Ethical hacker
isolutions
Dornbirn, Austria
2 days ago
Role details
Contract type
Permanent contract Employment type
Full-time (> 32 hours) Working hours
Regular working hours Languages
Dutch, English Experience level
IntermediateJob location
Utrecht, Netherlands
Tech stack
C
PHP
Proxy Servers
Computer Security
Intrusion Detection Systems
Python
Shell Script
Cyber Threat Analysis
Firewalls (Computer Science)
Information Technology
Cybercrime
Vulnerability Analysis
Requirements
- You are pragmatic, flexible and capable of independently steering on complex ethical hacking operations.
- You're comfortable with being out of your comfort zone.
- You have the capability to perform complex analysis to be able to define, structure and prioritize required actions. You also capable of keeping the overview and statuses of these actions.
- You are capable of developing ethical hacking scenarios in regards to complex bank processes and IT systems.
- You have strong verbal and written communicative skills in English and Dutch.
- You're experienced in giving presentations and are capable of transferring a clear and solid message to people with and without technical background.
- You are a team player and are aware of the sensitivities within the organization.
- You have integrity and know how to work with classified information.
- You're aware of cyber security trends and leatest threats.
- You like to read articles in which the latest hacks are written down with the smallest level of detail.
Technical skills:
- Deep knowledge and experience in IT, Security, Cyber Threat Intelligence, executing forensic IT investigations and/or Red Teaming.
- Knowledge and experience in analyzing different attack techniques and resources such as rootkits, malware, Trojans, man-in-the-middle attacks etc.
- You are up-to-date with the latest developments in cybercrime and IT security.
- Experience with python, C, PHP and shell scripting.
- You have experience with different security technologies such as Security Information Event Monitoring, Intrusion Detection Systems, firewalls, proxies, vulnerability scanning, honeypots, cyber threat intelligence etc.
Preferred qualifications (but not limitative):
- Bachelor or Master, preferred in IT/Security
- GCIH, GCIA, GFCA, OSCP or equal certifications.
- 5+ year working experience in an IT function.
- 3+ working experience in an IT security function
- Screening