- Ryder System (Montgomery, AL)
- …security, preferably with a strong computer science background. Information Security Penetration Tester /red teamers must understand applications, networking, and ... applications that may still be in use in the enterprise. Information Security Penetration Tester /red teamers must constantly search for system and application… more
- Leidos (Huntsville, AL)
- **Description** Leidos Defense Systems is seeking a full-time, talented, and motivated Penetration Tester to perform penetration tests on customer systems in ... to systems of various size and complexity. **Primary Responsibilities** + Penetration testing customers systems and networks. + Preparatory analysis for systems… more
- Leidos (Huntsville, AL)
- **Description** Leidos Defense Systems is seeking a full-time Penetration Tester - Security Engineer to perform penetration tests on customer systems in the ... to systems of various size and complexity. **Primary Responsibilities** + Penetration testing customers systems and networks. + Deep-dive preparatory analysis for… more
- Northrop Grumman (AL)
- …is seeking a well-qualified, creative, skilled, and motivated **Exploit Development / Penetration Tester ** to join our qualified, diverse, and dynamic team ... services. CATT conducts full-scope vulnerability assessment, exploit development, and penetration testing against Space Systems, Aeronautics, Mission Systems, manufacturing,… more
- Zurich NA (Montgomery, AL)
- …such as, but not limited to: A+, Network+, Server+, Security+, CyberSecurity Analyst+, Penetration Tester +, PMP, CRISC, CEH, Security+, Comptia SEC+, GIAC, GCFA, ... GCIH, GCFE, CFCE, MCFE,CISSP, CISM, CISA * SOC Analyst, application security, vulnerability management and/or threat intelligence experience * Experience with commercial and open source Digital Forensics tools, such as X-Ways, Magnet Axiom or Axiom Cyber,… more
- SAIC (AL)
- …in mobile application and API security to conduct comprehensive penetration testing exercises. Utilize industry-standard tools and methodologies to identify ... Utilize a risk-based approach to evaluate the findings from your penetration testing activities. Craft detailed and insightful reports outlining vulnerabilities,… more