Profession ethical hacker
Ethical hackers perform security vulnerability assessments and penetration tests in accordance with industry-accepted methods and protocols. They analyse systems for potential vulnerabilities that may result from improper system configuration, hardware or software flaws, or operational weaknesses.
Ethical hacker Jobs: Open positions
Find the job of your dreams on Talent.com, one of the largest job sites worldwide.Job postings: talent.com
- Cyber attack counter-measures
The strategies, techniques and tools that can be used to detect and avert malicious attacks against organisations' information systems, infrastructures or networks.
- Computer forensics
The process of examining and recovering digital data from sources for legal evidence and crime investigation.
- Tools for ICT test automation
The specialised software to execute or control tests and compare predicted testing outputs with actual testing results such as Selenium, QTP and LoadRunner
- Web application security threats
The attacks, vectors, emergent threats on websites, web applications and web services, the rankings of their severity identified by dedicated communities such as OWASP (Open Web Application Security Project).
- Legal requirements of ICT products
The international regulations related to the development and use of ICT products.
- Software anomalies
The deviations of what is standard and exceptional events during software system performance, identification of incidents that can alter the flow and the process of system execution.
- Penetration testing tool
The specialised ICT tools which test security weaknesses of the system for potentially unauthorised access to system information such as Metasploit, Burp suite and Webinspect.
- Monitor system performance
Measure system reliability and performance before, during and after component integration and during system operation and maintenance. Select and use performance monitoring tools and techniques, such as special software.
- Identify ICT system weaknesses
Analyse the system and network architecture, hardware and software components and data in order to identify weaknesses and vulnerability to intrusions or attacks.
- Execute ICT audits
Organise and execute audits in order to evaluate ICT systems, compliance of components of systems, information processing systems and information security. Identify and collect potential critical issues and recommend solutions based on required standards and solutions.
- Execute software tests
Perform tests to ensure that a software product will perform flawlessly under the specified customer requirements, using specialised software tools. Apply software testing techniques and tools in order to identify software defects (bugs) and malfunctions.
- Analyse the context of an organisation
Study the external and internal environment of an organisation by identifying its strengths and weaknesses in order to provide a base for company strategies and further planning.
- Address problems critically
Identify the strengths and weaknesses of various abstract, rational concepts, such as issues, opinions, and approaches related to a specific problematic situation in order to formulate solutions and alternative methods of tackling the situation.
- Perform security vulnerability assessments
Execute types of security testing, such as network penetration testing, wireless testing, code reviews, wireless and/or firewall assessments in accordance with industry-accepted methods and protocols to identify and analyse potential vulnerabilities.
- Develop code exploits
Create and test software exploits in a controlled environment to uncover and check system bugs or vulnerabilities.
- Identify ICT security risks
Apply methods and techniques to identify potential security threats, security breaches and risk factors using ICT tools for surveying ICT systems, analysing risks, vulnerabilities and threats and evaluating contingency plans.
- Provide technical documentation
Prepare documentation for existing and upcoming products or services, describing their functionality and composition in such a way that it is understandable for a wide audience without technical background and compliant with defined requirements and standards. Keep documentation up to date.
Optional knowledge and skillsnexpose define security policies organisational resilience information confidentiality levels of software testing saas (service-oriented modelling) ict encryption whitehat sentinel ict security legislation information security strategy nessus cyber security solve ict system problems maintain ict server outsourcing model ict network security risks internet governance hybrid model manage it security compliances perform project management internet of things proxy servers open source model ict security standards service-oriented modelling
Source: Sisyphus ODB