Engineer Pentesting

·
Full time
Location: Southampton
·
Job offered by: TN United Kingdom
·
Category:
Vertiv, a global organization with nearly 24,000 employees, designs, builds, and services critical infrastructure that enables vital applications for data centers, communication networks, and commercial and industrial facilities. We support today’s growing mobile and cloud computing markets with a portfolio of power, thermal, and infrastructure management solutions. The Application and Product Security Engineer (Penetration Testing) is responsible for conducting security pen testing, monitoring, and auditing within a dynamic global organization. The products under test will have a range of possibilities from embedded devices to cloud services. Some of the products will be white box tests while others will be total black box engagements. A successful engineer will be able to take the product and evaluate the weak points in the design and implementation and focus on those weaknesses to find security gaps under the guidance of senior engineers and testing leads. The engineer should clearly document the findings, analysis, and prepare a detailed report. What Would Be the Perfect Qualifications?

In addition to performing internal application and product security assessments, the Penetration Tester will be expected to support the following major duties: Conduct security evaluation and threat assessments of embedded systems, mobile applications, and web applications. Conduct research for the purposes of finding new vulnerabilities and enhancing existing capabilities. Circumvent security protection methods and techniques. Perform data bus monitoring (snooping) and data injection. Conduct communications protocol analysis in the embedded products and applications. Conduct wireless communications channel snooping and data injection. Learn to reverse engineer complex systems and protocols. Create detailed technical reports and proof of concept code to document findings. Perform System Breakdown of the project/product before testing, identify and evaluate all the testing requirements and plan out the detailed testing activities and resources with the help of Senior/Lead test engineers. Provide proactive detailed interaction with respective engineering groups on the testing needs, testing progress/status, and provide detailed analysis reports. What kind of work will you be doing?

Bachelor’s Degree in Information Technology, Computer Science, or related field is highly desirable. Advanced security qualifications such as OSCP (Offensive Security Certified Professional) certification, CEH (Certified Ethical Hacker), or equivalent. Five or more years (5+ years) of experience in information, application, or embedded product security and/or IT risk management. Two or more years (2+ years) of pentesting experience with a strong interest/personal experience in pentesting (CTF, HacktheBox, etc.). Solid understanding of security protocols, cryptography, authentication, authorization, and security. Good working knowledge of current IT risks and experience implementing security solutions. Ability to interact with a broad cross-section of personnel to articulate and enforce security measures. Excellent written and verbal communication skills as well as business acumen. Strong ability to establish partnerships, influence change, and achieve results within a dynamic environment. Meaningful technical contributions into the development lifecycle of an application, product, or service. How Does Your Ideal Experience Look?

Understanding and development experience of embedded systems/software and web-based applications. Familiarity with compilers, debuggers, disassemblers, and other low-level development and analysis tools. Exposure to binary analysis tools such as IDA Pro, WinDbg, BinWalk, Valgrind, PIN, Panda, and S2E. An understanding of common cryptographic algorithms and protocols including their weaknesses and attacks against them. Understanding of network protocols and experience developing packet-level programs. Understanding of common microcontroller programming tools and debugging interfaces. Exposure to Layer 2, Layer 3 networking, QoS. Knowledge of common malware/botnet exploits and how they are targeted to exploit embedded systems. Operating system configuration of Windows, Linux, Android, and iOS. Computer boot process including boot loaders. Preference given to other practical skills such as functional analysis, memory image capture, static memory analysis, and data element extraction. Use of GitLab for issue management; tool usage experience preferred.

#J-18808-Ljbffr

Recent Jobs

London (On site) · Full time

Are you a smart, driven professional who takes pride in making a difference in local communities? Turner & Townsend’s Real Estate division is experiencing significant growth and we’re looking for an experienced industry professional with health project experience to join our high-performing and collaborative Project Management team. Why Join Us? Impactful Work: Contribute to social [...]Read More... from Assistant Project Manager – Healthcare See details

Chasetown (On site) · Full time

My client, Autosmart International are a manufacturing success story! Site Operations Manager – leading fast-paced manufacturing and warehousing About Our Client Autosmart International is a manufacturing success story, leading the field in vehicle cleaning products. We are the No.1 choice of automotive trade customers across the UK. We have doubled in size in the last [...]Read More... from Site Operations Manager See details

London (On site) · Full time

CSS are looking for an experienced duty officer to join our client’s team who are a local council responsible for all areas within the Tendering district. Working hours: All shifts are 8 hours long with various start times available: Monday to Friday – start times between 6AM – 3PM Saturday & Sunday – 6AM – [...]Read More... from Duty Officer See details