Skip to content
Don't miss training sessions with Jayson E. Street at Black Hat and DEF CON
  • About Us
    • Meet the Leadership
  • Consulting
    • Education & Training
    • Policy & Compliance
    • Security Architecture
    • Vulnerability Discovery
  • Managed Services
    • Incident Response & Recovery
    • Threat Intel & Detection
  • News
    • Events
  • Contact Us
Menu
  • About Us
    • Meet the Leadership
  • Consulting
    • Education & Training
    • Policy & Compliance
    • Security Architecture
    • Vulnerability Discovery
  • Managed Services
    • Incident Response & Recovery
    • Threat Intel & Detection
  • News
    • Events
  • Contact Us
  • (918) 986-7060

Jobs

Filter by

Penetration Tester (Advanced)

More Details

Secure Yeti, a GSA-certified small business, was founded with one simple goal in mind—to make the world a more secure and safer place. With a focus on excellence and a dedication to safeguarding digital environments, Secure Yeti stands as a trusted partner in fortifying defenses against the ever-evolving landscape of cyber threats.

  • (918) 986-7060
  • (918) 321-0306
  • info@secureyeti.com
  • 427 S. Boston Ave. Suite 306 | Tulsa, Oklahoma 74103

Consulting Services

  • Education & Training
  • Policy & Compliance
  • Security Architecture
  • Vulnerability Discovery
  • Education & Training
  • Policy & Compliance
  • Security Architecture
  • Vulnerability Discovery

Managed Services

  • Incident Response & Recovery
  • Threat Intel & Detection
  • Incident Response & Recovery
  • Threat Intel & Detection
Facebook-f Twitter Linkedin
2025 © All Rights Reserved - Secure Yeti LLC. | Privacy Policy
  • About Us
    • Meet the Leadership
  • Consulting
    • Education & Training
    • Policy & Compliance
    • Security Architecture
    • Vulnerability Discovery
  • Managed Services
    • Incident Response & Recovery
    • Threat Intel & Detection
  • News
    • Events
  • Contact Us
  • About Us
    • Meet the Leadership
  • Consulting
    • Education & Training
    • Policy & Compliance
    • Security Architecture
    • Vulnerability Discovery
  • Managed Services
    • Incident Response & Recovery
    • Threat Intel & Detection
  • News
    • Events
  • Contact Us