0 0
Read Time:1 Minute, 12 Second

#جذب #استخدام

متخصص تست نفوذ
Penetration Tester

Job Description
• Analyze and provide security solutions related to application security vulnerabilities
• Strong knowledge on network, web and mobile application penetration tests and code reviews
• Efficient experience on developing exploit.
• Hands on social engineering methods.
• Research and evaluate new attacks and techniques
• Check for compliance with security policies in order to ensure that confidentiality, integrity and availability are completely maintained.
• Share knowledge and teach to other colleagues as needed.
• Be creative for exploring and learning new methodologies.

Requirements
• Efficient experience in web application and network penetration testing.
• Familiar with Mobile Application penetration testing.
• Experience on developing exploits.
• Strong knowledge of open security testing standards and projects, including OWASP, SANS
• Enough knowledge of network, applications, database, and web server basics and configurations.
• Sufficient experience with tools, including Nessus, Acunetix, Metasploit, Burp Suite Pro, BeEF, Nmap and Kali Linux.
• Experience with programming at least one of the following: Perl, Python, Php, bash, C or C++, C#, or Java, including scripting and editing existing code
• Sufficient work experience in reporting penetration testing.
• Knowledge of security test standards such as SANS, OWASP, etc.

رنج حقوق از ٧ ميليون ت
لطفا ارسال رزومه بروز و مرتبط به ايميل سازماني
fakhari.ali@iran.ir

+ لطفا پيرامون مصاحبه هاي آگهي هاي كه از اين كانال به اشتراك گذاشته ميشه با حفظ محرمانگي، فيد بك را به آي دي اينجانب اعلام بفرمايد.

-بروز باشيد-

آگاهي رساني امنيت سايبري

@CisoasaService

99.04.18

About Post Author

Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence
Happy
Happy
0 %
Sad
Sad
0 %
Excited
Excited
0 %
Sleepy
Sleepy
0 %
Angry
Angry
0 %
Surprise
Surprise
0 %

By Treadstone 71

@Treadstone71LLC Cyber intelligence, counterintelligence, Influence Operations, Cyber Operations, OSINT, Clandestine Cyber HUMINT, cyber intel and OSINT training and analysis, cyber psyops, strategic intelligence, Open-Source Intelligence collection, analytic writing, structured analytic techniques, Target Adversary Research, cyber counterintelligence, strategic intelligence analysis, estimative intelligence, forecasting intelligence, warning intelligence, threat intelligence