Cyber Vulnerability Analyst & Penetration Tester III - US
United States - Remote•United StatesNorth America•March 21, 2023
Designs, develops, implements and troubleshoots various information system (IS) and cyber security software. Develops, tests and validates solutions to remediate exploitable conditions on devices such as web servers, mail servers, routers, firewalls and intrusion detection systems. Evaluates, codes and implements software fixes (patches) to address system vulnerabilities such as malicious code (e.g., viruses), system exploitation using SQL injection, cross-site scripting, buffer overflows, parameter tampering, hidden field manipulation, cookie poisoning and web services manipulation. Conducts security assessments of systems and applications using penetration tests, ethical hacking tools and risk assessment/mediation methodologies to evaluate vulnerabilities.**Python Development Experience** OSCE Certifications** 10+ Years Experience
Knowledge
- Requires in-depth conceptual and practical knowledge in own job discipline and basic knowledge of related job disciplines
- Solves complex problems
- Works independently, receives minimal guidance
- May lead projects or project steps within a broader project or may have accountability for on-going activities or objectives
- Acts as a resource for colleagues with less experience
- Level at which career may stabilize for many years or until retirement
- Strong knowledge of most security concepts, and how they apply to various technologies.
- Strong foundational, or expert-level knowledge, in 2 of the following: System administration, networking, cloud platforms, programming, incident response and threat analysis.
- Serves as technical escalation point for system owner issues, and configuring new, complex systems for automated assessments.
- Interprets and prioritizes vulnerability scan results into remediation actions, and is able to follow through with tracking actions through to completion.
- Performs and recommends tools for performing vulnerability assessments on servers, workstations, web applications, containers, and other components.
- Familiar with vulnerabilities, remediation, and industry-standard classification schemes (CVE and CVSS) and how to prioritize this information for any given system.
- Performs assessments on web applications for common vulnerabilities (OWASP Top 10)
- Regularly performs penetration tests, using basic and intermediate testing using common TTPs across many technologies at an enterprise-level scale.
- Performs vulnerability assessments of systems, devices, and interfaces independently with high severity findings.
- Summarizes and prioritizes findings into reports with standard templates to present to stakeholders. Improves reporting as needed.
- Performs red team mission testing mechanisms, executing the missions from formulation to lessons learned.
- Good understanding of writing automation using common programming or scripting languages such as Python, Bash, PowerShell, or JavaScript to support data collection, organization, and analysis and vulnerability assessments.
- Experience with version control systems such as Git and interacting with REST APIs.
- Familiar with vulnerabilities, remediation, and industry-standard prioritization and classification schemes (CVE, CVSS, vendor criticality and risk scores) and the limitations of each.
- Understands vulnerability criticality and exploitation impact between various kinds of vulnerabilities across various related systems.
- Foundational understanding of the major compliance regulations, such as PCI, HIPAA, HITRUST, or FedRAMP, with a good understanding of some of the controls surrounding vulnerability management
Responsibilities
- Other Incidental tasks related to the job, as necessary.
- Serves as technical escalation point for system owner issues, and configuring new, complex systems for automated assessments.
- Interprets and prioritizes vulnerability scan results into remediation actions, and is able to follow through with tracking actions through to completion.
- Performs and recommends tools for performing vulnerability assessments on servers, workstations, web applications, containers, and other components.
- Familiar with vulnerabilities, remediation, and industry-standard classification schemes (CVE and CVSS) and how to prioritize this information for any given system.
- Performs assessments on web applications for common vulnerabilities (OWASP Top 10)
- Regularly performs penetration tests, using basic and intermediate testing using common TTPs across many technologies at an enterprise-level scale.
- Performs vulnerability assessments of systems, devices, and interfaces independently with high severity findings.
- Summarizes and prioritizes findings into reports with standard templates to present to stakeholders. Improves reporting as needed.
- Performs red team mission testing mechanisms, executing the missions from formulation to lessons learned.
- Good understanding of writing automation using common programming or scripting languages such as Python, Bash, PowerShell, or JavaScript to support data collection, organization, and analysis and vulnerability assessments.
- Experience with version control systems such as Git and interacting with REST APIs.
- Familiar with vulnerabilities, remediation, and industry-standard prioritization and classification schemes (CVE, CVSS, vendor criticality and risk scores) and the limitations of each.
- Understands vulnerability criticality and exploitation impact between various kinds of vulnerabilities across various related systems.