Search Results: 12 vacancies
...international professionals in Cyber security domain.
Some of the certifications offered by EC-Council are:
Certified Ethical Hacker (C|EH):
Certified Network Defender (C|ND):
Computer Hacking Forensic Investigator (C|HFI):
Certified Chief Information...
...and in a team-oriented environment.
~ Demonstrate exceptional behaviors and interpersonal skills.
~ Excellent communication and client facing required.
Preferred Certifications
Pen Tester certification (LPT/ OSCP/GPEN) Certified
Certified Ethical Hacker (CEH)...
...variety of world-class Cyber security certifications.
Some of the certifications offered by EC-Council are:
Certified Ethical Hacker (C|EH):
Certified Network Defender (C|ND):
Computer Hacking Forensic Investigator (C|HFI):
Certified Chief Information Security...
...modern, data scientific methods at scale.
Ability to context-switch, to provide support to dispersed teams which may need an “expert hacker” to unblock an especially challenging technical obstacle, and to work through problems as they are still being defined....
...security architecture, incident response, and risk management.
Preferred certifications include CISSP, CISM, CEH (Certified Ethical Hacker), or equivalent certifications demonstrating expertise in information security management and practices.
Proven experience in...
...modern, data scientific methods at scale
Ability to context-switch, to provide support to dispersed teams which may need an “expert hacker” to unblock an especially challenging technical obstacle, and to work through problems as they are still being defined
Demonstrated...
...engineers working to ensure we build, maintain and deploy secure software that is used by millions of users around the globe. If you have a hacker mindset, are passionate about security and always looking to extend your knowledge, then this is the place for you.
In order to...
...attacks, XML/SOAP, API attacks, and more.
Experience in software development, Java, Python, Ruby, or other relevant languages
A hackers mindset
NECESSARY KNOWLEDGE, SKILLS, AND ABILITIES
Strong understanding of applied cryptography
In-depth knowledge of micro...
...Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent.
• Able to work shifts on a rotating basis for 24/7 support of clients.
• Experience in security technologies...
...different than a regular process, you're golden.Are you a free software/open source nerd? Do you maintain open source projects? Are you a Hacker News reader? Do you remember the days when you had to compile your own Linux kernel? Do you believe it should be called GNU/Linux?...
...their valuable IT assets. We use ethical hacking to discover security vulnerabilities. Our security engineers think and attack like a hackers to break and find security issues. We have helped many businesses improve their security posture and minimize risks. We are currently...
...Systems Security Professional (CISSP), Certification in Certified Intrusion Analyst (GIAC), Continuous Monitoring (GMON), Certified Ethical Hacker (CEH) or equivalent
~ Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity,...