applications, APIs, mobile applications, “thick client” applications, and IT infrastructure. Demonstrable skills in software such as Burp Suite, OWASP ZAP, SoapUI, Kali Linux (Metasploit, nmap, sqlmap, dirbuster, nikto, etc.). Extensive knowledge of application and IT infrastructure security best practices, including methodologies like OWASP Testing Guide, OSTMM, PTES, NIST. Proficiency more »
+, CEH, RHCA, RHCE, MCSA, MCP, or MCSE preferred Familiarity with tools such as IDA Pro, PEiD, PEview, Procmon, Snort, Bro, Kali Linux, Metasploit, NMAP, and Nessus Familiarity with GPO, Landesk, or other IT Infrastructure tools Understanding of programming/scripting languages and ability to run basic database queries Experience more »
Ability to perform black box, grey box, and white box tests with an attacker's mindset. Expertise in using tools like Kali, Burp Suite, Nmap, Nessus, Qualys, Metasploit, and others. Strong knowledge of the OWASP Testing Methodology. Solid understanding of security protocols such as SSL/TLS, SSH, and HTTP. more »