A Penetration Testing / Pen Testing / Cyber security trainer role with one of the UK’s leading Cyber Security Consultancies.
The right candidate will either be a former penetration tester looking to move into a penetration testing / ethical hacking trainer position or be a cyber security trainer / cyber security course instructor / leader with a strong understanding of the penetration testing / ethical hacking space.
The role will see the appointed trainer be responsible for delivering training courses to this cyber security consultancies client booked, you will have excellent interpersonal skills and a clear passion for cyber security.
Cyber-attack simulation is the practice of testing an organization’s network security and incident response preparedness on-demand and without exploits to determine an organization’s security posture.
Cyber-attack simulation differs from many of the current and already practiced security controls such as Penetration Testing (pentesting), security assessment and table-top exercises. For example, pentesting makes use of exploitation code whereas cyber-attack simulation does not. In addition, cyber-attack simulation differs from a security assessments since the breach method used may not be from an actual vulnerability, it maybe in policy deficiencies or human-error. While in a table-top exercise a rehearsal of what your organization will do in the case of an emergency is conducted, but in a cyber-attack simulation it replicates the actions of an attacker.
SecurityOrb.com had the opportunity to interview Marcus j. Carey, the founder of vThreat, a cyberattack simulation start-up that offers its cyberattack simulation as a software-as-a service (SaaS) application on The SecurityOrb Show. Carey stated, “Vthreat offers its service on-demand, you can conduct an attack simulation anytime. You do not have to wait annually or quarterly as with some of the other services.”
vThreat has a free tier as well as paid tier delivery for its cyber-attack simulation service. One key attribute of vThreat’s cyber-attack simulation offering pertains to the non-use of software agents on organizational assets, instead they make use of the cloud or java-script snippets.
Join an Exciting and Rapidly Growing Enterprise Security Technology Company. Our company started with a vision to revolutionize data processing. We formed a great team and built a great product. We always strive to make it better and we are working across the industry to build our capacity to serve our customers and partners.
Candidates will work alongside experienced innovators who have run massive scale systems in highly critical production environments. The position includes conducting external & internal penetration testing, social engineering assessments, web application assessments, and other security assessments.
Work directly with our personnel to perform penetration tests of their systems/applications to identify vulnerabilities and flaws and classify the risk of items found<span
Create and conduct social engineering assessments using various techniques and delivery methods
Produce thorough reports detailing the findings of the services-rendered and provide recommendations to meet information security and compliance standards
Summit Days: Nov 2 – Nov 3, 2016 Course Days: Nov 4 – Nov 9, 2016
Special Offers for All Attendees! This offer reduces the Summit registration fee from $1,595 to $1,095 when purchased in conjunction with a full price 4-6 day course a savings of $500! The discount is automatically applied when the Summit and a qualifying course are both selected during registration.
Note – Early bird course discounts do not apply with this bundle offer.