View all jobs


UNITED STATES, UNITED STATES · Information Technology

As a Penetration Tester, you will actively exploit vulnerabilities and use what we find to help develop solutions that can secure the enterprise. Our assessment process includes four components.

Working with the customer to take stock of system elements, including networks, applications, and mobile assets. Gather key information including registration data, operating system, patch, and service version information, and system and application configurations.

Based on what we learn during the discovery phase, you will then take steps to challenge them. Using a variety of applicable tools, including in-house and commercially available programs, you will create a real-world scenario where you attempt to compromise system, application, and mobile security, gain unauthorized access to resources, or disrupt and exploit system services.

As a security expert, you will exploit vulnerabilities detected during the identification stage, to determine the level of impact to the enterprise, had someone with malicious intent attempted the same action.

If access to any vulnerable hosts are achieved, you will attempt to escalate privileges on these exploited systems and leverage this access to gain additional access into the network you are testing. During this stage multiple different cutting edge techniques will be used to identify multiple potential ways to compromise a customer’s network and then provide recommendations for remediation.

  • Providing consulting services in the discipline of vulnerability assessments and penetration testing.
  • Supporting Delivery and post-delivery.
  • Providing delivery of specific vulnerability assessments and penetration testing services.
  • Performing Network, System, Application, Mobile, web, and wireless assessments.
  • Reviewing Security Source Code.
  • Overseeing Red Team Operations.
  • Participating in the development of new Threat & Vulnerability practice services and tools.
  • Leading customer engagements and provide presentation of results to clients.

You’ll need to have:

  • Bachelor’s Degree or four or more years of work experience.
  • Four or more years of relevant work experience.
  • Red Team or Ethical Hacking experience.
  • Experience delivering vulnerability assessments and penetration tests, preferably in a consultative environment.

Even better if you have:

  • A Degree in a technology related focus.
  • Eight or more years of experience delivering penetration testing consulting engagements.
  • Ten or more years of experience in information technology/cyber security.
  • Certifications such as CEH, OSCP, CISSP.
  • Written and verbal communication and formal presentation skills.
  • Ability to work with clients effectively.
  • Experience with web and mobile application penetration testing.
KP Recruiting Group was started to create a world-wide network of multi-level, highly skilled talent; that are either experts or working to become one, in their respective fields. Our process involves focusing on the talent, skills, and experience of an individual as a key indicator of the present and future value that they will bring to any organization.

In establishing a network, we are able to forge genuine relationships with talent and gain valuable insight that allows us to understand what motivates them. This data allows us to give strategic advice to our partners as they go through the process of managing their human capital.

See our jobs and apply here: https://kprecruitinggroup.catsone.com/careers/7781-General

Powered by