WhiteHat Security, Inc is seeking a seasoned Perl developer with a fair
understanding of web application security. Must be located in the
Silicon Valley area and possess the skills described below.

Please send resumes and/or inquiries to [EMAIL PROTECTED] or simply
reply to this message.

No head-hunters please. For immediately employment.

--------------------------------------------------------------------------------------

Required Skills:

Perl skills: 
* Experience in developing CGI and standalone Perl scripts 
* Experience in Perl modules 
* Working knowledge of Regular Expressions in Perl 
* Expert knowledge of Perl modules like CGI, DBI, LWP and XML-Parser. 

Web Development Skills:
* Working knowledge of HTML and web form design.
* Basic understanding of web application security principles.

Database Knowledge: 
* Experience in (my)SQL database programming.
* Experience in (my)SQL database design

Excellent written and verbal communication skills 

Preferred Skills:
* JavaScript, DHTML, and other web programming technologies.
* Working knowledge of CVS.

Personality:
* Hard working 
* Attentive to details 
* Efficient 
* Self-starting 
* A team player 
* Willingness to learn new skills

Primary Duties and Responsibilities:
* Develop / modify existing applications.
* Assist in development of SQL driven SOAP services.
* Design, implement and modify databases and related code. 
* Maintain close communication on project status and deliverables.
* Develop web-enabled database applications within our development
framework. 
* Fully test and document constructed programs
* Adhere to scheduled milestones and deliverable dates.


--------------------------------------------------------------------------------------

About WhiteHat Security:
WhiteHat Security, Inc. (www.whitehatsec.com) is a software and
professional services company focused on Web Application Security.
WhiteHat's utility products help security analysts and software
developers reduce the potential for intrusion within enterprise web
sites by automating the key activities normally performed in
vulnerability analysis of web applications.

Reply via email to