We are seeking a skilled Red Team Security Specialist to join our dynamic cybersecurity team. In this role,... Read more
We are seeking a skilled Red Team Security Specialist to join our dynamic cybersecurity team. In this role, you will be responsible for identifying vulnerabilities and weaknesses within our organization’s systems, networks, and applications through simulated cyber-attacks. You will conduct penetration tests, security assessments, and threat modeling exercises to uncover potential security flaws and provide actionable recommendations for remediation. Collaborating closely with our Blue Team, you will help to enhance our overall security posture and ensure robust protection against evolving cyber threats.
The ideal candidate will possess a strong understanding of network protocols, security technologies, and common attack methodologies. You should have experience with penetration testing tools such as Metasploit, Burp Suite, and Nmap, and be well-versed in programming or scripting languages such as Python, Bash, or PowerShell. A solid background in information security frameworks and standards, such as NIST and OWASP, is highly desirable. Additionally, you must demonstrate excellent analytical skills, strong communication capabilities, and the ability to work effectively in a team environment.
If you are passionate about cybersecurity and eager to take on new challenges, we encourage you to apply for this exciting opportunity. Join us in our mission to safeguard our organization from cyber threats while continuously improving our defenses and security strategies.
Read lessWe are seeking a highly skilled Principal Consultant for our Offensive Security team at Unit 42. In this... Read more
We are seeking a highly skilled Principal Consultant for our Offensive Security team at Unit 42. In this pivotal role, you will lead advanced security assessments and penetration testing engagements, utilizing your expertise to identify vulnerabilities in our clients’ systems and applications. You will work closely with cross-functional teams to develop tailored security strategies, ensuring our clients are equipped to defend against emerging threats. As a thought leader in the field, you will also contribute to the development of cutting-edge security methodologies and frameworks, while mentoring junior consultants to foster their growth and expertise.
Your responsibilities will include conducting comprehensive risk assessments, developing and executing tailored penetration testing plans, and delivering detailed reports to clients that outline vulnerabilities and remediation strategies. You will engage in threat modeling and risk analysis, helping organizations understand their security posture and the potential impact of identified vulnerabilities. Additionally, you will stay abreast of the latest threat intelligence and security trends, contributing to the ongoing development of Unit 42’s industry-leading knowledge base. Strong communication skills will be essential as you present findings and provide recommendations to both technical and non-technical stakeholders.
The ideal candidate will have a proven track record in offensive security, with extensive experience in penetration testing, vulnerability assessments, and security architecture reviews. Certifications such as OSCP, OSCE, or CEH are highly desirable. You should possess a deep understanding of networking protocols, operating systems, and application security, along with the ability to think critically and creatively to solve complex security challenges. Join us at Unit 42 and play a key role in shaping the future of cybersecurity.
Read lessWe are seeking a highly skilled Principal Consultant in Offensive Security to join our elite Unit 42 team.... Read more
We are seeking a highly skilled Principal Consultant in Offensive Security to join our elite Unit 42 team. In this role, you will be responsible for leading and executing advanced penetration testing engagements, threat simulations, and vulnerability assessments for our diverse clientele. You will leverage your expertise to identify security weaknesses in various environments, including networks, applications, and cloud infrastructures. As a thought leader, you will also be expected to mentor junior team members and provide guidance on best practices in offensive security methodologies.
Your duties will include developing comprehensive reports that detail findings and provide actionable recommendations for remediation. You will collaborate closely with clients to understand their unique security concerns and tailor your approach accordingly. Additionally, you will stay updated on the latest threat landscapes, tools, and techniques, contributing to research and development initiatives within Unit 42. Strong communication skills are essential, as you will present findings to both technical and non-technical stakeholders, helping to elevate our clients' security posture.
The ideal candidate will have a minimum of 7 years of experience in offensive security, with a proven track record of executing successful penetration tests and vulnerability assessments. Certifications such as OSCP, CEH, or similar are highly desirable. You should possess a deep understanding of attack vectors, exploitation techniques, and security frameworks, along with experience in scripting or programming languages. Join us to make a significant impact in the cybersecurity field and help organizations defend against emerging threats.
Read lessWe are seeking a skilled Manual Ethical Hacker to join our dynamic cybersecurity team. In this role, you... Read more
We are seeking a skilled Manual Ethical Hacker to join our dynamic cybersecurity team. In this role, you will be responsible for identifying and addressing vulnerabilities within our systems, applications, and networks. Your primary duties will include performing manual penetration testing, conducting vulnerability assessments, and providing detailed reports on your findings. You will work closely with our development and IT teams to offer actionable recommendations for remediation and ensure that security protocols are effectively integrated into the software development lifecycle.
The ideal candidate will have a deep understanding of various hacking techniques, methodologies, and tools, along with hands-on experience in manual penetration testing. You should possess a strong knowledge of networking protocols, web application security, and common vulnerabilities such as SQL injection and cross-site scripting. Additionally, you will be expected to stay abreast of the latest security threats and trends, ensuring that our security measures remain robust and up-to-date. Excellent problem-solving skills, attention to detail, and the ability to communicate complex technical concepts to non-technical stakeholders are essential for success in this position.
To qualify for this role, candidates should have a relevant degree in Computer Science, Information Technology, or a related field, along with industry-recognized certifications such as CEH, OSCP, or equivalent. A minimum of 2-3 years of experience in ethical hacking or a related cybersecurity role is preferred. If you are passionate about securing systems and enjoy the challenge of finding vulnerabilities before malicious actors do, we encourage you to apply and join us in our mission to protect our organization and our clients from cyber threats.
Read lessAre you passionate about cybersecurity and ethical hacking? We are seeking an enthusiastic and skilled Ethical Hacker -... Read more
Are you passionate about cybersecurity and ethical hacking? We are seeking an enthusiastic and skilled Ethical Hacker - Assistant Manager to join our dynamic team. In this role, you will be responsible for identifying vulnerabilities in our systems, applications, and networks. You will conduct penetration testing, vulnerability assessments, and risk analyses to ensure the integrity and security of our digital assets. Collaborating with cross-functional teams, you will provide recommendations for enhancing security measures and help implement innovative solutions to address potential threats.
Read lessfor the following search criteria