Security Consultant Salary at Certik BETA

How much does a Certik Security Consultant make?

As of April 2025, the average annual salary for a Security Consultant at Certik is $121,691, which translates to approximately $59 per hour. Salaries for Security Consultant at Certik typically range from $112,401 to $129,805, reflecting the diverse roles within the company.

It's essential to understand that salaries can vary significantly based on factors such as geographic location, departmental budget, and individual qualifications. Key determinants include years of experience, specific skill sets, educational background, and relevant certifications. For a more tailored salary estimate, consider these variables when evaluating compensation for this role.

DISCLAIMER: The salary range presented here is an estimation that has been derived from our proprietary algorithm. It should be noted that this range does not originate from the company's factual payroll records or survey data.

Website:
certik.com
Size:
50 - 100 Employees
Revenue:
$10M - $50M
Industry:
Software & Networking

CertiK is a blockchain security company that utilizes AI technology to to audit and monitor blockchain protocols and smart contracts. They also offer an advanced platform, Skynet, that leverages on-chain and off-chain data. The company is based in New York, New York.

See similar companies related to Certik

What Skills Does a person Need at Certik?

At Certik, specify the abilities and skills that a person needs in order to carry out the specified job duties. Each competency has five to ten behavioral assertions that can be observed, each with a corresponding performance level (from one to five) that is required for a particular job.

  1. Information security: A practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording, or destruction of confidential, private, and sensitive information.
  2. Cybersecurity: Computer security, cybersecurity or information technology security (IT security) is the protection of computer systems from the theft of or damage to their hardware, software, or electronic data, as well as from the disruption or misdirection of the services they provide. The field is becoming more important due to increased reliance on computer systems, the Internet and wireless network standards such as Bluetooth and Wi-Fi, and due to the growth of "smart" devices, including smartphones, televisions, and the various devices that constitute the "Internet of things". Due to its complexity, both in terms of politics and technology, cybersecurity is also one of the major challenges in the contemporary world.
  3. Analysis: Analysis is the process of considering something carefully or using statistical methods in order to understand it or explain it.
  4. Security Systems: Security and protection system, any of various means or devices designed to guard persons and property against a broad range of hazards, including crime, fire, accidents, espionage, sabotage, subversion, and attack.
  5. Risk Management: Risk management is the identification, evaluation, and prioritization of risks (defined in ISO 31000 as the effect of uncertainty on objectives) followed by coordinated and economical application of resources to minimize, monitor, and control the probability or impact of unfortunate events or to maximize the realization of opportunities. Risks can come from various sources including uncertainty in financial markets, threats from project failures (at any phase in design, development, production, or sustainment life-cycles), legal liabilities, credit risk, accidents, natural causes and disasters, deliberate attack from an adversary, or events of uncertain or unpredictable root-cause. There are two types of events i.e. negative events can be classified as risks while positive events are classified as opportunities. Several risk management standards have been developed including the Project Management Institute, the National Institute of Standards and Technology, actuarial societies, and ISO standards. Methods, definitions and goals vary widely according to whether the risk management method is in the context of project management, security, engineering, industrial processes, financial portfolios, actuarial assessments, or public health and safety.

Related Jobs

Logicalis Spain

En Logicalis Spain, buscamos incorporar un perfil de Ingeniero de Seguridad para nuestra Business Unit de Ciberseguridad, especializados en Gestión de Identidades. Las personas seleccionadas participarán y liderarán proyectos de implantación y servicios de mantenimiento de productos y tecnologías de fabricantes reconocidos en Gestión de Identidades. Las funciones del puesto son las siguientes: Análisis y diseño de soluciones de seguridad. Implantación y configuración de tecnologías de Gestión de Identidades. Realización de pruebas funcionales y técnicas. Transferencia de conocimiento a los equipos implicados. Despliegue en entornos de producción, asegurando el cumplimiento de nuestra metodología de calidad. ¿Qué ofrecemos en Logicalis Spain? Logicalis Spain somos un grupo internacional con más de 20 años de experiencia en el sector IT, vinculados a proyectos y servicios de gran envergadura en Data Centers, Ciberseguridad y Analytics. Puesto de trabajo estable. Proyectos de larga duraci


