This Job Vacancy has Expired!

Penetration Tester

Posted on Mar 12, 2019 by MCG - Midwest Consulting Group

Coppell, TX 75019
Information Technology
1 Mar 2019
Annual Salary

Duration: 6+ Month contract to hire

Number of Positions: 1

Years of experience: 10+ and 6+ in Cyber security

Job Description:

The Application Penetration Tester is responsible for validating that application services are designed and implemented with high security standards. The role analyzes the security of applications in Tandem with their underlying services, including connected dependencies such as middle-tier systems and databases. Additionally, the application security engineer addresses Legacy and emerging security issues and implements repeatable secure development practices to reduce the introduction of program design flaws that may lead to exploitation. As issues are uncovered, the application security engineer communicates with the appropriate technical and leadership teams to ensure a focus on risk mitigation - allowing for business continuity, but without negligent risk. Application security engineers are constantly assessing applications for weaknesses and finding resolutions before they can be abused.

This position is also responsible for assessing the security of applications for business-to-business initiatives, third-party relationships, outsourced solutions and vendors. Considered a highly knowledgeable individual, the application security engineer is expected to recommend programmatic controls and monitor and manage secure development practices to address modern day issues. Application security engineers think like attackers, but always acts with integrity and do not abuse their privilege.

Essential Job Duties

  • Perform vulnerability and penetration testing.
  • Document security findings with reasonable methods to secure.
  • Focus on automation to aid in efficiencies with both testing and remediation of findings.
  • Work in Tandem with developers to provide repetitive validation testing prior to production while allowing for a continuous cycle of development followed by application security assessments.
  • Regularly monitor the security community for public-facing security issues, as well as to learn new tactics that can be used in testing.
  • Attend and participate in application projects and change management committees. This includes interacting with business units and technical teams to understand what is coming and how their projects can be more secure from the beginning.
  • Fully define and follow a security review process to ensure an automated and repeatable process is managed. This can be through the use of dynamic and static code analysis resources.
  • Use security standards and implementation configurations, as well as common
  • security frameworks.
  • Prepare for and manage bug bounty programs.
  • Document delivery and implementation advances that meet defined service-level agreements
  • (SLAs) and business metrics.
  • Align with architects and development teams for a mission of secure design.
  • Train developers and junior application security engineers on weaknesses to avoid.
  • Actively participate and lead security team meetings that facilitate secure design.
  • Highly engage in information security projects that evaluate existing security infrastructure and propose changes as defined by security leadership and architects. Additionally, deliver projects on time, within budget and in accordance with SLAs.
  • Focus on application security that observes compliance - Health Information Portability and Accountability Act (HIPAA), Gramm-Leach-Bliley Act (GLBA), Payment Card Industry (PCI), Sarbanes-Oxley Act (SOX), etc. - and privacy laws.
  • Work in Tandem with architects, the security operations center (SOC), incident responders (when anomalous activity and host compromise occurs), and technology infrastructure and development team members.
  • Respond to and handle service and escalation tickets within SLA expectations.
  • Develop security test plans from architectural design. Identify deficiencies and make enhancements to ensure production is not impacted.
  • Drive security efficiencies, enabling security team members to work on more advanced tasks.
  • Conduct performance testing to stress the limitations of security solutions while ensuring business innovation and day-to-day processes are not negatively impacted.
  • Perform other duties as assigned.

Job Requirements

  • 6+ years' experience in cybersecurity, including compliance and risk management with a system and network security engineering background.
  • Highly technical and analytical experience, with a proven deep background (preferred 5+ years' in addition to cybersecurity) in application programming.
  • Experience in threat modelling applications.
  • Vulnerability and penetration-testing skills.
  • Excellence in communicating business risk from cybersecurity issues.
  • Proficiency in software development (Java, Python, C++, Ruby,.NET, etc.).
  • Solid understanding of network and web protocols.
  • Experience with security of intra-company and third-party APIs.
  • Extensive knowledge of SSO, MFA, Active Directory (AD), public key infrastructure (PKI), privileged accounts and integration application program interface (API) capabilities.
  • Experience with dynamic and static analysis tools.
  • Track record of acting with integrity, taking pride in work, seeking to excel, being curious and adaptable, and communicating effectively.

Additional Qualifications

  • Experience with applications hosted in Amazon Web Services (AWS) or Microsoft Azure.
  • Experience with cryptography controls and measures to secure applications and data. Proficiency with Scripting in Python, JavaScript, PowerShell, PHP or Ruby.
  • DevOps background in public and private clouds.
  • Experience with one or more of the following: ISO 27001, NIST, PCI Data Security Standard (PCI DSS), HIPAA, Health Information Technology for Economic and Clinical Health (HITECH) Act, SOX, the General Data Protection Regulation (GDPR), Center for Internet Security (CIS) standards or Service Organization Controls (SOC) 2.
  • Working knowledge of Windows, Linux and Unix.
  • Familiarity with state privacy laws.
  • Highly trustworthy; leads by example.

Education Requirements:

  • Bachelor's degree in computer science, information assurance, MIS or related field, or equivalent.

Certification Requirements:

  • SANS certifications (GWAPT) and others; CISSP (preferred, or CSSLP), OSCP (and related).

Reference: 668162198

Similar Jobs

Lead Security Operations Center Analyst/SIEM

Charlotte, NC

Request Technology - Craig Johnson