Pen Tester

Orlando, FL

Applications have closed

ThreatLocker

We are an endpoint protection platform that offers top enterprise security software and solutions. Keep your business safe with zero trust endpoint security!

View company page

COMPANY OVERVIEW

ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools for the Managed Services Provider (MSP) industry to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities.

 

POSITION OVERVIEW

The Pen Tester monitors and protects sensitive data and systems from intrusions and helps the organization to understand, mitigate and remediate cyber threats.

 

JOB SCOPE

The Pen Tester will be responsible for, but not limited to:

  • Develop, execute and track the performance of security measures to protect information and network infrastructure and computer systems.
  • Design computer security strategy and engineer comprehensive cybersecurity architecture.
  • Identify, define and document system security requirements and recommend solutions to management.
  • Configure, troubleshoot and maintain security infrastructure software and hardware.
  • Install software that monitors systems and networks for security breaches and intrusions. 
  • Monitor systems for irregular behavior and set up preventive measures. 
  • Plan, develop, implement and update company’s information security strategy.
  • Educate and train staff on information system security best practices.


REQUIRED QUALIFICATIONS

  • Minimum of 5 years experience in system administration/ IT 
  • Bachelor's degree in Information Technology, Computer Science, Information Systems, or related field of study with a network engineering focus, preferred
  • Strong understanding of operating systems (Linux, Microsoft, Mac, etc.) and database security 
  • Knowledge of security systems including anti-virus applications, content filtering, firewalls, authentication systems and intrusion detection and notification systems
  • Ability to think through problems and visualize solutions
  • Expertise in designing secure networks, systems and application architectures
  • Disaster recovery, computer forensic tools, technologies and methods
  • Planning, researching and developing security policies, standards and procedures
  • System administration, supporting multiple platforms and applications
  • Experience with and knowledge of endpoint security solutions, including file integrity monitoring and data loss prevention
  • AWS and cloud platform as a service (PaaS) experience
  • Strong understanding of security controls around server and machine access as well as cloud account provisioning and access

 

WORKING CONDITIONS

The duties described below are representative of those encountered while performing the essential functions of this position. If necessary, reasonable accommodation may be requested and will be evaluated for its relationship to the essential functions that must be performed.

  • Job will generally be performed in an office environment but may require travel to visit company offices and/or property locations.
  • While performing duties of this job, would occasionally require to stand, walk, sit, reach with hands and arms, climb or balance, stoop or kneel, talk and hear, and use fingers and hands to feel objects and tools.
  • Must occasionally lift and/or move up to 25 pounds.
  • Specific vision abilities required include close vision, distance vision, depth perceptions, and the ability to adjust focus.

Tags: AWS Cloud Computer Science Endpoint security Firewalls Intrusion detection Linux Monitoring PaaS Security strategy Strategy Vulnerabilities

Region: North America
Job stats:  15  1  0
Category: PenTesting Jobs

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.