Tylertech logo

Penetration Tester - Application Security

Tylertech Yarmouth, Maine, United States

remotefull-time
Posted Feb 13, 2026Apply by Mar 15, 2026

Role & seniority: Penetration Tester, Application Security Team; mid-level with at least 2 years in IT security.

Stack/tools: manual and automated security assessment methods; security testing tools (BurpSuite, Kali Linux, SQLMap, Metasploit, Nmap); basic programming (C, C++, C#, Python, Java, J2EE); familiarity with OWASP Top 10, SANS Top 25, CVE/CVSS/CWE; cloud environments; perimeter security concepts; knowledge of PCI-DSS, SOX, HIPAA; offensive security certifications pursued (GWAPT, OSCP, CBBH, CPTS, GPEN, OSWA, GCPN) or ability to obtain.

Top 3 responsibilities

  1. Conduct security assessments on networks, systems, and applications (manual and automated).

  2. Evaluate threat, risk, and impact; document and report vulnerabilities; coordinate vulnerability tracking and remediation with cross-functional teams.

  3. Stay current on evolving threats/tools, share skills with team, and support secure development lifecycle integration.

Must-have skills

  • Bachelor’s degree in Cybersecurity/CS/IT or related field; ≥2 years IT security experience.

  • Foundational knowledge: application vulnerability assessments, common weaknesses, penetration testing methodologies, perimeter security, regulatory standards (PCI-DSS, SOX, HIPAA), secure development concepts.

  • Programming knowledge in at least one language; strong communication; self-motivated and collaborative; strong organization and adaptability.

  • Familiarity with vulnerability databases/frameworks (OWASP T

Full Description

Description

Tyler Technologies is seeking a Penetration Tester to join the Application Security Team. The Penetration Tester position involves conducting manual application security assessments on Tyler products and systems, managing vulnerabilities, and working with development teams to triage potential vulnerabilities and remediate them. This role will integrate essential security practices into the software development lifecycle and includes partnering with various security peer teams, IT, Development, and Engineering to incorporate or enhance security measures.

To excel in this role, candidates should possess experience in complex, fast-paced technical environments, along with a passion for technology and a commitment to process-driven, collaborative problem-solving.

Responsibilities

Conduct security assessments on networks, systems, and applications using manual and automated tools Evaluate the threat, risk, and impact of potential vulnerabilities Document and report potential vulnerabilities from security assessments Coordinate with cross-functional teams to manage vulnerability tracking processes and support vulnerability remediation Collaborate with teammates to learn, regularly share skills and foster team excellence Stay current on evolving threats, trends, tools, and techniques Perform other duties as assigned by the manager

Qualifications

Bachelor’s degree in Cybersecurity, Systems Engineering, Computer Science, Information Systems Management or related field At Least two years of related job experience in IT security

Foundational understanding of the following security concepts

  • Application vulnerability assessments
  • Common application and operating system weaknesses
  • Penetration testing methodologies
  • Perimeter security (firewalls, intrusion detection, etc.)

Regulatory compliance standards: PCI-DSS, SOX, HIPAA Secure development concepts Basic programming knowledge of at least one language (e.g., C, C++, C#, Python, Java, J2EE) Strong interpersonal, verbal, and written communication skills Self-motivated with the ability to work independently and collaborate effectively in both team-based and remote environments Strong organizational skills with the ability to manage a wide range of tasks and adapt to shifting priorities Familiarity with common vulnerability databases and frameworks (e.g., OWASP Top 10, SANS Top 25, CVE, CVSS, CWE) Experience with security testing tools (e.g., BurpSuite, Kali Linux, SQLMap, Metasploit, Nmap) Currently hold or able to obtain offensive security certification(s) shortly upon hire (e.g., GWAPT, OSCP, CBBH, CPTS, GPEN, OSWA, GCPN) Experience with public-sector software products and cloud environments Demonstrated contributions to the security community (e.g., public CVEs, bug bounty acknowledgments, open-source projects, blogs, publications) Required to undergo and satisfactorily pass a fingerprint background check in accordance with CJIS requirements.

Application Security AssessmentsVulnerability ManagementSoftware Development LifecycleThreat EvaluationRisk AssessmentImpact AnalysisVulnerability ReportingCross-Functional Team CoordinationVulnerability RemediationSecurity Testing ToolsPenetration Testing MethodologiesPerimeter SecurityRegulatory ComplianceSecure Development ConceptsProgrammingCommunication Skillsmulti-location

Cookies & analytics consent

We serve candidates globally, so we only activate Google Tag Manager and other analytics after you opt in. This keeps us aligned with GDPR/UK DPA, ePrivacy, LGPD, and similar rules. Essential features still run without analytics cookies.

Read how we use data in our Privacy Policy and Terms of Service.