SBN

What’s it like to be a pentester for a penetration testing company?

Introduction

Penetration testers are the “ethical hackers” of the cybersecurity world. Not only does the job put you in the exciting position of trying to crack corporate security systems, but it also pays well and leads to solid opportunities for career growth. Pentesters most often work either in-house for a business or corporation, as freelancers or for a pentesting company.

In this article, we’ll take a look at what it’s like to be an ethical hacker at a company that specializes in penetration testing. By the time you finish reading, you’ll be able to make an informed and confident decision about whether working at a penetration testing company is the right choice for you.

What is a penetration testing company?

As we mentioned above, penetration testers usually work in one of three work environments: in-house, freelance or at a penetration testing company. While the nuts and bolts of the job won’t change much, the work environment can be quite different. Someone who loves freelancing, for example, might hate working full-time for a single company, and vice versa.

To make sure you’re working in the environment that makes you happiest, we’re taking a deep dive into what pentesting looks like at the three options we named above. This article is part of a series about pentesting, so be sure to check out it’s like to work in-house and freelance so you can compare all three options!

Now, let’s talk about penetration testing companies and what they do. Pentesting companies contract out penetration testing services to other businesses and organizations on a project basis. Sometimes you’ll see pentesting companies referred to as “third party,” because they’re not an internal department of the companies they perform testing for. Instead, they function as independent, impartial teams of expert penetration testers who are hired to (Read more...)

*** This is a Security Bloggers Network syndicated blog from Infosec Resources authored by Christine McKenzie. Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/dEApEdOY2iM/

Secure Guardrails