Pen Tester
Orlando, FL
Applications have closed
ThreatLocker
We are an endpoint protection platform that offers top enterprise security software and solutions. Keep your business safe with zero trust endpoint security!COMPANY OVERVIEW
ThreatLocker® is a global cybersecurity leader, providing enterprise-level cybersecurity tools for the Managed Services Provider (MSP) industry to improve the security of servers and endpoints. ThreatLocker’s combined Application Whitelisting, Ringfencing™, Storage Control and Privileged Access Management solutions are leading the cybersecurity market towards a more secure approach of blocking unknown application vulnerabilities.
POSITION OVERVIEW
The Pen Tester monitors and protects sensitive data and systems from intrusions and helps the organization to understand, mitigate and remediate cyber threats.
JOB SCOPE
The Pen Tester will be responsible for, but not limited to:
- Develop, execute and track the performance of security measures to protect information and network infrastructure and computer systems.
- Design computer security strategy and engineer comprehensive cybersecurity architecture.
- Identify, define and document system security requirements and recommend solutions to management.
- Configure, troubleshoot and maintain security infrastructure software and hardware.
- Install software that monitors systems and networks for security breaches and intrusions.
- Monitor systems for irregular behavior and set up preventive measures.
- Plan, develop, implement and update company’s information security strategy.
- Educate and train staff on information system security best practices.
REQUIRED QUALIFICATIONS
- Minimum of 5 years experience in system administration/ IT
- Bachelor's degree in Information Technology, Computer Science, Information Systems, or related field of study with a network engineering focus, preferred
- Strong understanding of operating systems (Linux, Microsoft, Mac, etc.) and database security
- Knowledge of security systems including anti-virus applications, content filtering, firewalls, authentication systems and intrusion detection and notification systems
- Ability to think through problems and visualize solutions
- Expertise in designing secure networks, systems and application architectures
- Disaster recovery, computer forensic tools, technologies and methods
- Planning, researching and developing security policies, standards and procedures
- System administration, supporting multiple platforms and applications
- Experience with and knowledge of endpoint security solutions, including file integrity monitoring and data loss prevention
- AWS and cloud platform as a service (PaaS) experience
- Strong understanding of security controls around server and machine access as well as cloud account provisioning and access
WORKING CONDITIONS
The duties described below are representative of those encountered while performing the essential functions of this position. If necessary, reasonable accommodation may be requested and will be evaluated for its relationship to the essential functions that must be performed.
- Job will generally be performed in an office environment but may require travel to visit company offices and/or property locations.
- While performing duties of this job, would occasionally require to stand, walk, sit, reach with hands and arms, climb or balance, stoop or kneel, talk and hear, and use fingers and hands to feel objects and tools.
- Must occasionally lift and/or move up to 25 pounds.
- Specific vision abilities required include close vision, distance vision, depth perceptions, and the ability to adjust focus.
Tags: AWS Cloud Computer Science Endpoint security Firewalls Intrusion detection Linux Monitoring PaaS Security strategy Strategy Vulnerabilities
Explore more InfoSec / Cybersecurity career opportunities
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
- Open Information Security Specialist jobs
- Open Senior Cyber Security Engineer jobs
- Open Ethical hacker / Pentester H/F jobs
- Open Principal Security Engineer jobs
- Open Cyber Security Architect jobs
- Open Staff Security Engineer jobs
- Open Information Systems Security Officer (ISSO) jobs
- Open Product Security Engineer jobs
- Open Manager Pentest H/F jobs
- Open Cyber Security Specialist jobs
- Open Senior Information Security Analyst jobs
- Open Cybersecurity Analyst jobs
- Open Chief Information Security Officer jobs
- Open Consultant infrastructure sécurité H/F jobs
- Open IT Security Analyst jobs
- Open Cybersecurity Consultant jobs
- Open Consultant SOC / CERT H/F jobs
- Open Senior Information Security Engineer jobs
- Open Security Specialist jobs
- Open Senior Penetration Tester jobs
- Open Cybersecurity Specialist jobs
- Open Security Researcher jobs
- Open Senior Security Architect jobs
- Open IT Security Engineer jobs
- Open Security Operations Analyst jobs
- Open CISM-related jobs
- Open Windows-related jobs
- Open Network security-related jobs
- Open ISO 27001-related jobs
- Open Pentesting-related jobs
- Open Application security-related jobs
- Open Agile-related jobs
- Open GCP-related jobs
- Open Vulnerability management-related jobs
- Open SaaS-related jobs
- Open CISA-related jobs
- Open Analytics-related jobs
- Open IAM-related jobs
- Open Threat intelligence-related jobs
- Open APIs-related jobs
- Open Java-related jobs
- Open Security assessment-related jobs
- Open Malware-related jobs
- Open DevOps-related jobs
- Open IDS-related jobs
- Open Security Clearance-related jobs
- Open Forensics-related jobs
- Open CEH-related jobs
- Open EDR-related jobs
- Open Kubernetes-related jobs