We use cookies. Find out more about it here. By continuing to browse this site you are agreeing to our use of cookies.
#alert
Back to search results

Penetration Tester

Check Point Software Technologies
United States, Texas, Irving
6330 Commerce Drive (Show on map)
Jun 19, 2025
Why Join Us?

Join our global team of elite ethical hackers, working with both Check Point and non-Check Point customers across industries worldwide. Collaborate with Check Point's research and Incident Response teams to uncover cutting-edge cyber threats, gaining exposure to the most advanced security challenges in the field.

Key Responsibilities

  • Conduct penetration testing on applications and network environments to identify vulnerabilities and security gaps.
  • Develop and document testing plans and penetration test reports with clear findings and recommendations.
  • Perform reconnaissance and network surveys to assess target environments.
  • Research security tools, exploits, and emerging threats, contributing to blogs and knowledge-sharing initiatives.
  • Analyze vulnerabilities, exploit weaknesses, and escalate access where applicable.
  • Assist in malware analysis and breach investigations to support incident response efforts.
  • Stay up to date with the latest attack techniques, tools, countermeasures, and technologies.
  • Mentor new team members and contribute to the development of tools, templates, and methodologies for penetration testing.

Qualifications

  • 5+ years of experience in web application penetration testing, internal and external PT experience following OWASP methodologies
  • Hands-on experience with offensive security tools such as Burp Suite, Fiddler, SQLmap, Metasploit, Nmap, Netcat, BloodHound, Empire, and Wireshark
  • Strong understanding of network security concepts, including firewalls, VPNs (IPsec & SSL), IDS/IPS, and WLANs
  • Proficiency in scripting and automation (Python, PowerShell, JavaScript, Bash)
  • Experience managing and securing Windows and Unix/Linux environments
  • Knowledge of database security, including functions, interactions, and communications
  • Ability to effectively communicate findings to technical and non-technical stakeholders, including C-level executives
  • Hands-on experience in exploiting security vulnerabilities in lab or real-world environments (e.g., Capture the Flag challenges)
  • Experience in penetration testing for operational technologies (OT) - Advantage
  • OSCP / OSWE certifications or equivalent ethical hacking certifications - Advantage
  • Must be eligible to work in the US without sponsorship from an employer now or in the future.



EOE M/F/Veterans/Disabled

Applied = 0

(web-6787b74fd-l4cvn)