Hacker jobs near you
informatics security analyst
Certified Ethical Hacker¿(CEH) Certified information security systems practitioner (CISSP) Project Management Professional (PMP) Computer and technology knowledge R MS Office SQL Python..
Penetration Tester
Proven experience in penetration testing and ethical hacking. Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or similar. In depth..
Application Security Architect
AVAILABLE POSITIONS Application Security Architect Careers Category. Other Careers location. Austin, TX, Chicago, IL, Toronto, Canada Connected Worker Type. Connected R 111778 Zyng..
Marketing Manager Intern
Measure and report performance of marketing campaigns Gain insight from reported performance, and assess this against company goals. Creative and have a hacker mindset. Demonstrable experience..
ResponsiveAds Product Growth Marketing (Intern)
Requirements Qualifications Previous working experience as a Marketing Growth Hacker for several years Passionate about SaaS and the advertising, design, and creative industry Great communicator..
Independent Cyber Security Contractor (Penetration Testing)
Proven experience in penetration testing and ethical hacking. Certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or similar. In depth..
Security Technical Architect
CEH. Certified Ethical Hacker. CISM. Certified Information Security Manager. CompTIA Security. CISSP. Certified Information Systems Security Professional. CISSP ISSAP. Information Systems..
Senior Secret Cleared IT Security Vulnerability Specialist (10+ Years) to provide support and advice on IT Security related audits and assess departmental IT Security Mechanisms within the Public Sector
GIAC Security Expert (GSE). GIAC Penetration Tester (GPEN). GIAC Certified Incident Handler (GCIH) EC Council Certified Ethical Hacker (CEH). CompTIA PenTest. CompTIA Advanced Security..
Senior Cyber Security Specialist Security Engineer
Strong knowledge of at least one of the following areas. operating systems databases systems networks application development. Strong knowledge of computer vulnerabilities hacker methodologies..
Application security engineer
Contribute technical and procedural documentation towards the organization's knowledge base.What you will bring. Ability to think offensively like a hacker and defensively by evaluating..