In addition to performing internal application and product security assessments, the Penetration Tester will be expected to support the following major duties: Conduct security evaluation and threat assessments of embedded systems, mobile applications, and web applications. Conduct research for the purposes of finding new vulnerabilities and enhancing existing capabilities. Circumvent security protection methods and techniques. Perform data bus monitoring (snooping) and data injection. Conduct communications protocol analysis in the embedded products and applications. Conduct wireless communications channel snooping and data injection. Learn to reverse engineer complex systems and protocols. Create detailed technical reports and proof of concept code to document findings. Perform System Breakdown of the project/product before testing, identify and evaluate all the testing requirements and plan out the detailed testing activities and resources with the help of Senior/Lead test engineers. Provide proactive detailed interaction with respective engineering groups on the testing needs, testing progress/status, and provide detailed analysis reports. What kind of work will you be doing?
Bachelor’s Degree in Information Technology, Computer Science, or related field is highly desirable. Advanced security qualifications such as OSCP (Offensive Security Certified Professional) certification, CEH (Certified Ethical Hacker), or equivalent. Five or more years (5+ years) of experience in information, application, or embedded product security and/or IT risk management. Two or more years (2+ years) of pentesting experience with a strong interest/personal experience in pentesting (CTF, HacktheBox, etc.). Solid understanding of security protocols, cryptography, authentication, authorization, and security. Good working knowledge of current IT risks and experience implementing security solutions. Ability to interact with a broad cross-section of personnel to articulate and enforce security measures. Excellent written and verbal communication skills as well as business acumen. Strong ability to establish partnerships, influence change, and achieve results within a dynamic environment. Meaningful technical contributions into the development lifecycle of an application, product, or service. How Does Your Ideal Experience Look?
Understanding and development experience of embedded systems/software and web-based applications. Familiarity with compilers, debuggers, disassemblers, and other low-level development and analysis tools. Exposure to binary analysis tools such as IDA Pro, WinDbg, BinWalk, Valgrind, PIN, Panda, and S2E. An understanding of common cryptographic algorithms and protocols including their weaknesses and attacks against them. Understanding of network protocols and experience developing packet-level programs. Understanding of common microcontroller programming tools and debugging interfaces. Exposure to Layer 2, Layer 3 networking, QoS. Knowledge of common malware/botnet exploits and how they are targeted to exploit embedded systems. Operating system configuration of Windows, Linux, Android, and iOS. Computer boot process including boot loaders. Preference given to other practical skills such as functional analysis, memory image capture, static memory analysis, and data element extraction. Use of GitLab for issue management; tool usage experience preferred.
#J-18808-Ljbffr