Robert Half Technology Network Security Administrator in Sacramento, California

Robert Half Technology is seeking a Cyber Security Consultant to conduct an outside security audit of our client's infrastructure. This opportunity is solely project based, and is perfect for a Cyber Security Consultant who is available over the next 2-4 weeks' time. The day-to-day

  • Plan the penetration test

  • Select, design and create appropriate tools for testing

  • Perform the penetration test on computer systems, networks, web-based and mobile applications

  • Document your methodologies

  • Gather the data intelligence not only from the output of the automated penetration tools but also from information gathered from earlier stages to identify vulnerabilities that the tools may not see

  • Review your findings and feedback to clients

  • Analyze the outcomes and make recommendations for security improvements Key responsibilities

  • Carry out application, network, systems and infrastructure penetration tests

  • Review physical security and perform social engineering tests where appropriate

  • Evaluate and select from a range of penetration testing tools

  • Keep up to date with latest testing and ethical hacking methods

  • Deploy the testing methodology and collect data

  • Report on findings to a range of stakeholders

  • Make suggestions for security improvements

  • Enhance existing methodology material For full details, and to be considered, please submit your resume directly to Lead Recruiter Halle Carolo at Thank you!

Technology doesn't change the world. People do.

As a technology staffing firm, we can't think of a more fitting mantra. We're extreme believers in technology and the incredible things it can do. But we know that behind every smart piece of software, every powerful processor, and every brilliant line of code is an even more brilliant person.

Leader among IT staffing agencies

The intersection of technology and people — it's where we live. Backed by more than 65 years of experience, Robert Half Technology is a leader among IT staffing agencies. Whether you're looking to hire experienced technology talent or find the best technology jobs, we are your IT expert to call.

We understand not only the art of matching people, but also the science of technology. We use a proprietary matching tool that helps our staffing professionals connect just the right person to just the right job. And our network of industry connections and strategic partners remains unmatched.

Apply for this job now or contact our branch office at 888.674.2094 to learn more about this position.

All applicants applying for U.S. job openings must be authorized to work in the United States. All applicants applying for Canadian job openings must be authorized to work in Canada.

© 2018 Robert Half Technology. An Equal Opportunity Employer M/F/Disability/Veterans.

By clicking 'Apply Now' you are agreeing to Robert Half Terms of Use.

Req ID: 00390-0010325413

Functional Role: Network Administrator

Country: USA

State: CA

City: Sacramento

Postal Code: 95833

Compensation: DOE

Requirements: Qualifications highly desired

  • Certified Register of Ethical Security Testers (CREST)

  • Cyber-security certifications (CHECK, CTM, CTL, CREST, TIGER, OSCP)

  • A degree in computer security, computer science or equivalent

  • Recognized security testing certifications (GIAC, CEH) Relevant experience

  • Penetration testing experience of systems, web-based applications and networks.

  • Solid knowledge and experience of using a variety of penetration testing or threat modelling tools including open source and commercial mapping

  • Experience of threat reporting and assessing vulnerabilities

  • Some consulting experience is advantageous with a proven ability to understand and meet client needs, build relationships and develop a positive dialogue

  • Adept at explaining technical jargon to non-technical parties

  • Scripting skills and reverse engineering experience is desirable

  • Past experience of using problem solving techniques and developing solutions to meet vulnerability threats