*Penetration Testers**: | Marietta, GA* *6 months *
*Must be GC or USC* *Rate: $55/-hr c2c* *Interviews: 1st round phone, 2nd round phone or Skype if not local* *Job Description:* Notes from manager: -experience exploiting systems, and generating reports from that exploit -good question to ask with exploit: What would you do after you exploit? -Linux experience is a must! Kali Linux is highly preferred! -must know Pen. Testing methodologies! -well-rounded Sec. Eng. -know how to script - Pearl, Bash, Python -WiFi, Malware - knows what it is and what it looks like Security Engineer II will have broad areas of responsibility including network and system audit, penetration testing, vulnerability scanning and mapping, exploit research and reporting, providing governance role for Vulnerability Management Services and metric reporting. Requires extensive knowledge of how to exploit and undermine system and software weakness and areas of vulnerability without disrupting vital business systems and processes. Job Specific Responsibilities • Performance of penetration testing in a large financial ecommerce environment. • Work with security and network architects on design and infrastructure decisions. Assisting in development of Proof of Concepts with a focus on risk, compliance, and availability. • Serve as an escalation point for the team and may direct or serve as a mentor to less experienced staff and peer groups. • Experience performing penetration testing and/or vulnerability scanning in production environments. • Perform research to identify and understand exploits, vulnerabilities and threats. • Execute exploitation testing using commercial, open source or custom tools. • Document and present findings. • Interface with application developers, administrators, management, etc. to ensure security controls are implemented. • Maintains, updates and tests security standards and procedures for use by internal customers. • Act as a consultant to systems owners for remediation of identified vulnerabilities. Candidate Requirements • Experience in reconnaissance (network & system), weaponization, exploitation, and lateral movement (post exploitation activities), wifi, malware, packet analysis, reverse engineering • Individuals are expected to translate the above experiences/skills into goal oriented assessments that positively benefit the security of an organization as a whole • Ability to prioritize and re-prioritize tasks in a rapidly changing environment. • Strong written and verbal communication skills and a solid understanding of IT Security concepts to include security operations. • Knowledge of network protocols, data flows and vulnerabilities. • Knowledge of PCI and other industry compliance standards • Able to work with other team members and groups, work with competing priorities, and possess strong customer focus. • Knowledge of penetration testing methodologies and techniques • Experience with programming languages, such as C++, Perl, and Python • Ability to work independently and complete required tasks with minimum supervision. • Ability to maintain and improve skills through both structured training and independent research. • Skilled experience with major operating systems, such as Windows, UNIX, Linux OS including administration and security. • 5-10 years’ experience with significant job responsibilities tied to IT security and/or securing IT environments/infrastructure *Garima Gupta | Technical Recruiter | Apetan Consulting LLC* *Tel: 201-620-9700* <201-620-9700*> 133 | gar...@apetan.com <gar...@apetan.com> * | garimaapetan...@gmail.com -- You received this message because you are subscribed to the Google Groups "SAP BASIS" group. To unsubscribe from this group and stop receiving emails from it, send an email to sap-basis+unsubscr...@googlegroups.com. To post to this group, send email to sap-basis@googlegroups.com. Visit this group at https://groups.google.com/group/sap-basis. For more options, visit https://groups.google.com/d/optout.