Track This Job
Add this job to your tracking list to:
- Monitor application status and updates
- Change status (Applied, Interview, Offer, etc.)
- Add personal notes and comments
- Set reminders for follow-ups
- Track your entire application journey
Save This Job
Add this job to your saved collection to:
- Access easily from your saved jobs dashboard
- Review job details later without searching again
- Compare with other saved opportunities
- Keep a collection of interesting positions
- Receive notifications about saved jobs before they expire
AI-Powered Job Summary
Get a concise overview of key job requirements, responsibilities, and qualifications in seconds.
Pro Tip: Use this feature to quickly decide if a job matches your skills before reading the full description.
The following Experience is applicable to this Role:
- Experience in conducting penetration testing of applications before initial deployment and as they are subsequently updated.
- Ability to identify the programmes which are vulnerable to malicious access to important content or systems.
- Ability to identify the web applications which are vulnerable to malicious exploitation, frequently infecting visitors’ computers with troublesome 27 viruses and other malware that can create access pathways for data exfiltration.
- Experience in finding and exploiting an application vulnerability to allow better code reviews, forensics analysis, threat analysis, and incident response
- Ability to devise, analyze, and systematically assess the ability of systems and networks to withstand sophisticated adversaries (i.e., adversaries who have not only advanced technical skills, but also knowledge of the architecture and systems they are targeting).
- Experience in conducting sophisticated, methodical, comprehensive technical testing of configurations, pathways, and interactions between systems that mimic the techniques employed by advanced adversaries.
- Mandatory Penetration Testing certifications In addition to the above, please see the following qualifications that are desirable for this role:
- Systems Security Certified Practitioner (SSCP)
- Certified Information Systems Security Professional (CISSP)
- Certified Information Security Manager (CISM)
Key Skills
Ranked by relevanceReady to apply?
Join PFH Technology Group and take your career to the next level!
Application takes less than 5 minutes