Profession ethical hacker

Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vulnerabilities that may result from improper system configuration, hardware or software flaws, or operational weaknesses.

Ethical hacker Jobs: Open positions

Find the job of your dreams on Talent.com, one of the largest job sites worldwide.

Job postings: talent.com

Personality Type

Knowledge

  • Cyber attack counter-measures

    The strategies, techniques and tools that can be used to detect and avert malicious attacks against organisations' information systems, infrastructures or networks.

  • Computer forensics

    The process of examining and recovering digital data from sources for legal evidence and crime investigation.

  • Tools for ICT test automation

    The specialised software to execute or control tests and compare predicted testing outputs with actual testing results such as Selenium, QTP and LoadRunner

  • Web application security threats

    The attacks, vectors, emergent threats on websites, web applications and web services, the rankings of their severity identified by dedicated communities such as OWASP (Open Web Application Security Project).

  • Legal requirements of ICT products

    The international regulations related to the development and use of ICT products.

  • Software anomalies

    The deviations of what is standard and exceptional events during software system performance, identification of incidents that can alter the flow and the process of system execution.

  • Penetration testing tool

    The specialised ICT tools which test security weaknesses of the system for potentially unauthorised access to system information such as Metasploit, Burp suite and Webinspect.

Skills

  • Monitor system performance

    Measure system reliability and performance before, during and after component integration and during system operation and maintenance. Select and use performance monitoring tools and techniques, such as special software.

  • Identify ICT system weaknesses

    Analyse the system and network architecture, hardware and software components and data in order to identify weaknesses and vulnerability to intrusions or attacks.

  • Execute ICT audits

    Organise and execute audits in order to evaluate ICT systems, compliance of components of systems, information processing systems and information security. Identify and collect potential critical issues and recommend solutions based on required standards and solutions.

  • Execute software tests

    Perform tests to ensure that a software product will perform flawlessly under the specified customer requirements, using specialised software tools. Apply software testing techniques and tools in order to identify software defects (bugs) and malfunctions.

  • Analyse the context of an organisation

    Study the external and internal environment of an organisation by identifying its strengths and weaknesses in order to provide a base for company strategies and further planning.

  • Address problems critically

    Identify the strengths and weaknesses of various abstract, rational concepts, such as issues, opinions, and approaches related to a specific problematic situation in order to formulate solutions and alternative methods of tackling the situation.

  • Perform security vulnerability assessments

    Execute types of security testing, such as network penetration testing, wireless testing, code reviews, wireless and/or firewall assessments in accordance with industry-accepted methods and protocols to identify and analyse potential vulnerabilities.

  • Develop code exploits

    Create and test software exploits in a controlled environment to uncover and check system bugs or vulnerabilities.

  • Identify ICT security risks

    Apply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and evaluating contingency plans.

  • Provide technical documentation

    Prepare documentation for existing and upcoming products or services, describing their functionality and composition in such a way that it is understandable for a wide audience without technical background and compliant with defined requirements and standards. Keep documentation up to date.

Optional knowledge and skills

nexpose define security policies organisational resilience information confidentiality levels of software testing saas (service-oriented modelling) ict encryption whitehat sentinel ict security legislation information security strategy nessus cyber security solve ict system problems maintain ict server outsourcing model ict network security risks internet governance hybrid model manage it security compliances perform project management internet of things proxy servers open source model ict security standards service-oriented modelling

Source: Sisyphus ODB