{"id":3526,"date":"2022-05-30T19:32:00","date_gmt":"2022-05-30T17:32:00","guid":{"rendered":"https:\/\/www.advens.test\/metier\/securite-offensive\/"},"modified":"2024-08-09T11:11:47","modified_gmt":"2024-08-09T09:11:47","slug":"offensive-security","status":"publish","type":"metier","link":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/job\/offensive-security\/","title":{"rendered":"Offensive security"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n<div id=\"block-image-texte-1840682573\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -gauche\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 \">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/advens-reportage-paris-dsc0503-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/advens-reportage-paris-dsc0503-1278x1320.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/04\/advens-reportage-paris-dsc0503-1278x1320.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6 -right d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          Your mission\n        <\/h2>\n                    <div class=\"text-content\">\n          <p>You will be asked to test the security features in place, on any given system, to detect any flaws. Needless to say, the job doesn\u2019t stop there. You will also need to identify additional measures to further tighten security.<\/p>\n<p>From intrusion testing to technical audits (including organisational audits and maturity assessments), this role is as varied as the systems you will be testing!<\/p>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n<div id=\"block-image-texte-221150306\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -droite\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 -right\">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc2087-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc2087-1278x1320.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc2087-1278x1320.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6  d-flex flex-column justify-content-center align-items-start\">\n                    <h2 class=\"titre title-5\">\n          More than a job\n        <\/h2>\n                    <div class=\"text-content\">\n          <p><span style=\"font-weight: 300;\">For an offensive security specialist, there is no such thing as routine. Your missions are innovative, and focused on a range of unique areas. These could include connected objects, industrial environments, and cutting-edge technologies to name a few.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 300;\">You can also take time out between two jobs to do research, work on R&amp;D projects and play with internal tools!<\/span><\/p>\n\n        <\/div>\n                            <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n<div id=\"block-colonnes-451200100\" class=\"acf-block-colonnes colonnes alignwide\">\n  <div class=\"container\">\n    <div class=\"row mb-4\">\n      <div class=\"col-12\">\n        <h3>Associated careers<\/h3>\n                      <\/div>\n    <\/div>\n\n                  \n    <div class=\"row row-colonnes row-cols-1 row-cols-md-2 row-cols-xl-2 gy-4 mb-4 mb-xl-5\">\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                                                  <div class=\"round-img mb-3\">\n                        <img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc2155-150x150.jpg\" alt=\"Advens_Reportage_Lille_DSC2155\" loading=\"lazy\"\/>\n                    <\/div>\n                                              <h4>Auditor<\/h4>\n              <p>From audit approvals to configuration reviews and compliance audits, your missions, always carried out in close collaboration with our clients, are varied.<\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n              <div class=\"col -img\">\n          <div class=\"card h-100 bg-grey-white border-0\">\n            <div class=\"card-body\">\n                                                                  <div class=\"round-img mb-3\">\n                        <img decoding=\"async\" class=\"img-fluid\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-reportage-lille-dsc1320-150x150.jpg\" alt=\"Advens_Reportage_Lille_DSC1320\" loading=\"lazy\"\/>\n                    <\/div>\n                                              <h4>Pentester<\/h4>\n              <p><span style=\"font-weight: 300;\">Join the Red Team or Purple Team projects to perform penetration tests on any type of cyber environment. Whether external or internal infrastructures, web or mobile applications, heavy client, API, Industrial Systems, IoT, etc.