Sponsored
4/1/2025 12:00:00 AM
Davidson consulting
Madrid , Community of Madrid

Davidson Consulting España nace en el año 2014. Formamos parte del grupo Davidson, multinacional francesa de servicios tecnológicos con +18 años de experiencia en el sector y presencia en varios países europeos además de en Canadá. Somos 3000 compañeros a nivel global. En España nos caracterizamos por ser un equipo de más de 150 profesionales altamente cualificados y apasionados por el mundo de la tecnología y la innovación. Por ello, nuestro objetivo es seguir aumentando el equipo para continuar involucrados en proyectos nacionales e internacionales de gran envergadura. Desde Davidson buscamos un/a Encryption Security Consultant, para unirse a nuestro equipo en Davidson Madrid. Funciones: Incorporación de nuevas aplicaciones de cifrado basadas en las restricciones del servicio de cifrado del cliente. Gestión de la plataforma para garantizar rendimiento, resiliencia, calidad y cumplimiento de los SLA requeridos. Recertificación de los casos de uso ofrecidos. Monitorización de la plataf


Sponsored
4/1/2025 12:00:00 AM
Mastech Digital
San Francisco , CA

Job Title: Cyber Consultant Location: San Francisco, CA – hybrid Duration: 9 -12 months Responsibilities: Conduct comprehensive cybersecurity assessments to identify vulnerabilities and risks Develop and implement cybersecurity strategies, policies, and procedures Provide expert guidance and recommendations on cybersecurity best practices and industry standards Collaborate with clients to design and implement security controls and measures Conduct penetration testing and vulnerability assessments to identify potential weaknesses Monitor and analyze security incidents and respond to cybersecurity breaches or threats Stay up-to-date with the latest cybersecurity trends, technologies, and threats Provide training and awareness programs to educate clients on cybersecurity best practices Assist in incident response and recovery efforts in the event of a cybersecurity incident Collaborate with cross-functional teams to ensure the integration of cybersecurity measures across all systems and p


Sponsored
4/1/2025 12:00:00 AM
Net2Source Inc.
Plano , TX

YOUR IMPACT If you are looking to apply your due diligence skills while also learning about the changing regulatory landscape, our team invites you to apply for a position on the team. We are seeking a professional who can work with our internal stakeholders and clients to execute the Third-Party Distributor Due Diligence Program. This position requires, a thorough understanding of our Global Framework for Due Diligence, client service/on-boarding environment, and knowledge of the industry, our client base, and our systems. HOW YOU WILL FULFILL YOUR POTENTIAL Ensure due diligence is performed on new and existing Third-Party Distributors as well as other Intermediaries. Develop expertise in the Firm's Global Framework. Quarterback the due diligence review with TPD’s from start to the signing of an agreement. Coordinate with internal stakeholders during reviews to obtain necessary approvals. Propose and work on special projects as necessary (e.g., automation related projects, new busines


Sponsored
3/31/2025 12:00:00 AM
Rios Partners LLC
Arlington , VA

Job Description Job Description Summary Rios Partners is a mission-driven consulting firm dedicated to creating positive change by delivering value to our clients, investing in our employees, and tackling complex challenges that benefit both local and global communities. We approach our work with empathy, empowering our team members to deeply understand our clients' challenges and collaborate on developing effective solutions. As a team, we understand what it takes to drive organizations forward with measurable, sustainable results and are comfortable operating on critical national security problems. Our primary consideration when evaluating candidates is alignment with our Mission and Values, which can be found at http://www.riospartners.com/mission-and-values/. Job Description National Security Consultants develop solutions for clients with a focus in the national security sector, as well as organizational design, strategy, supply chain & network operations, and process efficiency an


Sponsored
3/31/2025 12:00:00 AM
Wipro
Dallas , TX

RESPONSIBILITIES • Secure aircraft and ground systems by implementing and maintaining the ANSP, including PKI, VPN, and zero-trust solutions. • Manage and maintain server infrastructure (Windows and Linux) supporting cybersecurity systems. • Configure and manage network devices, including firewalls, VPN gateways, and intrusion detection systems. • Manage cryptographic keys and digital certificates, ensuring compliance with industry standards. • Respond to and manage security incidents, including forensic analysis and remediation. • Collaborate with stakeholders to ensure secure and efficient operations. • Stay updated on the latest developments in aircraft IT and network security. • Support the development of security training programs. • Monitor aviation systems for suspicious activities and analyze logs to identify threats. • Perform risk assessments and ensure compliance with aviation-specific cybersecurity frameworks. • Collect and analyze threat intelligence data, staying informed


