Gathering your results ...
8 days
Not Specified
Not Specified
Not Specified
<p>Why Join Us?</p> <p>Join our global team of elite ethical hackers, working with both Check Point and non-Check Point customers across industries worldwide. Collaborate with Check Point's research and Incident Response teams to uncover cutting-edge cyber threats, gaining exposure to the most advanced security challenges in the field.</p> <p>Key Responsibilities</p> <ul> <li>Conduct penetration testing on applications and network environments to identify vulnerabilities and security gaps. </li><li>Develop and document testing plans and penetration test reports with clear findings and recommendations. </li><li>Perform reconnaissance and network surveys to assess target environments. </li><li>Research security tools, exploits, and emerging threats, contributing to blogs and knowledge-sharing initiatives. </li><li>Analyze vulnerabilities, exploit weaknesses, and escalate access where applicable. </li><li>Assist in malware analysis and breach investigations to support incident response efforts. </li><li>Stay up to date with the latest attack techniques, tools, countermeasures, and technologies. </li><li>Mentor new team members and contribute to the development of tools, templates, and methodologies for penetration testing. </li></ul> <p>Qualifications</p> <ul> <li>5+ years of experience in web application penetration testing, internal and external PT experience following OWASP methodologies </li><li>Hands-on experience with offensive security tools such as Burp Suite, Fiddler, SQLmap, Metasploit, Nmap, Netcat, BloodHound, Empire, and Wireshark </li><li>Strong understanding of network security concepts, including firewalls, VPNs (IPsec & SSL), IDS/IPS, and WLANs </li><li>Proficiency in scripting and automation (Python, PowerShell, JavaScript, Bash) </li><li>Experience managing and securing Windows and Unix/Linux environments </li><li>Knowledge of database security, including functions, interactions, and communications </li><li>Ability to effectively communicate findings to technical and non-technical stakeholders, including C-level executives </li><li>Hands-on experience in exploiting security vulnerabilities in lab or real-world environments (e.g., Capture the Flag challenges) </li><li>Experience in penetration testing for operational technologies (OT) - Advantage </li><li>OSCP / OSWE certifications or equivalent ethical hacking certifications - Advantage </li><li>Must be eligible to work in the US without sponsorship from an employer now or in the future. </li></ul> <p>EOE M/F/Veterans/Disabled</p> <p>Apply Now</p>
POST A JOB
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!
It's completely FREE to post your jobs on ZiNG! There's no catch, no credit card needed, and no limits to number of job posts.
The first step is to SIGN UP so that you can manage all your job postings under your profile.
If you already have an account, you can LOGIN to post a job or manage your other postings.
Thank you for helping us get Americans back to work!