What we are looking for in our new team members:

  • High Aptitude
  • Critical Thinking
  • Innovative
  • Team Collaboration
  • Highly Motivated
  • Effective Communication
  • Desire to Learn New Technologies
  • Understanding of Business Fundamentals and Client Focus

What we have to offer:

  • You Matter
  • Stimulating & Relaxed Culture
  • Professional Development & Confidence
  • Product Training & Certifications
  • Unlimited Vacation Time
  • Health Insurance

Join Our Team – We are looking to continue building our team in the following roles:

  • Advisory Consultant
  • Ethical Hacker
  • Incident Responder
  • Penetration Tester
  • Security Analyst
  • Security Architect
  • Security Auditor
  • Service Delivery Manager
  • Software Developer
  • Vulnerability Assessor

Submit Your Resume



Position Interested in:

How did you find us?


Attach Resume (Max 64MB)

Job Titles & Descriptions

  • IDS/IPS, penetration and vulnerability testing
  • Firewall and intrusion detection/prevention protocols
  • Security best practices and threat modeling
  • PCI, HIPAA, NIST, GLBA and SOX compliance assessments
  • Windows, UNIX and Linux operating systems
  • Performance tuning views, indexes, SQL and PLSQL
  • Application security and encryption technologies
  • Fundamentals in programming languages
  • Subnetting, DNS, encryption technologies and standards, VPNs, VLANs, VoIP and other network routing methods
  • Network and web related protocols (e.g., TCP/IP, UDP, IPSEC, HTTP, HTTPS, routing protocols, etc.)
  • Advanced Persistent Threats (APT), phishing and social engineering, access controllers, anti-malware and enhanced authentication
  • Windows, UNIX and Linux operating systems
  • C, C++, C#, Java, ASM, PHP, PERL
  • Hands-on experience with commercial, open source and free security solutions such as AppScan, Fortify, Maltego. Kali Linux, Nessus, OpenVAS, Qualys, Core Impact Pro, MetaSploit, nmap, ettercap, static source code analysis tools, dynamic binary testing tools
  • Network servers and networking tools (e.g. Nessus, nmap, Burp, etc.)
  • Computer hardware and software systems
  • Web-based applications
  • Security frameworks (e.g. ISO 27001/27002, NIST, HIPPA, SOX, etc.)
  • Security related certifications a plus: CISSP, CISA, CEH, GIAC
  • Security tools and products (Fortify, AppScan, etc.)
  • Vulnerability analysis and reverse engineering
  • Metasploit framework
  • Forensics tools
  • Cryptography principles
  • Windows, UNIX and Linux operating systems
  • C, C++, C#, Java, ASM, PHP, PERL
  • TCP/IP-based network communications
  • Computer hardware and software systems
  • Operating system installation, patching and configuration
  • Backup and archiving technologies
  • Web-based application security
  • eDiscovery tools (NUIX, Relativity, Clearwell, etc.)
  • Forensic software applications (e.g. EnCase, FTK, Helix, Cellebrite, XRY, etc.)
  • Enterprise system monitoring tools and SIEMs
  • Cloud computing
  • Windows, UNIX and Linux operating systems
  • C, C++, C#, Java, ASM, PHP, PERL
  • Hands-on experience with commercial, open source and free security solutions such as AppScan, Fortify, Maltego. Kali Linux, Nessus, OpenVAS, Qualys, Core Impact Pro, MetaSploit, nmap, nessus, ettercap, static source code analysis tools, fuzzing tools, dynamic binary testing tools
  • Network servers and networking tools (e.g. Nessus, nmap, Burp, etc.)
  • Computer hardware and software systems
  • Web-based applications
  • Security frameworks (e.g. ISO 27001/27002, NIST, HIPPA, SOX, etc.)
  • Security tools and products (Fortify, AppScan, etc.)
  • Vulnerability analysis and reverse engineering
  • Metasploit framework
  • Forensics tools
  • Cryptography principles
  • Extensive experience in project management for software development
  • Adept at learning and applying new technologies and solving new problems
  • Excellent communication skills – both written and verbal – for internal and client-centric environments
  • Collaborative in nature
  • Effective organizational skills with strong attention to detail
  • Demonstrated ability to collect client feedback and understand and address client pain points
  • Familiarity in dealing with managing engagements with large enterprise clients
  • Ability to develop relationships with clients built on trust and credibility
  • Extensive experience with Atlassian products
  • Experience with functional programming languages such as Scala or Erlang
  • Understanding of DevOps tools and CI/CD processes
  • Experience and interest in large-scale distributed systems
  • Interest in with Apache Spark, Apache Pig, AWS Pipelines, Google Dataflow, or MapReduce
  • Advanced knowledge of domain controllers, network security monitoring tools, SIEMs, threat intelligence, et.
  • Experience with computer network operations and Security Operations Centers
  • IDS/IPS, penetration and vulnerability testing
  • TCP/IP, computer networking, routing and switching
  • DLP, anti-virus and anti-malware
  • Firewall and intrusion detection/prevention protocols
  • Secure coding practices, ethical hacking and threat modeling
  • Windows, UNIX and Linux operating systems
  • ISO 27001/27002, ITIL and COBIT frameworks
  • PCI, HIPAA, NIST, GLBA and SOX compliance assessments
  • C, C++, C#, Java or PHP programming languages
  • Security Information and Event Management (SIEM)
  • Risk assessment procedures, policy formation, role-based authorization methodologies, authentication technologies and security attack pathologies
  • ISO 27001/27002, ITIL and COBIT frameworks
  • Windows, UNIX and Linux operating systems
  • Perimeter security controls – firewall, IDS/IPS, network access control and network segmentation
  • Router, switch and VLAN security; wireless security
  • Security concepts related to DNS, routing, authentication, VPN, proxy services and DDOS mitigation technologies
  • Practices and methods of IT strategy, enterprise architecture and security architecture
  • Network security architecture development and definition
  • Knowledge of third party auditing and cloud risk assessment methodologies
  • Working knowledge of regulatory and industry data security standards (e.g. FFIEC, HIPAA, PCI, NERC, SOX, NIST, EU/Safe Harbor and GLBA)
  • ISO 27001/27002, ITIL and COBIT frameworks
  • Windows, UNIX and Linux operating systems
  • MSSQL and ORACLE databases
  • C, C++, C#, Java and/or PHP programming languages
  • ACL, IDEA and/or similar software programs for data analysis
  • Fidelis, ArcSight, Niksun, Websense, ProofPoint, BlueCoat and/or similar auditing and network defense tools
  • Firewall and intrusion detection/prevention protocols
  • Windows, UNIX and Linux operating systems
  • C, C++, C#, Java, ASM, PHP, PERL
  • TCP/IP-based network communications
  • IP security
  • Relational databases (e.g. SQL, MySQL, SQLite, etc.)
  • Hypervisors (e.g. VMware, KVM, etc.)
  • Python Experience in HTML/CSS
  • XML/Web Services, AJAX
  • Cloud computing
  • Windows, UNIX and Linux operating systems
  • C, C++, C#, Java, ASM, PHP, PERL
  • Network scanning tools (e.g. Nessus, ACAS, RETINA, Gold Disk, etc.)
  • Computer hardware and software systems
  • Web-based applications
  • Security frameworks (e.g. ISO 27001/27002, NIST, HIPPA, SOX, etc.)
  • Security tools and products (Fortify, AppScan, etc.)
  • Vulnerability analysis and reverse engineering