What you'll do...
You’ll sweep us off our feet if….
- You can identify exploitable security vulnerabilities in IoT, embedded devices, cloud-based technologies and services, mobile solutions, APIs, hardware, firmware, source code and applications
- You're a well-versed Penetration Tester/Ethical Hacker, you will be expected to have knowledge in multiple domains while providing meaningful contributions
- You are a great communicator who can talk about technical information to a wide audience with varying technical understanding
You’ll make an impact by…
- Performing security testing techniques against unique targets in a diverse global technology footprint
- Identifying exploitable security vulnerabilities in IoT, embedded devices, cloud-based technologies and services, mobile solutions, APIs, hardware, firmware, source code and applications
- Creating reports based off findings and working with customer to resolve those findings
What you'll do:
- Developing exploits and customized proof of concepts for diverse targets and tech stacks
- Developing and utilizing advanced tools for penetration testing and exploiting vulnerabilities
- Researching, learning, and continuously improving skills to emulate attacker tactics, techniques, and procedures
- Influencing technical and business strategies by articulating technical risk associated with key business solutions
- Providing security and vulnerability remediation expertise to technology stakeholders and partners
- Assist in the implementation of advanced security technology solutions by conducting feasibility studies, proof of concept, product comparison, and/or optimization analyses; participating in project artifact and technical reviews; challenging suppliers to improve technology; and researching technology and software development for secure information technology solutions.
- Maintains and advances security expertise by reviewing new technologies; maintaining knowledge of current security standards (for example, NIST 800-53, ISO27001, Cloud Security Alliance); participating in continuing education and training (for example, relevant industry certifications, forums); and maintaining expert level knowledge of enterprise technologies.
What you'll bring:
- 1+ years Information Security experience
- Associate degree (or higher) Or Certifications to show Information Security understanding
- Advanced-level experience security testing in dynamic enterprise cloud environments
- Penetration testing using the OWASP Top 10 methodology
- Strong communication skills with the ability to articulate and translate security and risk management terminology in business terms
- Motivated by challenges and have a proven track record for delivering results at scale
- Possess one or more of these credentials: OSCP, OSWE, GXPN, GWAPT, GPEN (preferred but not required)
Benefits: Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include 401(k) match, stock purchase plan, paid maternity and parental leave, PTO, multiple health plans, and much more.
The above information has been designed to indicate the general nature and level of work performed in the role. It is not designed to contain or be interpreted as a comprehensive inventory of all responsibilities and qualifications required of employees assigned to this job. The full Job Description can be made available as part of the hiring process.
You will also receive PTO and/or PPTO that can be used for vacation, sick leave, holidays, or other purposes. The amount you receive depends on your job classification and length of employment. It will meet or exceed the requirements of paid sick leave laws, where applicable.
For information about PTO, see
Eligibility requirements apply to some benefits and may depend on your job classification and length of employment. Benefits are subject to change and may be subject to a specific plan or program terms.
For information about benefits and eligibility, see
The annual salary range for this position is $90,000.00-$180,000.00 Additional compensation includes annual or quarterly performance bonuses. Additional compensation for certain positions may also include: - Stock
Minimum Qualifications... Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications.
Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 2 years’ experience in application security, or related area at a technology, retail, or data-driven company. Option 2: 4 years’ experience in application security, or related area at a technology, retail, or data-driven company.
Preferred Qualifications... Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications.
Phyllis St. N Of Hwy 102, West Side Of Street, Bentonville, AR 72712, United States of America