Solutions Consultant

The successful candidate will assist Core Security customers in the deployment and management of Core Security solutions using Core Security developed methodologies.  The candidate will also provide project management, architecture, and serve as the primary customer interface on select large-scale deployments. 

 

Responsibilities:

Core Security Wins Information Security Magazine and SearchSecurity.com 2014 Readers' Choice Award for Excellence in Vulnerability Management

Core Insight named winner of the “Best Vulnerability Management Products” category

Boston – November 25, 2014Core Security®, a leading provider of attack intelligence solutions, has received an Information Security Magazine and SearchSecurity.com Readers’ Choice Award, coming out on top in this year’s “Best Vulnerability Management Products” category.

Desarrollador (Seguridad Informática) Semi Sr.

Búsqueda Laboral – Core Security Technologies

Desarrollador (Seguridad Informática) Semi Sr. - “REF. DIMPSSR”

Actividades principales

  • Formará parte del equipo dedicado al desarrollo y mantenimiento del corazón de un producto dedicado a la seguridad informática.
  • Realizará el análisis, diseño, desarrollo y mantenimiento del kernel y módulos de nuestro producto.

Conocimientos Específicos (Requeridos)

Desarrollador (Seguridad Informática) Sr.

Búsqueda Laboral – Core Security Technologies

Desarrollador (Seguridad Informática) Sr. “REF. DIMPSR”

Actividades principales

  • Formará parte del equipo dedicado al desarrollo y mantenimiento del corazón de un producto dedicado a la seguridad informática.
  • Realizará el análisis, diseño, desarrollo y mantenimiento del kernel y módulos de nuestro producto.

Conocimientos Específicos (Requeridos)

Business Development Manager - Core Security Consulting Services

Core's Comprehensive Penetration Testing services mimic an attacker seeking to access sensitive assets by exploiting security weaknesses existing across multiple systems. This service not only identifies individual vulnerabilities but also reveals how networks designed to support normal business operations can provide attackers with pathways to backend systems and data. During the engagement, we begin by assessing your network or application infrastructure’s “weakest links,” as well as other possible venues of attack.

Pages