vulnerabilities in the infrastructure. Desired Qualifications:Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) and\or Certified Ethical Hacker (CEH)Knowledge and experience with Microsoft Office and Visio.Knowledge of WAN technologies including MPLS, SD WAN.Knowledge of cloud providers security (AWS, GCP or more »
and shareholders through continuous comprehensive cyber security testing. CSA consists of multiple assessment teams that focuses on different technology, platform, and stakeholders.As a Manual EthicalHacking Specialist, you will join a dynamic team of world class security experts to conduct application security/penetration tests of our internal … Expert (OSWE)SANS GIAC Penetration Tester (GPEN)SANS GIAC Exploit Researcher and Advanced Penetration Tester (GXPN)SANS GIAC Web Application Penetration Tester (GWAPT)Certified Ethical Hacker (CEH)Experience in conducting vulnerability assessments, code reviews and penetration tests against web/mobile application technologies, services, platforms and languages to find more »
leading the defence function, by providing strategic direction and coordinating day-to-day delivery of threat intelligence, threat detection, incident response, vulnerability management and ethicalhacking capabilities identify and deliver opportunities for continual improvement of the cyber defence function brief senior stakeholders on the cyber threat to the more »
Reverse engineering in IDA Pro or Ghidra. Familiarity with one or more of ARM, AARCH64, x86, x64. Knowledge of bug hunting/vulnerability research. Ethicalhacking , including familiarity with web/network technologies Knowledge of exploitation techniques and mitigations. Experience and knowledge of Linux and its internals. Experience more »