Product Security Engineer (Penetration Testing)
Westerville, OH, United States
Vertiv
Vertiv ist weltweit führend in der Entwicklung, dem Bau und der Wartung kritischer Infrastrukturen, die essenzielle Anwendungen für Rechenzentren, Kommunikationsnetze sowie kommerzielle und industrielle Einrichtungen ermöglichen.POSITION SUMMARY
The Product Security Engineer (Penetration Testing) is responsible for conducting security pen testing, monitoring, and auditing within a dynamic global organization. The products under test will have a range of possibilities from embedded devices to cloud services. Some of the products will be white box tests while others will be total black box engagements. A successful engineer will be able to take the product and evaluate the weak points in the design and implementation and focus in on those weaknesses to find security gaps under the guidance of senior engineers and testing leads. The engineer should clearly document the findings, analysis and prepare a detailed report.
Responsibilities:
In addition to performing internal application and product security assessments, the Penetration Tester will be expected to support on following major duties:
- Conduct security evaluation and threat assessments of embedded systems, mobile applications, web applications
- Conduct research for the purposes of finding new vulnerabilities and enhancing existing capabilities
- Circumventing security protection methods and techniques
- Performing data bus monitoring (snooping) and data injection
- Conduct communications protocol analysis in the embedded products, and applications
- Conduct wireless communications channel snooping, and data injection
- Learn to reverse engineering complex systems and protocols
- Create detailed technical reports and proof of concept code to document findings
- Perform System Breakdown of the project/product before testing, identify and evaluate all the testing requirements and plan out the detailed testing activities, resources etc. with the help of Senior/Lead test engineers
- Provide proactive detailed interaction with respective engineering group on the testing needs, testing progress/status and provide detailed analysis report
Requirements:
- Bachelor’s Degree in Information Technology, Computer Science or related field is highly desirable.
- Advanced security qualifications such as OSCP (Offensive Security Certified Professional) certification, CEH (Certified Ethical Hacker) or equivalent.
- Five or more years (5+ years) of experience in information, application, or embedded product security and/or IT risk management.
- Two or more years (2+ years) of pentesting experience with a strong interest / personal experience in pentesting (CTF, HacktheBox, etc.)
- Solid understanding of security protocols, cryptography, authentication, authorization, and security
- Good working knowledge of current IT risks and experience implementing security solutions
- Ability to interact with a broad cross-section of personnel to articulate and enforce security measures
- Excellent written and verbal communication skills as well as business acumen
- Strong ability to establish partnerships and influence change and achieve results within dynamic environment
- Meaningful technical contributions into the development lifecycle of an application, product, or service
- Preferred Experience:
- Understanding and development experience of embedded systems / software, and web-based applications
- Linux network device driver/data-path performance exposure
- Familiarity with compilers, debuggers, disassemblers, and other low-level development and analysis tools
- Exposure to binary analysis tools such as IDA Pro, WinDbg, BinWalk, Valgrind, PIN, Panda and S2E
- Working knowledge of hacking tools and techniques such as memory corruption exploits, rootkits, protocol poisoning, browser-based attacks, DNS poisoning, MetaSploit, nmap, Nessus, etc.
- An understanding of common cryptographic algorithms and protocols including their weaknesses and attacks against them
- Understanding of network protocols and experience developing packet-level programs
- Understanding of common microcontroller programming tools and debugging interfaces
- Exposure to Layer 2, Layer 3 networking, QoS
- Knowledge of common malware/botnet exploits and how they are targeted to exploit embedded systems
- Operating system configuration of Windows, Linux, Android, and iOS
- Computer boot process including boot loaders
- Preference given to other practical skills such as: functional analysis, memory image capture, static memory analysis, and data element extraction, etc.
- Use of Gitlab for issue management, tool usage experience preferred
The successful candidate will embrace Vertiv’s Core Principals & Behaviors to help execute our Strategic Priorities.
OUR CORE PRINCIPALS: Safety. Integrity. Respect. Teamwork. Diversity & Inclusion.
OUR STRATEGIC PRIORITIES
• Customer Focus
• Operational Excellence
• High-Performance Culture
• Innovation
• Financial Strength
OUR BEHAVIORS
• Own It
• Act With Urgency
• Foster a Customer-First Mindset
• Think Big and Execute
• Lead by Example
• Drive Continuous Improvement
• Learn and Seek Out Development
About Vertiv
Vertiv is a $6.8 billion global critical infrastructure and data center technology company. We ensure customers’ vital applications run continuously by bringing together hardware, software, analytics and ongoing services. Our portfolio includes power, cooling and IT infrastructure solutions and services that extends from the cloud to the edge of the network. Headquartered in Columbus, Ohio, USA, Vertiv employs around 20,000 people and does business in more than 130 countries. Visit Vertiv.com to learn more.
Work Authorization
No calls or agencies please. Vertiv will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas such as E, F-1, H-1, H-2, L, B, J, or TN or who need sponsorship for work authorization now or in the future, are not eligible for hire.
Equal Opportunity Employer
Vertiv is an Equal Opportunity/Affirmative Action employer. We promote equal opportunities for all with respect to hiring, terms of employment, mobility, training, compensation, and occupational health, without discrimination as to age, race, color, religion, creed, sex, pregnancy status (including childbirth, breastfeeding, or related medical conditions), marital status, sexual orientation, gender identity / expression (including transgender status or sexual stereotypes), genetic information, citizenship status, national origin, protected veteran status, political affiliation, or disability. If you have a disability and are having difficulty accessing or using this website to apply for a position, you can request help by sending an email to help.join@vertiv.com.
* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰
Tags: Analytics Android Audits Black box CEH Cloud Compilers Computer Science Cryptography CTF DNS Exploit Exploits GitLab IDA Pro iOS IT infrastructure Linux Malware Metasploit Monitoring Nessus Nmap Offensive security OSCP Pentesting Product security Reverse engineering Risk management Security assessment Vulnerabilities White box WinDbg Windows
Perks/benefits: Career development
More jobs like this
Explore more career opportunities
Find even more open roles below ordered by popularity of job title or skills/products/technologies used.