with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing, fuzzing, and password cracking and can perform these techniques from a variety of adversarial perspectives (white-, grey-, black-box) In-depth … Ethical Hacker (CEH); GIAC Certified Penetration Tester (GPEN); GIAC Web Application Security (GWAS); Offensive Security Certified Professional (OSCP); GIAC Certified Incident Handler (GCIH); GIAC ReverseEngineeringMalware (GREM); PCI Qualified Security Assessor (PCI-QSA); etc. One or more of the following governance certifications: Certified Information Systems Security more »
Force Cyber & IO schoolhouse). This position will be located at Hurlburt Field, Florida and will be an onsite position. Responsibilities: Responsibilities: Provide extensive engineering, technical, and operational analytical support services. This includes performing in-depth technical assessments of vendor solutions, malwarereverseengineering, network and more »
to build AI for understanding the contents and behaviour of software, without having access to the source code. Our product assists customers in binary reverseengineering, malware analysis, malware detection, exploit generation, software supply chain security, and vulnerability research. Job Description We are looking to hire more »