This post is over 30 days old. The position may no longer be available

Ethical hacker/Penetration Testing

Cypher , Anywhere · cypherconsultancy.com · Full-time employment · Testing/Quality Assurance

Job description

 

Location: Ideally Hong Kong however we're flexible. 

We're looking for a candidate to join us with the following skillset: 

  1. Experience with Python, PowerShell, or similar programming language
  2. Experience with Nessus, NMap, BurpSuite, MetaSploit, WireShark, and sqlmap
  3. Knowledge of penetration testing methodology
  4. Knowledge of TCP/IP networking
  5. Advantageous if have some ethical hacking certification and have certifications like GPEN or OSCE.
  6. 1-3 years of experience working in the information security field

 

Key roles of the candidate:

  1. Provide penetration testing of any asset on the client backbone, including server and workstation devices, such as Windows, UNIX, and Linux, network devices, such as routers, switches, and video teleconference, and storage devices.
  2. Provide Penetration testing of storage devices, such as fibre channel switches and network attached storage, and storage controller applications.
  3. Provide penetration testing of applications, such as Web, database, e–mail, FTP, and SSH, and security devices, such as firewalls, intrusion detection systems, and Web content filters.
  4. Perform network and web vulnerability assessment
  5. Participate in client meetings and provide technical expertise
  6. Provide sales/marketing support
  7. Have mobile app pentesting skills would be a plus

Company Information

CYPHER is an innovative cyber security assessment consultancy based in Asia with a mission to empower SMEs to protect themselves against malicious hackers. We are a group of ethical hackers who provide security assessment/ethical hacking and security awareness and training to clients. Our company is also in the process of developing an exciting AI based security product, led by a recognized security researcher based in the Silicon Valley who has written books and given talks on machine learning/AI hacking at DEFCON and other hacking conferences.

Apply for this position

Login with Google or GitHub to see instructions on how to apply. Your identity will not be revealed to the employer.

It is NOT OK for recruiters, HR consultants, and other intermediaries to contact this employer