Certified Ethical Hacker job description template
An effective description can help you hire the best fit for your job. Check out our tips to provide details that skilled professionals are looking for.
Tips for Writing a Certified Ethical Hacker Job Description
A certified ethical hacker is a professional who is skilled in the art of hacking and uses that skill to provide cybersecurity. An ethical hacker will identify potential security issues and weaknesses in a company’s network, then compile a report of where the vulnerabilities lie, so the company can fix the problems and prevent future breaches.
Below, we will cover a sample job description, exploring the daily responsibilities and necessary qualifications for a certified ethical hacker.
The Job Overview
We are seeking a certified ethical hacker to help us secure our network against potential threats. You will be responsible for testing our company network, servers, and infrastructure to identify vulnerabilities.
As a certified ethical hacker, you will be required to know how to use network and security tools and have an expert-level understanding of computer and network security. This will include an understanding of topics related to encryption and cryptography.
Responsibilities
Below are some of the responsibilities a certified professional ethical hacker is expected to assume:
- Ethical hacking and penetration testing
- Vulnerability assessment
- Malware analysis
- Work with other penetration testers and information security analysts
- Web application security
- Social engineering
- Database security
- Reverse engineering
- Network security
- Threat modeling and risk assessment
Job Qualifications and Skill Sets
Below are the qualifications expected of a certified ethical hacker:
- Bachelor’s degree in computer science, information technology security, or related field
- Security certifications, including the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH)
- Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring
- Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking
- Experience with common network infrastructure and security tools
- Familiarity with web applications, including HTTP and SQL injection attacks
- Knowledge of security testing methodologies in accordance with the EC-Council
- Ability to work in a fast-paced environment
Certified Ethical Hacker Hiring Resources
Explore talent to hireCertified Ethical Hackers you can meet on Upwork
Maher K.
Certified Ethical Hacker
Ethical Hacking
- Research & Development
- Software Development
- MikroTik
- Linux
- Firewall
- Juniper
- Cisco Certified Network Professional
- Penetration Testing
- System Administration
- CentOS
- C
- C#
- Python
- Cisco Router
I have a long list of experience in computer systems (enterprise, and personal), programming, networking (architecture, engineering, implementation, and administration), satellite communications, penetration testing, and other sectors of the information technology industry. I also have an extensive background in engineering and deploying low cost, high performance custom solutions which work as efficiently, if not more efficiently than commercial counterparts. I hold several certifications including CCNP. • Computer systems (software development, hardware design). • Website and web application development. • Research and development. • Systems security and penetration testing. • Network security and penetration testing. • Enterprise networking (border, core, and edge routers and switches). • Engineering, implementation, and administration of enterprise servers (DNS, cache, SMTP, POP/IMAP, and storage servers. CDN’s, NAS’s). • Data recovery and data forensics. • Basic and intermediate cryptography. • Smart, secure, innovative solutions to common and uncommon problems. Certifications: • Cisco Certified Specialist - Enterprise Core. • Cisco Certified Specialist - Enterprise Advanced Infrastructure Implementation. • Cisco Certified Network Professional Enterprise (CCNP). • RIPE NCC - Mutually Agreed Norms for Routing Security. • RIPE NCC - IPv6 Security Training Course. • RIPE NCC - DNS Operations/DNSSEC. • RIPE NCC - Advanced IPv6 Training Course. • RIPE NCC - Basic IPv6 Training Course. • SIAE MICROELETTRONICA - AGS-20 Equipment. I am also currently working on validating my expertise in Linux, Penetration testing, and network design with the following certifications: CISCO Designing Cisco Enterprise Networks (ENSLD) Comptia Linux+ Comptia Pentest+ Certified Ethical Hacker I also plan on validating my knowledge of Juniper systems with two certifications: Juniper Enterprise Routing and Switching, Specialist (JNCIS-ENT) Juniper Enterprise Routing and Switching, Professional (JNCIP-ENT)
...Karvelle S.
Certified Ethical Hacker
Ethical Hacking
- Cisco ASA
- Cisco Router
- Cisco Certified Network Associate
- Cisco Certified Network Professional
- Email Technical Support
- VPN
- VoIP
- Firewall
- VMWare
- System Configuration
- Cisco CallManager
Current Certifications: * CCENT ( Cisco Certified Network Technician ) * CCNA (Cisco Certified Network Admin (Routing & Switching)) * CCNP (Cisco Certified Network Professional (Routing & Switching)) * CCNA-SECURITY (Cisco Certified Network Security Admin) * SECURITY+ CE (CompTIA Certified SECURITY) * CEH (Certified Ethical Hacker) I am a Sr. Network and Security Engineer (SME) with expertise in Cisco Network Engineering and Cyber Security Engineering with year of I.T. experience managing private and government enterprise networks and Cyber security Network environments for large and small businesses . I have over 18+ years total experience as a lead Sr. network engineering SME as my foundation , and 9 yrs experience in Cyber Network Security infrastructure , design, configurations, troubleshooting, Cyber threat hunting. Also upgrading enterprise networks and security infrastructures for private companies , government organizations , including large and small business Networks and information systems. These skills include SME experience in Cisco Routing and Switching, ASA Firewalls, Palo Alto, Pfsense , VPNs, F5 Load balancer, WLAN, VoIP, and Cyber Security tools and SIEMS and Network Scanning, Windows Server, and WiFi networks.
...Andrew K.
Certified Ethical Hacker
Ethical Hacking
- Encryption
- Incident Response Plan
- Automated Testing
- Malware Removal
- Web Application Security
- Internet Security
- Web Testing
- Database Security
- Network Security
- Network Penetration Testing
- System Security
- Information Security
- Vulnerability Assessment
- Kali Linux
PLEASE NOTE: I DO NOT AND WILL NOT ENGAGE IN ILLEGAL AND UNETHICAL HACKING JOBS. ALL ILLEGAL AND UNETHICAL JOBS SHALL BE REPORTED TO UPWORK Experienced cyber security professional with a demonstrated history of working in the computer and network security industry. Skilled in Computer Forensics, Ethical Hacking, Malware Analysis, Vulnerability Assessment, and Penetration Testing. Strong information technology professional with a Bachelor's degree focused in Information Security and Computer Forensics from information and communication university. Certified Ethical Hacker from EC-Council.
...Join the world’s work marketplace

Post a job to interview and hire great talent.
Hire Talent