<\/span><\/p>\n\n                          <\/div>\n          <\/div>\n        <\/div>\n          <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n                            \n    \n  \n\n<div id=\"block-push-offres-971948809\" class=\"acf-block-offres push-contenus\">\n      \n    \n  \n<div class=\"commun-liste grille taxo\" data-component=\"CommunListe\">\n      <div class=\"default-block-header d-flex flex-wrap justify-content-between align-items-center\">\n              <h2 class=\"title title-6 mb-4\">\n                      Latest vacancies\n                                <a href=\"\" class=\"sections\">Offensive Security<\/a>\n                            <\/h2>\n                    \n    \n<a class=\"btn-see-all texte-petit-bold ico-btn\" href=\"https:\/\/careers.smartrecruiters.com\/ADVENS\/advens\" target=\"_blank\" title=\"View All\">\n  View All\n<\/a>          <\/div>\n  \n  <div class=\"liste grid -one\">\n          <div class=\"container\">\n        <div class=\"row row-cols-1  g-4\">\n                      \n\n\n\n  \n\n\n\n\n\n\n\n\n\n<div class=\"list-item col\" >\n  <div class=\"list-item-content \">\n    <div class=\"card card__push4 card-offre p-4 mw-100\">\n      <a href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/job-offer\/pentester\/\" class=\"card-link\" title=\"View details\"><\/a>\n      <div class=\"card-body content d-flex flex-wrap justify-content-between align-items-center gap-3\">\n        <h3 class=\"h5 card-title title m-0 d-flex flex-column flex-md-row gap-2\">\n          Pentester\n                      <span class=\"text-grey-light\">(Permanent contract)<\/span>        <\/h3>\n                                                                                                                                                    <span class=\"d-flex align-items-center gap-2\">\n            <svg width=\"16\" height=\"20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 14.062 20\">\n              <path fill=\"#5D5D5D\" d=\"M6.544 19.739a.586.586 0 0 0 .975 0c1.386-2.08 3.429-4.649 4.852-7.261 1.138-2.09 1.691-3.87 1.691-5.447C14.062 3.154 10.908 0 7.031 0S0 3.154 0 7.031c0 1.576.553 3.358 1.691 5.447 1.422 2.61 3.469 5.185 4.852 7.26zM7.03 1.172c3.23 0 5.86 2.628 5.86 5.86 0 1.374-.507 2.972-1.549 4.885-1.227 2.252-2.978 4.536-4.31 6.457-1.334-1.92-3.085-4.205-4.312-6.457-1.042-1.912-1.548-3.51-1.548-4.886 0-3.23 2.628-5.86 5.859-5.86z\"\/>\n              <path fill=\"#5D5D5D\" d=\"M7.031 10.547c1.939 0 3.516-1.577 3.516-3.516S8.97 3.516 7.03 3.516 3.515 5.093 3.515 7.03s1.578 3.516 3.516 3.516zm0-5.86c1.292 0 2.344 1.052 2.344 2.344S8.323 9.375 7.03 9.375 4.687 8.323 4.687 7.03 5.74 4.687 7.031 4.687z\"\/>\n            <\/svg>\n            Bordeaux, Lille, Nantes, Paris, Rennes\n          <\/span>\n                          <span class=\"d-flex align-items-center gap-2\">\n            <svg width=\"28\" height=\"20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" data-name=\"Layer 1\" viewbox=\"0 0 28.235 20\">\n              <path fill=\"#5D5D5D\" d=\"M25.074 8.1a3.523 3.523 0 0 0 1.397-2.806c0-1.946-1.583-3.53-3.53-3.53s-3.53 1.584-3.53 3.53c0 1.148.554 2.167 1.406 2.812-.09.04-.183.074-.27.12a.589.589 0 0 0 .541 1.044 4.04 4.04 0 0 1 1.853-.446 4.123 4.123 0 0 1 4.118 4.117v2.353c0 .973-.792 1.765-1.765 1.765h-2.976a.588.588 0 1 0 0 1.177h2.976a2.945 2.945 0 0 0 2.942-2.942v-2.353c0-2.16-1.302-4.02-3.162-4.841zm-4.486-2.806c0-1.297 1.056-2.353 2.353-2.353s2.353 1.056 2.353 2.353-1.055 2.353-2.353 2.353-2.353-1.055-2.353-2.353zM7.94 9.018a.589.589 0 0 0-.252-.793c-.087-.045-.18-.079-.27-.119a3.522 3.522 0 0 0 1.406-2.812c0-1.946-1.583-3.53-3.53-3.53s-3.53 1.584-3.53 3.53c0 1.144.55 2.16 1.397 2.806A5.299 5.299 0 0 0 0 12.94v2.353a2.945 2.945 0 0 0 2.941 2.942h2.977a.588.588 0 1 0 0-1.177H2.94a1.767 1.767 0 0 1-1.765-1.765V12.94a4.123 4.123 0 0 1 4.118-4.117c.65 0 1.29.154 1.853.446a.59.59 0 0 0 .793-.252zM2.941 5.294c0-1.297 1.056-2.353 2.353-2.353s2.353 1.056 2.353 2.353-1.055 2.353-2.353 2.353-2.353-1.055-2.353-2.353zm13.515 2.209a4.115 4.115 0 0 0 1.78-3.385c0-2.27-1.848-4.118-4.118-4.118S10 1.847 10 4.118c0 1.402.706 2.641 1.78 3.385-2.415.94-4.133 3.284-4.133 6.027v3.529A2.945 2.945 0 0 0 10.588 20h7.06a2.945 2.945 0 0 0 2.94-2.941v-3.53c0-2.742-1.718-5.086-4.132-6.026zm-5.28-3.385c0-1.622 1.32-2.941 2.942-2.941s2.941 1.319 2.941 2.94-1.32 2.942-2.941 2.942-2.941-1.32-2.941-2.941zm8.236 12.941c0 .973-.792 1.765-1.765 1.765h-7.059a1.767 1.767 0 0 1-1.764-1.765v-3.53c0-2.918 2.374-5.294 5.294-5.294s5.294 2.376 5.294 5.295z\"\/>\n            <\/svg>\n            Offensive Security\n          <\/span>\n                          <span class=\"btn btn-primary w-100 w-md-auto\">\n            See the offer\n          <\/span>\n              <\/div>\n    <\/div>\n  <\/div>\n<\/div>\n                  <\/div>\n      <\/div>\n      <\/div>\n<\/div>  <\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n<div id=\"block-image-texte-1031890583\" class=\"acf-block-image-texte alignwide\">\n  <div class=\"image-texte row gx-5 py-4 -gauche\">\n                            <div class=\"col-12 col-lg-6 image-container mb-3 mb-lg-0 \">\n              <div class=\"image mobile-full-width\">\n          <div class=\"image-content ratio-wrapper -square\" data-component=\"LazyImage\" >\n            <picture class=\"full bkg-cover\" >\n                              <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-quo-4-620x620.webp\" media=\"(min-width: 0px) and (max-width: 767.98px)\">\n                <source srcset=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-quo-4-1320x801.webp\" media=\"(min-width: 768px)\">\n                <img decoding=\"async\" class=\"img img-fluid rounded\" loading=\"lazy\" src=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-quo-4-1320x801.webp\" alt=\"\">\n                          <\/picture>\n          <\/div>\n        <\/div>\n                <\/div>\n    <div class=\"texte col-12 col-lg-6 -right d-flex flex-column justify-content-center align-items-start\">\n              \n                    <h2 class=\"titre title-5\">\n          Join the first inclusion program created for and by cybersecurity \n        <\/h2>\n                    <div class=\"text-content\">\n          <p>Amongst young people struggling to find the right job, unemployed, without a diploma or even homeless, there are many potential experts.<\/p>\n<p>That\u2019s why we are launching the first association-run cybersecurity inclusion programme, to train people within our business ecosystem.<\/p>\n<p>We want to awaken, raise awareness, train and then integrate young people into our sector.<\/p>\n\n        <\/div>\n                                <div class=\"btns d-grid d-md-flex gap-3\">\n                      <a class=\"btn btn-primary\" href=\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/comittment\/cyber-academy\/\" target=\"\" title=\"Learn more about the initiative\">\n              Learn more about the initiative\n            <\/a>\n                            <\/div>\n          <\/div>\n  <\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n<div id=\"block-interviews-1214567224\" class=\"acf-block-interviews interviews alignwide\">\n      <div class=\"default-block-header header\">\n      <h2 class=\"title-6 title\">Our ambassadors<\/h2>\n    <\/div>\n  \n                    <div class=\"container\">\n          <div class=\"row\">\n            <div class=\"col-12 col-xl-6 d-flex flex-column justify-content-center\">\n              <blockquote>\n                <p class=\"introduction introduction text-primary fs-3\">\n                  &#8220;What I like about my job as a pentester is being able to break everything&#8230; but also being able to provide my clients with an approach to improving their security&#8221;<br \/>\r\n\n                <\/p>\n                <cite>\n                  <strong class=\"texte-moyen-bold d-flex\">Tha\u00efs Laredo<\/strong>\n                  <span class=\"texte-moyen\">Team manager \/ Auditor<\/span>\n                <\/cite>\n              <\/blockquote>\n              <div class=\"btns\">\n                                              <\/div>\n            <\/div>\n            <div class=\"col-12 col-xl-6\">\n                                  <div class=\"yt-video-container\" data-video-id=\"sg2JCzzI7yk\">\n          <iframe loading=\"lazy\" class=\"iframe-video\" width=\"100%\" height=\"380\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/sg2JCzzI7yk\" title=\"Youtube video\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen=\"allowfullscreen\"><\/iframe>\n      <\/div>\n                            <\/div>\n          <\/div>\n        <\/div>\n            <\/div>\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n\n  \n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n","protected":false},"excerpt":{"rendered":"<p>To ensure the best protection, you sometimes have to be the first to attack. Whether it\u2019s intrusion, configuration reviewing or even social engineering; it&#8217;s up to you to test the security of our clients with the help of a wide range of audit methods!<\/p>\n","protected":false},"featured_media":1872,"template":"","taxo_metier":[200,198,47],"class_list":["post-3526","metier","type-metier","status-publish","has-post-thumbnail","hentry","taxo_metier-offensive-security","taxo_metier-securite-offensive-en","taxo_metier-securite-offensive"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Offensive security - Advens<\/title>\n<meta name=\"description\" content=\"To ensure the best protection, you sometimes have to be the first to attack. Whether it\u2019s intrusion, configuration reviewing or even social engineering; it&#039;s up to you to test the security of our clients with the help of a wide range of audit methods!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.test\/job\/securite-offensive\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Offensive security - Advens\" \/>\n<meta property=\"og:description\" content=\"To ensure the best protection, you sometimes have to be the first to attack. Whether it\u2019s intrusion, configuration reviewing or even social engineering; it&#039;s up to you to test the security of our clients with the help of a wide range of audit methods!