HIRING for Penetration Tester IN Columbus, Ohio-(Onsite) at Columbus, Ohio, USA |
Email: [email protected] |
From: GAURAV, SIBITALENT [email protected] Reply to: [email protected] Hi, Hope you are doing well, I have one immediate need for Penetration Tester IN Columbus, Ohio-(Onsite) Please find the Job details below and kindly revert if youre interested in learning more about this job. Job Description Job Title: Penetration Tester Location: Columbus, Ohio-(Onsite) Visa: Any visa Except H1B & CPT Job Description: The Penetration Tester is responsible for conducting security pen testing, monitoring, and auditing within a dynamic global organization. The products under test will have the coverage of embedded devices and cloud services. The Product Security Analyst should have exposure to embedded devices as well as cloud services (Azure/AWS). Some of the products will be white box tests while others will be total black box engagements. A successful engineer will be able to take the product and evaluate the weak points in the design and implementation and focus in on those weaknesses to find security gaps under the guidance of senior engineers and testing leads. Analyst should clearly document the findings, analysis and prepare a detailed report. Key Duties In addition to performing internal application and product security assessments, the Application and Product Security Analyst will be expected to support on following major duties: Conduct security evaluation and threat assessments of embedded systems, mobile applications, web applications Conduct research for the purposes of finding new vulnerabilities and enhancing existing capabilities Circumventing security protection methods and techniques Performing data bus monitoring (snooping) and data injection Conduct communications protocol analysis in the embedded products, and applications Conduct wireless communications channel snooping, and data injection Learn to reverse engineering complex systems and protocols Create detailed technical reports and proof of concept code to document findings Perform System Breakdown of the project/product before testing, identify and evaluate all the testing requirements and plan out the detailed testing activities, resources etc. with the help of Senior/Lead test engineers Provide proactive detailed interaction with respective engineering group on the testing needs, testing progress/status and provide detailed analysis report Use of Gitlab for issue management, tool usage experience preferred Preference given to other practical skills such as: functional analysis, memory image capture, static memory analysis, and data element extraction, etc. Requirements: A Bachelors Degree in Information Technology, Computer Science or related field is highly desirable. Additional advanced security qualifications such as OSCP (Offensive Security Certified Professional) certification, CEH (Certified Ethical Hacker) or equivalent preferred. Two or more years of experience (2+ years) in information, application, embedded product security and/or IT risk management with a focus on security, performance, and reliability Solid understanding of security protocols, cryptography, authentication, authorization and security Good working knowledge of current IT risks and experience implementing security solutions Ability to interact with a broad cross-section of personnel to articulate and enforce security measures Excellent written and verbal communication skills as well as business acumen Strong ability to establish partnerships and influence change and achieve results within dynamic environment Meaningful technical contributions into the development lifecycle of an application, product or service Preferred knowledge experience includes: Understanding and development experience of embedded systems / software, and web-based applications Linux network device driver/data-path performance exposure Familiarity with compilers, debuggers, disassemblers, and other low-level development and analysis tools Exposure to binary analysis tools such as IDA Pro, WinDbg, BinWalk, Valgrind, PIN, Panda and S2E Working knowledge of hacking tools and techniques such as memory corruption exploits, rootkits, protocol poisoning, browser-based attacks, DNS poisoning, MetaSploit, nmap, Nessus, etc. An understanding of common cryptographic algorithms and protocols including their weaknesses and attacks against them Understanding of network protocols and experience developing packet-level programs Understanding of common microcontroller programming tools and debugging interfaces Exposure to Layer 2, Layer 3 networking, QoS Knowledge of common malware/botnet exploits and how they are targeted to exploit embedded systems Operating system configuration of Windows, Linux, Android, and iOS Computer boot process including boot loaders Thanks & Regards: GAURAV VISHWAKARMA IT Recruiter (Sibitalent Corp) Office 101 E. Park Blvd,Suite 600, Plano, TX75074 Website:www.sibitalent.com I Phone: 936-297-2002 E-Mail:[email protected] Keywords: information technology Texas |
[email protected] View all |
Thu Jan 26 00:38:00 UTC 2023 |