testing (blackbox/greybox/whitebox testing) and network architecture reviews (manual/automated) Perform other security testing tasks such as wireless penetration testing, socialengineering campaigns (email, web, phone, physical, etc.), mobile application testing, embedded device testing, and similar activities meant to identify critical weaknesses within client … security testing techniques such as threat modeling, network discovery, port and service identification, vulnerability scanning, network sniffing, penetration testing, configuration reviews, firewall rule reviews, socialengineering, wireless penetration testing, fuzzing, and password cracking and can perform these techniques from a variety of adversarial perspectives (white-, grey-, black-box more »
rewards for outstanding performance. Responsibilities: Perform regular penetration tests on web applications, infrastructure, cloud, API, wireless, and mobile applications. Contribute to Red Team and socialengineering testing. Write detailed reports and present test findings to clients. Consult clients on required remedial actions. Assist with the development of junior … with programming languages, databases, and IoT. Knowledge of containerisation technologies such as Docker. Experience with Attack & Threat Modelling. Familiarity with Red Team testing and socialengineering attack methodologies. Working knowledge of CobaltStrike. Experience with bug bounty programs and vulnerability disclosure policies. Education, Training, and Experience: Bachelor's degree more »
Familiar with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, penetration testing, configuration reviews, firewall rule reviews, socialengineering, wireless penetration testing, fuzzing, and password cracking and can perform these techniques from a variety of adversarial perspectives (white-, grey-, black-box … Hacker (CEH); GIAC Certified Penetration Tester (GPEN); GIAC Web Application Security (GWAS); Offensive Security Certified Professional (OSCP); GIAC Certified Incident Handler (GCIH); GIAC Reverse Engineering Malware (GREM); PCI Qualified Security Assessor (PCI-QSA); etc. One or more of the following governance certifications: Certified Information Systems Security Professionals (CISSP ); Certified more »
client sites, against network devices, servers, end user devices, cloud technologies, wireless networks, web and mobile applications Opportunities to deliver related services such as socialengineering, staff security awareness training, red teaming and IoT device testing Active testing is accompanied by writing detailed and accurate reports to communicate more »
the following: Conduct comprehensive investigations into potential intellectual property (IP) infringement using open-source intelligence (OSINT) techniques and methodologies. Utilize various online resources, including social media platforms, websites, forums, and dark web monitoring tools to gather relevant information. Leverage effective search strategies to uncover hidden infrastructure and key individuals … have the following qualifications and experience: Minimum of 2 years of experience conducting high-stakes OSINT investigations. Demonstrated expertise in advanced OSINT techniques, including socialengineering, infiltration, data mining, automation, and dark web analysis. Excellent written and verbal communication skills, with the ability to tailor reports and presentations more »