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.test\/job\/securite-offensive\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-09T09:11:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.test\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"801\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.test\/job\/securite-offensive\/\",\"url\":\"https:\/\/www.advens.test\/job\/securite-offensive\/\",\"name\":\"Offensive security - Advens\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.test\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.test\/job\/securite-offensive\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/job\/securite-offensive\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg\",\"datePublished\":\"2022-05-30T17:32:00+00:00\",\"dateModified\":\"2024-08-09T09:11:47+00:00\",\"description\":\"To ensure the best protection, you sometimes have to be the first to attack. Whether it\u2019s intrusion, configuration reviewing or even social engineering; it's up to you to test the security of our clients with the help of a wide range of audit methods!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.test\/job\/securite-offensive\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.test\/job\/securite-offensive\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/job\/securite-offensive\/#primaryimage\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg\",\"width\":1920,\"height\":801},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.test\/job\/securite-offensive\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.test\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Offensive security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.test\/#website\",\"url\":\"https:\/\/www.advens.test\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.test\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.test\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.test\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.test\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Offensive security - Advens","description":"To ensure the best protection, you sometimes have to be the first to attack. Whether it\u2019s intrusion, configuration reviewing or even social engineering; it's up to you to test the security of our clients with the help of a wide range of audit methods!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.test\/job\/securite-offensive\/","og_locale":"en_US","og_type":"article","og_title":"Offensive security - Advens","og_description":"To ensure the best protection, you sometimes have to be the first to attack. Whether it\u2019s intrusion, configuration reviewing or even social engineering; it's up to you to test the security of our clients with the help of a wide range of audit methods!","og_url":"https:\/\/www.advens.test\/job\/securite-offensive\/","og_site_name":"Advens","article_modified_time":"2024-08-09T09:11:47+00:00","og_image":[{"width":1920,"height":801,"url":"https:\/\/www.advens.test\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.advens.test\/job\/securite-offensive\/","url":"https:\/\/www.advens.test\/job\/securite-offensive\/","name":"Offensive security - Advens","isPartOf":{"@id":"https:\/\/www.advens.test\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.test\/job\/securite-offensive\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.test\/job\/securite-offensive\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg","datePublished":"2022-05-30T17:32:00+00:00","dateModified":"2024-08-09T09:11:47+00:00","description":"To ensure the best protection, you sometimes have to be the first to attack. Whether it\u2019s intrusion, configuration reviewing or even social engineering; it's up to you to test the security of our clients with the help of a wide range of audit methods!","breadcrumb":{"@id":"https:\/\/www.advens.test\/job\/securite-offensive\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.test\/job\/securite-offensive\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/job\/securite-offensive\/#primaryimage","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2022\/05\/advens-video-capture-ftm-14.jpg","width":1920,"height":801},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.test\/job\/securite-offensive\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.test\/en\/"},{"@type":"ListItem","position":2,"name":"Offensive security"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.test\/#website","url":"https:\/\/www.advens.test\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.test\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.test\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.advens.test\/#organization","name":"Advens","url":"https:\/\/www.advens.test\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/metier\/3526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/metier"}],"about":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/types\/metier"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/media\/1872"}],"wp:attachment":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/media?parent=3526"}],"wp:term":[{"taxonomy":"taxo_metier","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/taxo_metier?post=3526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}