Closing: Jan 1, 2023
This position has expiredPublished: Dec 21, 2022 (2 months ago)
Job Requirements
Education:

Work experience:

Language skills:

Job Summary
Contract Type:

Sign up to view job details.
Requirements
- Bachelor's Degree in Information Technology or Computer Science.
- Advanced knowledge of networking systems and security software.
- In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.
- Technical knowledge of routers, firewalls, and server systems.
- Proven work experience as a certified ethical hacker.
- Relevant Certification.
Skills / Competencies:
- Solid understanding of SIEM Solutions.
- CISSP or CISA Preferred. At a minimum Comptia Security+
- Proven hands-on ethical hacking knowledge.
- Knowledge of Firewall and configuration such as Fortigate and Checkpoint UTM.
- Knowledge of Cloud Security.
Method of Application
Interested and qualified candidates should send their CV using the Job Title as the subject of the mail.
Responsibilities
Requirements
- Bachelor's Degree in Information Technology or Computer Science.
- Advanced knowledge of networking systems and security software.
- In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.
- Technical knowledge of routers, firewalls, and server systems.
- Proven work experience as a certified ethical hacker.
- Relevant Certification.
Skills / Competencies:
- Solid understanding of SIEM Solutions.
- CISSP or CISA Preferred. At a minimum Comptia Security+
- Proven hands-on ethical hacking knowledge.
- Knowledge of Firewall and configuration such as Fortigate and Checkpoint UTM.
- Knowledge of Cloud Security.
Method of Application
Interested and qualified candidates should send their CV using the Job Title as the subject of the mail.
- Researching the company's system, network structure, and possible penetration sites.
- Conducting multiple penetration tests on the system.
- Identifying and recording security flaws and breaches.
- Identifying areas of high-level security.
- Reviewing and rating the security network.
- Creating suggestions for security upgrades.
- Compiling penetration test reports for the client.
- Conducting penetration tests once new security features have been implemented.
- Suggesting alternate upgrades.

Applications submitted via Fuzu have 32% higher chance of getting shortlisted.