penetration tester / ethical hacker

Rubix Solutions

penetration tester / ethical hacker required in Brisbane for immediate start.

  • Penetration Tester - Cyber Security
  • Brisbane
  • Attractive $$$
Rubix Solutions are currently seeking an experience penetration tester to join a leading global consultancy in Brisbane.
You’ll play an integral role in helping clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats.
  • Proactively assist in the management of several clients, while reporting to Managers and above
  • Train and lead staff
  • Establish effective working relationships directly with clients
  • Contribute to the development of your own and team’s technical acumen
  • Keep up to date with local and national business and economic issues
  • Be actively involved in business development activities to help identify and research opportunities on new/existing clients 
  • Continue to develop internal relationships
Requirements/Skill Set:
  • Minimum of 4 years Cyber Security experience
  • Bachelor Degree in relevant field
  • Certification in Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), Certified as GIAC Web Application Penetration Tester (GWAPT).
  • Technical expertise in concepts such as application security, network segregation, access controls, IDS/IPS devices, physical security, and information security risk management
  • Proven experience with Security testing tools, such as BurpSuite, Mimikatz, Cobalt Strike, PowerSploit, Metasploit, Nessus, HP Web Inspect, or other tools included within the Kali Linux distribution
  • Networking protocols, TCP/IP stack, systems architecture, and operating systems
  • Programming and scripting languages, such as Python, PowerShell, Ruby, Perl, Bash, JavaScript, or VBScript
  • Well-known Cybersecurity frameworks and industry-leading practices such as OWASP, NIST CSF, PCI DSS, and NY-DFS
  • Traditional security operations, event monitoring, and Security Information and Event Management (SIEM) tools.
  • Performing penetration testing activities within a client’s environment, emphasizing manual stealthy testing techniques
  • Executing stealthy penetration testing, advanced red team, or adversary simulation engagements using commercially / freely available offensive security tools and utilities built into operating systems
  • Understanding Windows and Linux operating system setup, management, and power usage, e.g., cmd, bash, network troubleshooting, virtual machines
  • Identifying security critical vulnerabilities without utilizing a vulnerability scanning tool, i.e., knowledge of exploitable vulnerabilities and ability to execute stealthy penetration testing engagements
  • Compromising Active Directory environments and demonstrating business impact by identifying and obtaining access to business critical assets/information
  • Performing social engineering / phishing activities such as reconnaissance of targets, developing phishing campaigns (e.g., emails and websites), web hosting administrator, developing malicious phishing payloads, or pivoting through phished systems
Interested parties please apply now for a confidential initial discussion.