Enhancing your leadership style, you motivate, develop and inspire others to deliver quality. You are responsible for coaching, leveraging team member’s unique strengths, and managing performance to deliver on client expectations. With your growing knowledge of how business works, you play an important role in identifying opportunities that contribute to the success of our Firm. You are expected to lead with integrity and authenticity, articulating our purpose and values in a meaningful way. You embrace technology and innovation to enhance your delivery and encourage others to do the same.
Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to:
The Opportunity
As part of the Cyber Incident Response team you are to perform penetration testing activities within a client's environment, emphasizing manual stealthy testing techniques. As a Manager you are to supervise, develop, and coach teams, manage client service accounts, and drive assigned client engagement workstreams by solving and analyzing complex problems to develop elevated-quality deliverables. You are also responsible for leading and executing stealthy penetration testing, advanced stealth team, or adversary simulation engagements.
Responsibilities
- Lead and execute stealthy penetration testing
- Perform advanced security team engagements
- Conduct adversary simulation activities
- Supervise and mentor team members
- Manage client service accounts and engagement workstreams
- Solve complex problems to deliver exceptional results
- Assure project success and maintain exceptional standards
- Develop and implement testing strategies
What You Must Have
- Bachelor's Degree in Computer and Information Science, Computer Applications, Computer Engineering, Forensic Science, Management Information Systems
- 5 years of experience
- GIAC such as GCFA, GCFE, GREM, GNFA, GCCC, and/or GCIA
What Sets You Apart
- Master's Degree preferred
- Applying incident handling processes
- Analyzing attack techniques
- Utilizing tools to determine malware
- Using memory dumps and analysis tools
- Acquiring infected machines and detecting artifacts
- Analyzing security architecture for deficiencies
- Recognizing common assembly-level patterns
- Deriving Indicators of Compromise (IOCs)
...Job Title: Marketing Assistant (Entry-Level) About Us: At Top Level Promotions, we are committed to providing top-notch market... ...company. If you're eager to start your marketing career and be part of a forward-thinking company, apply today to join the Top...
...perseverance in the face of challenges. ~ Strong communication skills with stakeholders outside of customer service positions. ~ Interested in commercial fiction and/or ecommerce. ~ Guru, Zendesk, and Talkdesk experience are a plus. Salary Range: $65,000 - $70,000...
...Psych/Behavioral Health facility in Denton, TX is hiring LPN/LVNs! This is a Psych/Behavioral Health facility working with patients with intellectual disabilities. Duties: Passing meds, assessments, charting, LTC Need: Psych LPN/LVN with minimum 2 years experience...
...amazing Team! Starting CNA wage with no experience $16.00 All full-time employees receive... ...and get to know your supervisors in Nursing Administration, the Administrator, and the... ...provide patient's personal hygiene cares, assisting to the bathroom, helping with showers/...
...CAREER in BEER? WE WANT TO SPEAK TO YOU!- Nights and weekends off? Check!- Learning from the very best in the beer industry? Check... ...TRUST us for the Perfect Pint." Our mission is to provide great-tasting draft beer to the consumer, the way the brewmaster intended and...