What youll be doing...
Verizon Cyber Security Team is looking for a Penetration Tester to join our Application Pen Test team. Youll be joining a group of talented, creative thinkers who "act like the enemy" to focus on ensuring that infrastructure and applications (web, mobile, and API) are secure by performing penetration testing from both inside and outside of Verizon. . This team isnt a "copy and paste from a scan tool" reporting team, or a cookie cutter just scanning with tools team, or a team that just monitors and supports security scanning tools used by developers. This team is an enterprise-recognized and supported group of skilled, experienced and certified ethical hacking Verizon employees who are trusted to direct themselves with a lot of unknowns.
The successful candidate will possess an effective aptitude in thinking like an adversary, security of Web applications, Infrastructure, APIs and Mobile Applications, mentoring and leading junior pen testers and effectively translating highly technical information to internal customers in a way that supports Cyber Security Team and broader Verizon goals.
- The ability to lead and perform full scope penetration testing on complex web applications, Infrastructure, APIs and Mobile applications.
- Configuring and safely utilizing attacker tools, tactics, and procedures for Verizon environments.
- Developing comprehensive and accurate reports and presentations for both technical and executive audiences.
- The ability to make collaborative decisions on the impact of an exposure to Verizon.
- Acting as a SME and guide, advising on security vulnerability impact, ratings and remediation recommendations across the organization as needed.
- Helping define the Pen Test strategy and standards to further enhance the companys security posture.
- Effectively communicating findings and strategy to client stakeholders including technical staff, executive leadership, and legal counsel.
- Working closely with stakeholders and developers providing risk-appropriate and pragmatic recommendations to correct found vulnerabilities.
- Developing scripts, tools, or methodologies to enhance Verizons pen testing processes and effectiveness.
- Driving technical oversight and mentoring junior pen testers on pen test engagements, vulnerability impact and ratings and remediation recommendations.
- Providing leadership and guidance to advance the offensive capabilities of the team and its subsequent ability to defend the Verizon Enterprise.
What were looking for...Youll need to have:
- Bachelor's degree and four or more years of work experience.
- Four or more years of relevant work experience.
- Relevant pen testing or security experience.
- Deep understanding of OWASP Top 10, OWASP API Top 10, MASVS.
Even better if you have one or more of the following:- Strong knowledge of tools used for API, infrastructure, web application, mobile, and network security testing, such as Kali Linux, Metasploit, Wireshark, Burp suite, Cobalt Strike, Nessus, Web Inspect, SQLMap.
- Knowledge of secure software deployment methodologies, tools, and practices.
- Experience with application security risk procedures, security patterns, authentication technologies and security attack pathologies.
- Certifications such as: GXPN, GPEN, eWPT, GCIH, GWAPT, OSCP, OSWA, OSCE, OSWE.
- Service Delivery/Governance: ITILv2/3.
- Solid understanding of common hosting environments such as containerization platforms (e.g., Docker and Kubernetes) and virtual machines running under hypervisors.
- An implementation level familiarity with all common classes of modern exploitation.
- Mastery of Unix/Linux/Mac/Windows operating systems, including bash and Powershell.
- Programming skills preferred and encouraged, as well as the ability to read and assess applications written multiple languages, such as Python, JAVA, .NET, C#, or others.
- Experience with system and application security threats and vulnerabilities and secure configuration management techniques, software debugging principles, software design tools, methods, and techniques, software development models (e.g., Waterfall Model, Spiral Model).
- Knowledge of secure coding techniques.
- Some experience with software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, and simplicity/minimization).
- Knowledge of secure software deployment methodologies, tools, and practices.
- Knowledge in discerning the protection needs (i.e., security controls) of information systems and networks.
Employment Type: Full Time, Permanent
Read full job description