Security Expert (Penetration Testing/Hacking) - V2EX
V2EX = way to explore
V2EX 是一个关于分享和探索的地方
现在注册
已注册用户请  登录
外包信息请发到 /go/outsourcing 节点。
不要把相同的信息发到不同的节点
zbd123
V2EX    酷工作

Security Expert (Penetration Testing/Hacking)

  •  1
     
  •   zbd123 2024-01-08 22:33:50 +08:00 1636 次点击
    这是一个创建于 726 天前的主题,其中的信息可能已经有所发展或是发生改变。

    Company/Team Overview

    We're an innovative B2B SaaS company with a line of products and services including affiliate management, back-office systems, payments, security, and business intelligence. As a cutting-edge technology firm, we are dedicated to safeguarding company/customer digital assets and ensuring the highest standards of cybersecurity. We are seeking a skilled and experienced Security Expert specializing in penetration testing/hacking to join our dynamic team.

    Job Opening

    Position: Security Expert (Penetration Testing/Hacking)

    Description: If you're a standout pen-tester/hacker with 5+ years of hacking experience, including in-depth understanding of system engineering, experience building botnets, reverse sock5 proxies, and using Metasploit along with other standard tools, read on.

    Responsibilities:

    • Penetration Testing: Conduct thorough and comprehensive penetration tests to identify vulnerabilities and weaknesses in our systems.
    • Security Assessments: Perform in-depth security assessments to evaluate and enhance our overall cybersecurity posture.
    • Anti-Hacking Practices: Implement and refine advanced anti-hacking practices to protect against evolving cyber threats.
    • Security Architecture: Contribute to the design and implementation of robust security architecture for our systems.
    • Incident Response: Develop and execute incident response plans, ensuring rapid and effective response to security incidents.
    • Security Awareness: Foster a culture of security awareness among team members and provide training as needed.
    • Collaboration: Work closely with cross-functional teams to integrate security measures seamlessly into our technology stack.
    • Research and Development: Stay abreast of the latest cybersecurity trends, emerging threats, and technological advancements to continuously enhance our security protocols.
    • Documentation: Maintain detailed documentation of security processes, procedures, and test results.
    • Compliance: Ensure compliance with relevant industry standards and regulations related to cybersecurity.

    Qualifications:

    • Deep understanding of multiple Operating Systems - Unix/Linux, Windows, etc.
    • In-depth understanding of computers, system engineering, and networking.
    • Proven experience in developing botnets and running scripts on endpoints.
    • Proficiency in various anti-hacking practices and tools like Metasploit, Intruder, etc.
    • Proven experience in performing penetration tests and security assessments.
    • Advanced knowledge of cybersecurity principles, protocols, and technologies.
    • Familiarity with industry standards and compliance requirements.
    • Strong analytical and problem-solving skills.
    • Excellent communication and interpersonal skills.
    • Relevant certifications such as CISSP, CEH, or OSCP are highly desirable.
    • Bachelor's degree in Computer Science, Information Security, or a related field.

    Additional Instructions: USDT 5000-10000+

    zbd123
        1
    zbd123  
    OP
       2024-01-08 22:50:41 +08:00
    关于     帮助文档     自助推广系统     博客     API     FAQ     Solana     885 人在线   最高记录 6679       Select Language
    创意工作者们的社区
    World is powered by solitude
    VERSION: 3.9.8.5 25ms UTC 19:03 PVG 03:03 LAX 11:03 JFK 14:03
    Do have faith in what you're doing.
    ubao msn snddm index pchome yahoo rakuten mypaper meadowduck bidyahoo youbao zxmzxm asda bnvcg cvbfg dfscv mmhjk xxddc yybgb zznbn ccubao uaitu acv GXCV ET GDG YH FG BCVB FJFH CBRE CBC GDG ET54 WRWR RWER WREW WRWER RWER SDG EW SF DSFSF fbbs ubao fhd dfg ewr dg df ewwr ewwr et ruyut utut dfg fgd gdfgt etg dfgt dfgd ert4 gd fgg wr 235 wer3 we vsdf sdf gdf ert xcv sdf rwer hfd dfg cvb rwf afb dfh jgh bmn lgh rty gfds cxv xcv xcs vdas fdf fgd cv sdf tert sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf sdf shasha9178 shasha9178 shasha9178 shasha9178 shasha9178 liflif2 liflif2 liflif2 liflif2 liflif2 liblib3 liblib3 liblib3 liblib3 liblib3 zhazha444 zhazha444 zhazha444 zhazha444 zhazha444 dende5 dende denden denden2 denden21 fenfen9 fenf619 fen619 fenfe9 fe619 sdf sdf sdf sdf sdf zhazh90 zhazh0 zhaa50 zha90 zh590 zho zhoz zhozh zhozho zhozho2 lislis lls95 lili95 lils5 liss9 sdf0ty987 sdft876 sdft9876 sdf09876 sd0t9876 sdf0ty98 sdf0976 sdf0ty986 sdf0ty96 sdf0t76 sdf0876 df0ty98 sf0t876 sd0ty76 sdy76 sdf76 sdf0t76 sdf0ty9 sdf0ty98 sdf0ty987 sdf0ty98 sdf6676 sdf876 sd876 sd876 sdf6 sdf6 sdf9876 sdf0t sdf06 sdf0ty9776 sdf0ty9776 sdf0ty76 sdf8876 sdf0t sd6 sdf06 s688876 sd688 sdf86