Security Engineer – Penetration Testing – Singapore


job type
S$ 5,000 per month
reference number

apply now

job description

in addition, you will:

  • Will be involved in the penetration testing of products across thick clients, internet, mobile tablets, web applications and such
  • For infrastructure, it will involve standard vulnerability testing , stress resistance

skills & experience required

To ensure the success of the role, you should have the following:

  • 5+ years of experience in Application or Infrastructure penetration testing
  • Security certification such as GPEN, GWAPT, GXPN and related is highly preferred but not mandatory
  • Experience working around pen testing tools such as NMAP, SSLmap, SQLmap
  • At least a degree in IT and relevant fields

Don’t miss the chance to obtain an attractive remuneration package of up to S$150K depending on your seniority and experience.

To apply online, please click on the appropriate link. Alternatively please email CV to Kenneth at



Penetration Testing, Vulnerability Assessment
apply now

Make counterfeit money pass pen test

Services for Constituents


Parliament Hill Tours

To arrange a Parliament Hill Tour, you can call our Ottawa office at 613-992-9723 click here to request a tour online.


Question Period Tickets

If you are planning to visit Parliament Hill and would like to attend Question Period, please contact our office at 613-992-9723 or click here to request tickets online.


Celebratory Greetings

If you would like to receive a celebratory message on the occasion of a birthday, anniversary, or other celebration, please click here to request a greeting online.


Send Feedback

Feel free to leave feedback on our website, our services, or things we can do to help you in the community through our online feedback form or by calling 705-941-2900.


Canadian Flags and Pins

If you would like to receive a Canadian flag or pins, please contact the constituency office at 705-941-2900.


Join the Discussion

See our Facebook page for more updates and to leave feedback!

Pen Test Hackfest Summit & Training

Summit Days: Nov 2 – Nov 3, 2016
Course Days: Nov 4 – Nov 9, 2016

Special Offers for All Attendees!
This offer reduces the Summit registration fee from $1,595 to $1,095 when purchased in conjunction with a full price 4-6 day course a savings of $500! The discount is automatically applied when the Summit and a qualifying course are both selected during registration.

NoteEarly bird course discounts do not apply with this bundle offer.

Security Analyst

This position is open as of 12/21/2015.

Security Analyst – Pentesting

If you are a Security Analyst – Pentesting with experience, please read on!

Top Reasons to Work with Us

1. Largest home furnishing store in North America
2. The office in KS is located near the Kansas Speedway and Sporting Park
3. Room for Growth with a company that has been around for over 70 years!

What You Will Be Doing

Pentesting Requirement Skills:

2 years’ experience minimum working with Kali Linux, Metasploit, Nessus.
Phishing assessment
Vulnerability scanning
Penetration of systems
Incident response development
Windows assessment

What You Need for this Position

At Least 1 Year of experience and knowledge of:

– Understand scripting in Python and/or Bash
– Metasploit
– kali linux

What’s In It for You

Great Compensation Annual Salary with Benefits!
Located in the great city of Kansas City, KS!

So, if you are a Security Analyst – Pentesting with experience, please apply today!

Required Skills

Understand scripting in Python and/or Bash, NESSUS, Metasploit, kali linux, CISSP

If you are a good fit for the Security Analyst – Pentesting position, and have a background that includes:

Understand scripting in Python and/or Bash, NESSUS, Metasploit, kali linux, CISSP and you are interested in working the following job types:

Information Technology, Engineering, Professional Services

Within the following industries:

Securities, Banking – Financial Services, Biotechnology

Our privacy policy: Your resume and information will be kept completely confidential.

Looking forward to receiving your resume through our website and going over the job in more detail with you!

CyberCoders, Inc is proud to be an Equal Opportunity Employer

All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability, protected veteran status, or any other characteristic protected by law.

Your Right to Work – In compliance with federal law, all persons hired will be required to verify identity and eligibility to work in the United States and to complete the required employment eligibility verification document form upon hire.

Penetration Testing

Penetration testing, also called pentesting, is an attack method which scans for broad vulnerabilities in networked computers. It is primarily used in professional settings in order to ascertain the status of security in a machine.

In 1965, one of the first computer conferences was held. Participants shared information about their systems and it was revealed that basic security measures had been somewhat easily undermined on System Development Corporation’s AN/FSQ-32. SDC was a government contractor developing computer infrastructure alongside other vendors of the day, including IBM and Bell. Thus was born the first request for security auditing and penetration testing or, as they put it, “studies to be conducted in such areas as breaking security protection in the time-shared system,” as described in US Government Computer Penetration Programs and the Implications for Cyberwar by Edward Hunt.

At the time, the risk of people at home or around the world simply breaking into systems was low, and computers were not relied on for the same level of data as they are now. Even thirty years later, in 1995, computer reliance was minimal. It’s only in the two decades since that the inverse has become true, and computers are relied on for more important data whereas analog methods of data storage and retrieval are used less frequently.

Nevertheless, only two years later, in 1967, government officials began to better understand the need for tight network security. In the 70s, organized teams of penetration testers called “Tiger Teams.” The teams were overwhelmingly successful, but their ultimate purpose was to find better ways to lock time sharing computer systems down.

An early leader in computer security was James P. Anderson, who had worked for the NSA as well as various IT firms. In 1971, his company was hired to probe the defenses of the computer system at the Pentagon. He later outlined what is perhaps the first known penetration testing routine:

  1. Find an exploitable vulnerability.
  2. Design an attack around it.
  3. Test the attack.
  4. Seize a line in use.
  5. Enter the attack.
  6. Exploit the entry for information recovery.

Modern security consultants can go out for the Information Assurance Certification Review Board’s Certified Penetration Tester (CPT) certificate. The exam involves both a multiple choice questionnaire and a practical implementation test in which the candidate must pentest a virtual server.

For an individual to take the test at one of IACRB’s facilities costs $499 as of December, 2015, although it is less expensive for vouchers provided by employers.

See our List of Security Auditing Firms.

See our List of Pentest Tools.

French Runoff Elections Test Power of Marine Le Pen’s National Front

The party achieved a breakthrough last week by taking the lead in the first round of the vote.

You’ve hit your limit of 5 free articles this month.
Try our subscription options:

Print & Digital 3 Months
Weekly home delivery with free shipping, access to Newsweek’s web site, and the complete online archive
Digital 3 Months
Access to Newsweek’s web site, and the complete online archive