Maximize the Security of Your Enterprise with NST Assure's Continuous Threat Exposure Management (CTEM) Platform
Associate Offensive Security Consultant
Location
United States
Posted
1 day ago
Salary
Not specified
Seniority
Mid Level
Job Description
Job Requirements
- Minimum 1 year of experience as an associate offensive consultant or related role.
- Strong understanding of web application, network, and mobile security vulnerabilities.
- Experience with vulnerability management tools and frameworks.
- Analytical and problem-solving skills.
- Written and verbal communication skills.
- Ability to work independently and as part of a team.
- Open to and proactive in learning about new security trends and technologies.
- Open to working in rotational shifts.
- Flexible and adaptable to changing work environments.
Related Guides
Related Categories
Related Job Pages
More Security Engineer Jobs
Information Systems Security Manager
GovCIOGovCIO is a service-disabled-veteran-owned small business (SDVOSB) that offers technology services to improve business performance for government organizations.
GovCIO is currently hiring for an Information System Security Manager (ISSM) to manage the 2ROPS accreditation process for small classified mobile systems to renew the current Authority to Operate (ATO) and provide ongoing cybersecurity sustainment support. This position will be ...
Information Security Consultant
hatch I.T.Connecting software engineers with tech startups. Reinventing the way early-stage and high-growth startups scale.
Senior Virtual Information Security Officer advising on GRC engagements at Assura
The Health Informatics & Information Management (HIIM) Program offers degrees and certificates accredited by the Commission on Accreditation for Health Informatics and Information Management Education (CAHIIM) or through the American Health Information Management Association (AHI...
Network Security Engineer
ISTARIAccelerating global businesses on their journey towards cyber resilience.
Network Security Engineer designing secure network architecture and Zero Trust implementation



