The point where experts and best companies meet
Share
What you will do
Maintain a working knowledge of the latest threats, vulnerabilities and exploits.
Stay informed on information security best practices and evaluate their applicability in Red Hat’s environment.
Perform Security audits, penetration testing of internal applications and internal Red/Purple Teaming.
Performing vulnerability scans and assessments, to consult findings and mitigations.
Effectively and qualitatively communicate risks and potential impacts.
Work with system owners to take preventive or corrective actions based on risk analysis.
What you will bring
Intensive experience in a technical information security role.
Industry certifications, including CISSP, OSCP would be highly regarded.
Excellent communication skills, both written and verbal, to convey information effectively and professionally to a wide variety of technical and non-technical audiences.
Experience with penetration testing and auditing tools tools like Metasploit, Burp/ZAP, Qualys highly regarded.
Experience with Threat Led penetration testing is highly regarded.
Familiar with web penetration testing methodologies, OWASP top 10, Web application security highly regarded.
These jobs might be a good fit