Penetration Tester


Premium Job From BCT Resourcing

Recruiter

BCT Resourcing

Listed on

22nd August 2021

Location

London

Type

Permanent

Start Date

2021-08-20 15:25:43

This job has now expired please search on the home page to find live IT Jobs.

Penetration Tester
London


Company client is pleased recruiting for a Penetration Tester for a Forbes top world employer last year based in London. The successful Penetration Tester will work closely with engineering teams to provide security guidance and training to engineers. They will also conduct manual application security testing and source code auditing for a variety of technologies.


Client:
Our Client is a multinational Technology company that provides technology, information security, consulting, ITO and BPO services. They have been named as one of the most admired IT service companies in the world.

 
Tech Requirements:
·      Needs Experience in manually testing web application.
·      Needs Experience with scripting language (for example perl, ruby, python, PHP and programming language for example go, javascript, java).
·      Proficiency in UNIX and/or Mac OS X.
·      Background in web application development and/or code auditing strongly preferred.
·      Good communication skills both verbal and written.
·      Passionate about researching and discovering new exploitation techniques and vulnerabilities.
·      Have experience in security architecture reviews and/or performing threat models.
·      Have experience in securing Cloud environments for example AWS.


Ideal person:

·      Will be able to conduct security architecture review of the full stack, this will include applications built on emerging technologies and cloud.
·      Carry out manual application security testing and source code auditing for a variety of different technologies.
·      Preferred - BS in Computer security or Computer Science
·      Preferred - OSCP certification

You are currently using an outdated browser.

Please consider using a modern browser such as one listed below: