Overview The Security Vulnerability and Penetration Testing Engineer will oversee and serve as a technical resource for all assessment activities related to the security posture of existing and proposed firm systems, platforms, and processes to protect and continually improve the confidentiality, integrity, and availability of information systems per the firm\'s business objectives, regulatory requirements, and strategic goals. Responsibilities Perform security penetration testing of the Firm’s systems, platforms, and applications Serve as a Subject Matter Expert (SME) for the VAPT function Serve as the system owner for common VAPT toolsets, platforms, and processes Provide technical assessment reports that are easily understandable by the target audience and include practical and reasonable recommendations based upon sound risk management principles Qualifications and Skills A Computer Science bachelor’s degree or substantially equivalent experience CISSP is required GIAC GPEN or GWAPT is preferred Offensive Security OSCP is required Commanding knowledge of VAPT concepts and best practices, including the requirements for WhiteHat/ethical hacking Expert understanding of the difference between a vulnerability assessment and a penetration test in the context of assessment scope, objectives, and deliverables Extensive experience with common automated VAPT tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave Expert in common attack tools and frameworks such as Wireshark, Kali, Metasploit, etc. Expert in mobile platform security technology, including vulnerability identification and exploitation tools, as well as mobile platform security best practices, frameworks, etc. Understand VAPT in the context of risk management and organizational priorities Passionate in the practice and pursuit of VAPT excellence Able to validate the presence of identified vulnerabilities with accuracy Authoritative mastery of OWASP, CVE, general security controls, and other foundational topics, such as the latest application and operating system exploits Expert knowledge of common scripting and programming languages is advantageous Ongoing commitment to understanding the threat landscape and common adversary motivations/practices. Ability to quickly adapt practices to evolving circumstances Able to maintain critical thinking and composure under pressure Strong written and oral communication skills. Ability to convey complex concepts to non-technical constituents. Proficiency in oral and written English Capable of assisting with the preparation of internal training materials and documentation Location Belfast, Manila, or Tampa Centers, or the Chicago office Reports to Director, Security Engineering Travel requirements Ad hoc travel will be required. Position details Position Type: Center Development Framework: Business Support Seniority level Associate Employment type Full-time Job function Information Technology Industries Law Practice #J-18808-Ljbffr Baker McKenzie
...ATSS has a client in Calvert, AL looking for an Inspection Systems Engineer. The ideal candidate will ensure the startup and continual... ...s degree in engineering Metallurgy, Material Science, Electrical Engineer, or IT Information Systems focus required Minimum...
...Nationwide, U.S.) Schedule: Flexible/Set your own hours Compensation: Competitive, based on specialty and experience As a Telehealth Nurse Practitioner with YSP, you will deliver comprehensive virtual care to patients across the U.S. in your area of specialty. You...
Job Opportunity: Remote Customer Service Position Our company has moved to 100% virtual, work-from-home positions. This role offers the opportunity to earn an excellent income while maintaining a healthy work-life balance. You will have the flexibility to choose your working...
...*: Full-time *Salary:* Salary: $84,000.00 - $95,000.00 per year DOQ plus benefits. *Benefits*: Dental insurance Health insurance Life insurance Vision insurance Retirement Accounts *Work Location*: Montrose, Delta, Gunnison, San Miguel...
...Lead the evaluation, design, and implementation of application security technologies, ensuring integration with CI/CD pipelines for automated... ...Computer Science, Information Technology, Information Systems, Cyber or Technical Engineering, or a related field, and 7 years of...