May 5, 2021
A global financial group providing integrated innovation solutions through advisory, technology, strategic execution, branding, and investment looks to employ the services of a Penetration Tester.
The successful candidate will be required to ensure that the business is prepared and skilled to mitigate any cyber security threat.
The incumbent will play a huge role in developing “world-class” cyber security capabilities within the organization.
Requirements:
Knowledge of the secure software development lifecycle.
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, cross-site scripting, SQL injection).
Knowledge of web services, including service-oriented architecture (e.g., SOAP, REST) and web service description language (e.g., WSDL, Swagger)
May 5, 2021
Penetration Tester – Bryanston – up to R750k per annum
A global financial group providing integrated innovation solutions through advisory, technology, strategic execution, branding, and investment looks to employ the services of a Penetration Tester.
The successful candidate will be required to ensure that the business is prepared and skilled to mitigate any cyber security threat. You will play a huge role in developing “world-class” cyber security capabilities within the organization.
Requirements:
Knowledge of the secure software development lifecycle
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, cross-site scripting, SQL injection)
Knowledge of web services, including service-oriented architecture (e.g., SOAP, REST) and web service description language (e.g., WSDL, Swagger)
What Is Ethical Hacking?
I am Ruchitha, working as a content writer for MindMajix technologies. My writings focus on the latest technical software, tutorials, and innovations. I am also into research about AI and Neuromarketing. I am a media post-graduate from BCU – Birmingham, UK. Before, my writings focused on business articles on digital marketing and social media. You can connect with me on LinkedIn. Share:
In the 1960s, skilled professionals were re-developing mainframe systems while also working to improve their efficiency. So, the term ‘Hacker’ had its origins at the Massachusetts Institute of Technology.
Today, it is a widely used term. We use it to refer to skilled programmers who can access a computer system without any authorization. The hackers intentions might be wrong, like, for example, cracking passwords to obtain confidential information.