Ethical Hacking Jobs

RSS

625 Ethical Hacking jobs found on Monster.

Jobs 1 to 20 of 625
SQS is the world's leading independent specialist in software quality. SQS' position and expertise as the market leader are the result of over 30 years of successful consultancy. SQS offers a progressive working culture and a flexible approach to career development. We give you the opportunity to contribute your individual strengths. Continuous training and development keep our employees well educ...
Position Description: The successful candidate will report directly to the Head of the Security Lab and will perform network-based security vulnerability assessments based on the current Payment Card Industry ASV security scanning procedures. This person will also perform penetration tests in accordance with industry-accepted methods and protocols. Projects may include: Performing network-based...
SQS is the world's leading independent specialist in software quality. SQS' position and expertise as the market leader are the result of over 30 years of successful consultancy. SQS offers a progressive working culture and a flexible approach to career development. We give you the opportunity to contribute your individual strengths. Continuous training and development keep our employees well educ...
· Conduct Ethical Hacking Vulnerability Assessments & Penetration Testing in the following areas: o Operating System Security, Configuration and Integrity Assessments o General Controls, Database and Computer Application Assessments o Business Continuity Planning/​Disaster Recovery Planning (BCP/​DRP) o Performing technical IT audits and security reviews for the following technologies or areas...
Cisco Systems , Inc. RESEARCH TRIANGLE PAR, NC
Business Entity Cisco Global Security Services Team is a leader in network security. Based on extensive training, sophisticated tools, and years of securing some of the most complex networks in the world, we have developed proven methodologies for actively assessing Customer infrastructure and conducting a detailed analysis. The Team Dynamic Ethical Hacking Team working globally to help provid...
Cisco Systems, Inc. San Jose, CA, 95111
Business Entity Cisco Global Security Services Team is a leader in network security. Based on extensive training, sophisticated tools, and years of securing some of the most complex networks in the world, we have developed proven methodologies for actively assessing Customer infrastructure and conducting a detailed analysis. The Team Dynamic Ethical Hacking Team working globally to help provide a ...
Marten Transport Pittsburgh, PA
Company Description: At Intelatek we pride ourselves on providing our clients and candidates with the best that IT staffing has to offer. Making the right connections between people, solutions and objectives is essential. With us you can take a strategic approach to improving performance through an optimal mix of internal staff, outside consulting resources and project outsourcing. Our continuous ...
Our client is looking for candidates willing to work in the Pittsburgh area who have extensive experience with Web Application PenTesting, Source (Java) Code Review, Application Architecture, using Burp Suite Pro, or equivalent tools, to manually test for the vulnerabilities outlined in the OWASP Top 10 and can provide detailed, application code and architectural guidance to developers on how to e...
Job Title: IT Security Specialist – Vulnerability Testing / Ethical Hacker - *US Citizenship Required* Job Description: As an IT Security Specialist, you will participate in a variety of engagements, focusing on targets that may include network equipment, servers, applications, mobile devices, and other information systems. Job Requirements: Bachelor degree in Information Technology/Computer S...
enableIT New York, NY
Description As a member of the IT Immunity Security Solutions (www.itimmunity.com- a subsidiary of enableIT LLC) team you will engage in the assessment of security risks related to our clientsâ?? information technology platforms. The consultant will be required to work with both business and technology audiences within our clientsâ?? environments. Daily Responsibilities: Assess information secu...
The Ethical Hacker / Penetration Tester Job Description: The Ethical Hacker / Penetration Tester will be working individually and in teams mostly in a virtual capacity. This individual will be performing penetration testing or vulnerability assessment of web application, network, wireless, code review and firewall on multi-protocol enterprise systems. Job Requirements: Consulting Skills: Inde...
Company: Bank of America Printer-Friendly Job Description Ethical Hacking Analyst Charlotte, NC Description Key individual contributor, with accountability for researching, designing, engineering, implementing, and supporting information security & directory technology systems (software & hardware). Utilizes in-depth technical knowledge and business requirements to design & implement secure ...
ASRC Federal Research and Technology Solutions (ARTS) has been awarded a five year, $400 million dollar contract to provide comprehensive IT services to NASA Ames Research Center located in Mountain View, CA. From cloud computing & network/information security to systems administration and technology development, we are encouraging talented IT professionals to explore the vast opportunities avail...
Information Assurance Officer *Knowledge of technical security configurations and vulnerabilities. *Ability to use/manage/analyze results using Army Scanning and Patching Tools: Retina Scan; Assured Compliance Assessment Solution (ACAS); System Center Configuration Manager (SCCM); Systems Management System (SYSMAN). *Other duties include Managing IA Vulnerability Management (IAVM) Compliance an...
Job Description: Embedded Software Development/ Cyber Engineer to work in a fast paced rapid turn environment with challenging, interesting, and unique project developments. Analyze binary files and reverse engineer software (including C/C++ and Assembly) with minimal product background using Disassembler tools; such as IDA Pro. Research the risks and vulnerabilities and develop prototypes of the...
This position is located in our AZ, Ft Huachuca facility Provides technical support and troubleshooting to network, desktop, and/or systems hardware and software. 1. Screens, refers and diagnoses internal inquiries and work requests as they relate to maintenance of personal computers and related systems. 2. Assists with the installation, configuration, and upgrade of computer hardware and softw...
Title: Cyber Security Analyst Location: Washington, DC Responsibilities: • Provide Cyber Security and Information Security Continuous Monitoring (ISCM) Capability at the Cyber Security Operation Facility • Provide Cyber Security Incident Response (IR) and Support. • Provide Cyber Security Forensics Services and Support. • Update the Incident Response Plan. • Update and maintain the Incident...
Sr. Application Software Security Engineer Full Time Position with benefits Location : Houston TX Dynamic Testing Tools: (proficient in atleast one or more) IBM AppScan, HP WebInspect, Cenzic Hailstorm, Acuentix, NTO Spider, Netsparker, Burp Suite Proxy, ZAP Proxy, Fiddler Proxy Static Testing Tools: (proficient in atleast one or more) HP Fortify, AppScan Source, Checkmarx Source Code, Cover...
Function Corporate Security Primary Objective Responsible for general application security activities in D+H US. The Application Security Specialist will work with each D+H development team to detect, prioritize, and remediate security flaws within the SDLC process. Collaborate with IT and the business to identify and implement appropriate software development related security controls. Strives ...
Function Corporate Security Primary Objective Responsible for general application security activities in D+H US. The Application Security Specialist will work with each D+H development team to detect, prioritize, and remediate security flaws within the SDLC process. Collaborate with IT and the business to identify and implement appropriate software development related security controls. Strives ...

Get new jobs by email for this search
We'll keep looking and send you new jobs that match this search.
email me

Upload your resume and let employers find you!
It's that simple!

Popular Ethical Hacking Articles

Certification: Certified Ethical Hacker Article Rating
With this credential, techies hack in an above-the-board manner to uncover system and network vulnerabilities -- before criminals do.
For Employers: Post Jobs | Search Resumes | Advertise
About Monster | Work for Monster | Advertise with Us | AdChoices | Partner with Us | Investor Relations | Social Media
Terms of Use | Privacy Center | Accessibility Center | Help | Security | Contact Us | Sitemap | Mobile
©2014 Monster - All Rights Reserved U.S. Patents No. 5,832,497; 7,599,930 B1; 7,827,125 and 7,836,060 MWW - Looking for Monster Cable? - V: 2014.4.50.56-305
eTrustLogo