Information Security Consultants

Posted: 4 August, 2016

ITPG Cyber Security Business Unit has full-time employment opportunities for multiple professionals at various levels of experience (junior to senior) with training and experience around network infrastructure, penetration testing methodologies, and technical testing tools. Candidates would be responsible for performing in-depth, technical assessments of networks, systems and web applications and producing professionally written reports to be read by IT professionals and executive management.


  1. Information security risk and vulnerability assessments: Provide information security risk / vulnerability assessment program support for business unit’s government and commercial clients.
  2. Conduct technical vulnerability assessments and penetration testing procedures on servers, network devices, applications, and wireless networks.
  3. Perform vulnerability scanning and customize resulting report for client review. Provide clients with clear recommendations for remediating findings associated with testing procedures.
  4. Manage testing systems and continually research new tools and exploits to ensure testing capabilities are current and competitive.


Deployment, maintenance, and troubleshooting firewalls, intrusion detection, VPN appliances, vulnerability assessment tools, event and log analysis, security change tracking and other network security systems and devices is a must.

  • Bachelor’s degree in computer science, management information systems, or other IT-related field is a plus
  • Minimum of 2 years of technical, hands on experience related to network penetration testing, wireless penetrating testing, application penetration testing, ethical hacking, vulnerability assessments
  • Minimum of 2 years with network protocols, routers, switches, firewalls, Windows system administration, Active Directory,
  • Basic knowledge in and experience with technical testing tools, including Nessus, Metasploit, Kali Linux, and other commercially available testing tools
  • Professional security certifications, including CEH, CCNA, GPEN, OSCP, GCFI
  • Understanding of and experience with database structure and SQL statements
  • Understanding of web protocols and application languages (HTML, Javascript, XML, JSON)
  • Fundamental understanding of scripting languages (Ruby, Python, Powershell)
  • Fundamental knowledge of basic computer forensics processes and tools
  • Fundamental knowledge of incident response/handling techniques
  • Familiarity with various security compliance frameworks (PCI DSS, HIPAA/HITECH, GLBA, SOX)

Interested candidates should be prepared to submit salary requirements, date of availability and a current copy of your resume/CV. Well qualified candidates are encouraged to submit their resume/CV and cover letter even if you do not see a desired position listed.  
Please click here to apply.


  • association_icon

    Association Growth

    Strategy. Tactics. Execution. Growth.

  • cyber_icon

    Cyber Security

    Securing Organizations From The Inside Out.

  • grc_icon

    GRC Services

    Business Compliance Solved.