing Position Requirements ...
Application Security Manager needed for our client, one of the largest and most recognized brand names in Los Angeles. This is a direct hire role and an opportunity to help shape the security practices of the company. This role requires extensive experience with penetration testing, ethical hacking, secure web development best practices, malware analysis and so on. This role will be the focal poin...

Get new jobs by email for this search
We'll keep looking and send you new jobs that match this search.
email me

Upload your resume and let employers find you!
It's that simple!

Popular Ethical Hacking Articles

Certification: Certified Ethical Hacker Article Rating
With this credential, techies hack in an above-the-board manner to uncover system and network vulnerabilities -- before criminals do.
For Employers: Post Jobs | Search Resumes | Advertise
About Monster | Work for Monster | Advertise with Us | AdChoices | Partner with Us | Investor Relations | Social Media
Terms of Use | Privacy Center | Accessibility Center | Help | Security | Contact Us | Sitemap | Mobile
©2014 Monster - All Rights Reserved U.S. Patents No. 5,832,497; 7,599,930 B1; 7,827,125 and 7,836,060 MWW - Looking for Monster Cable? - V: 2014.4.60.60-306
eTrustLogo