Penetration testing @Charlotte, NC

Role: Penetration testing

Location: Candidates can sit in either one of the follow locations:

*                     Charlotte, NC

*                     Winston-Salem, NC

*                     Minneapolis, MN

*                     Phoenix, AZ

*                     San Fran, CA

Duration: 12 – 18 month Contract

Must have the following:

*                     5 years of experience with BOTH manual and automated
penetration testing of web applications

*                     Burpsuite pro, IBM Appscan, HP Webinspect, Zap, and/or
Fiddler experience

Day-to-Day:

*                     5+ years of experience in security applications and
systems

*                     Minimum of 5 years of Information Security
Engineer/Consultant experience with application penetration testing.

*                     Minimum of 5 years of demonstrated experience with
automated penetration tools

*                     Minimum of 5 years of demonstrated experience with
manual penetration testing tools

*                     Demonstrated experience with creating and
communication of reports regarding web application vulnerabilities to
various level of personnel within a large organization

DESIRED QUALIFICATIONS

*                     Advanced Information Security technical skills

*                     Ability to manage complex issues and develop solutions

*                     Excellent verbal and written communication skills

*                     Knowledge and understanding of application or software
security such as: web application penetration testing, secure code review,
secure static code analysis

*                     Knowledge and understanding of banking or financial
services industry

*                     Experience working in a large enterprise environment

*                     Strong analytical skills with high attention to detail
and accuracy

*                     Knowledge and understanding of information security
industry standards and government regulations

*                     Ability to manage multiple and competing priorities

*                     Ability to work with limited supervision

*                     Ability to take on a high level of responsibility,
initiative, and accountability

*                     Good attention to detail and accuracy skills

*                     Strong collaboration and partnering skills

*                     Demonstrated experience developing and reviewing
malicious use cases/threat models

source

Leave a Comment

Your email address will not be published. Required fields are marked *