Sponsored
3/29/2025 12:00:00 AM
Bestica Inc.
Austin , TX

Job Title: Systems Analyst/ DevSecOps Location: Austin, TX 78751 (Hybrid) Tenure: 6+ Months contract Job Description Understands business objectives and problems, identifies alternative solutions, performs studies and cost/benefit analysis of alternatives. Analyzes user requirements, procedures, and problems to automate processing or to improve existing computer system: Confers with personnel of organizational units involved to analyze current operational procedures, identify problems, and learn specific input and output requirements, such as forms of data input, how data is to be; summarized, and formats for reports. Writes detailed description of user needs, program functions, and steps required to develop or modify computer program. Reviews computer system capabilities, specifications, and scheduling limitations to determine if requested program or program change is possible within existing system. Additional job details and special considerations Supports TIERS Operations, AWS Clou


Sponsored
3/28/2025 12:00:00 AM
VIEWNEXT

¿Estás buscando una cambio laboral? ¿Tienes un background técnico sólido y quieres darle el impulso definitivo a tu carrera? 🚀🚀En VIEWNEXT (Grupo IBM) estamos buscando un consultor de seguridad XDR para unirse a nuestro equipo. Requisitos: Dominio de las tecnologías XDR (Extended Detection and Response). Experiencia comprobada en revisión y mejora de políticas. Experiencia con marcos de seguridad y metodologías de gestión de riesgos. Nivel de inglés alto (se llevará a cabo una prueba) Funciones: Revisión y mejora de las políticas de seguridad Garantizar que todos los dispositivos estén cubiertos por estas políticas Análisis de las vulnerabilidades y capacidad para adelantarse a las amenazas cibernéticas. ¿Por qué Viewnext? ✔️ Salario competitivo 💰 ✔️ Formación en Tecnología y también en 'Soft Skills' 👨‍🏫 ✔️ Acceso a las certificaciones tecnológicas más importantes del mercado. 💯 ✔️ Plan de carrera, seguimiento y evaluación anual de tu desarrollo profesional. 📈 ✔️ Plan de retribu


Sponsored
3/28/2025 12:00:00 AM

Check more jobs information at Certik

Job Title Average Certik Salary Hourly Rate
2 Business Development Manager $147,858 $71
3 Business Intelligence Analyst $117,424 $56
4 Co-Founder $912,856 $439
5 Data Science Intern $76,181 $37
6 Finance Administrator $143,034 $69
7 Internship Software Engineer $84,732 $41
8 Manager, Event Marketing $118,503 $57
9 Product Analyst $75,827 $36
10 Product Designer $124,491 $60
11 Senior Staff Software Engineer $155,780 $75
12 Senior Talent Acquisition Specialist $105,234 $51

Hourly Pay at Certik

The average hourly pay at Certik for a Security Consultant is $59 per hour. The location, department, and job description all have an impact on the typical compensation for Certik positions. The pay range and total remuneration for the job title are shown in the table below. Certik may pay a varying wage for a given position based on experience, talents, and education.
How accurate does $121,691 look to you?

FAQ about Salary and Jobs at Certik

1. How much does Certik pay per hour?
The average hourly pay is $59. The salary for each employee depends on several factors, including the level of experience, work performance, certifications and skills.
2. What is the highest salary at Certik?
According to the data, the highest approximate salary is about $129,805 per year. Salaries are usually determined by comparing other employees’ salaries in similar positions in the same region and industry.
3. What is the lowest pay at Certik?
According to the data, the lowest estimated salary is about $112,401 per year. Pay levels are mainly influenced by market forces, supply and demand, and social structures.
4. What steps can an employee take to increase their salary?
There are various ways to increase the wage. Level of education: An employee may receive a higher salary and get a promotion if they obtain advanced degrees. Experience in management: an employee with supervisory experience can increase the likelihood to earn more.