Need a highly technical security individual for Chicago.  Someone to 
execute client's information security risk assessment process for new IT 
infrastructure development projects and existing production systems and 
applications on a continuous basis (includes penetration testing and 
vulnerability research verions of the risk assessment process).  Develop 
quality software code to exploit specfic security vulnerabilities in 
network protocols, operating systems, applications, and COTS 
hardware/software components. Conduct security source code reviews of 
commercial and custom built applications.

These are the types of questions you will need to be able to answer:
              cross-site scripting and the dangers
              source routing
              what were the difference in Interrupts for Linux and
              Windows in writing shell code (smash the stack for
              fun and profit)
              Need someone who can write bufferoverlfows and shell code

If you are interested, please send a word-formatted copy of your resume to 
[EMAIL PROTECTED]

Reply via email to