*Penetration Testers**: | Marietta, GA*

*6 months *

*Must be GC or USC*

*Rate: $55/-hr c2c*

*Interviews: 1st round phone, 2nd round phone or Skype if not local*



*Job Description:*



Notes from manager:

-experience exploiting systems, and generating reports from that exploit

-good question to ask with exploit: What would you do after you exploit?

-Linux experience is a must! Kali Linux is highly preferred!

-must know Pen. Testing methodologies!

-well-rounded Sec. Eng.

-know how to script - Pearl, Bash, Python

-WiFi, Malware - knows what it is and what it looks like

Security Engineer II will have broad areas of responsibility including
network and system audit, penetration testing, vulnerability scanning and
mapping, exploit research and reporting, providing governance role for
Vulnerability Management Services and metric reporting. Requires extensive
knowledge of how to exploit and undermine system and software weakness and
areas of vulnerability without disrupting vital business systems and
processes.

Job Specific Responsibilities
•    Performance of penetration testing in a large financial ecommerce
environment.
•    Work with security and network architects on design and infrastructure
decisions. Assisting in development of Proof of Concepts with a focus on
risk, compliance, and availability.
•    Serve as an escalation point for the team and may direct or serve as a
mentor to less experienced staff and peer groups.
•    Experience performing penetration testing and/or vulnerability
scanning in production environments.
•    Perform research to identify and understand exploits, vulnerabilities
and threats.
•    Execute exploitation testing using commercial, open source or custom
tools.
•    Document and present findings.
•    Interface with application developers, administrators, management,
etc. to ensure security controls are implemented.
•    Maintains, updates and tests security standards and procedures for use
by internal customers.
•    Act as a consultant to systems owners for remediation of identified
vulnerabilities.


Candidate Requirements

•    Experience in reconnaissance (network & system), weaponization,
exploitation, and lateral movement (post exploitation activities), wifi,
malware, packet analysis, reverse engineering
•    Individuals are expected to translate the above experiences/skills
into goal oriented assessments that positively benefit the security of an
organization as a whole
•    Ability to prioritize and re-prioritize tasks in a rapidly changing
environment.
•    Strong written and verbal communication skills and a solid
understanding of IT Security concepts to include security operations.
•    Knowledge of network protocols, data flows and vulnerabilities.

•    Knowledge of PCI and other industry compliance standards
•    Able to work with other team members and groups, work with competing
priorities, and possess strong customer focus.
•    Knowledge of penetration testing methodologies and techniques
•    Experience with programming languages, such as C++, Perl, and Python
•    Ability to work independently and complete required tasks with minimum
supervision.
•    Ability to maintain and improve skills through both structured
training and independent research.
•    Skilled experience with major operating systems, such as Windows,
UNIX, Linux OS including administration and security.
•    5-10 years’ experience with significant job responsibilities tied to
IT security and/or securing IT environments/infrastructure



*Garima Gupta | Technical Recruiter | Apetan Consulting LLC*

*Tel: 201-620-9700* <201-620-9700*> 133 |   gar...@apetan.com
<gar...@apetan.com> *

 | garimaapetan...@gmail.com

-- 
You received this message because you are subscribed to the Google Groups "SAP 
Workflow" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-workflow+unsubscr...@googlegroups.com.
To post to this group, send email to sap-workflow@googlegroups.com.
Visit this group at https://groups.google.com/group/sap-workflow.
For more options, visit https://groups.google.com/d/optout.

Reply via email to