Engineer Pentesting

Cluj Napoca, Romania

Vertiv

Vertiv ist weltweit führend in der Entwicklung, dem Bau und der Wartung kritischer Infrastrukturen, die essenzielle Anwendungen für Rechenzentren, Kommunikationsnetze sowie kommerzielle und industrielle Einrichtungen ermöglichen.

View all jobs at Vertiv

Apply now Apply later

Who are we?

At Vertiv, we’re on a mission to empower the people that will power the future. From a simple swipe to life-changing medicines, from push notifications to generative AI. We design, manufacture, and service the products and solutions that keep the world connected.  With $5 billion in sales, a strong customer base and global reach spanning nearly 70 countries, we are uniquely positioned to deliver greater value to our customers and create new opportunities for our people.

The Application and Product Security Engineer (Penetration Testing) is responsible for conducting security pen testing, monitoring, and auditing within a dynamic global organization. The products under test will have a range of possibilities from embedded devices to cloud services. Some of the products will be white box tests while others will be total black box engagements. 

A successful engineer will be able to take the product and evaluate the weak points in the design and implementation and focus in on those weaknesses to find security gaps under the guidance of senior engineers and testing leads. The engineer should clearly document the findings, analysis and prepare a detailed report.

 

What Would Be the Perfect Qualifications?

In addition to performing internal application and product security assessments, the Penetration Tester will be expected to support on following major duties: 

  • Conduct security evaluation and threat assessments of embedded systems, mobile applications, web applications
  • Conduct research for the purposes of finding new vulnerabilities and enhancing existing capabilities
  • Circumventing security protection methods and techniques
  • Performing data bus monitoring (snooping) and data injection
  • Conduct communications protocol analysis in the embedded products, and applications
  • Conduct wireless communications channel snooping, and data injection
  • Learn to reverse engineering complex systems and protocols
  • Create detailed technical reports and proof of concept code to document findings
  • Perform System Breakdown of the project/product before testing, identify and evaluate all the testing requirements and plan out the detailed testing activities, resources etc. with the help of Senior/Lead test engineers
  • Provide proactive detailed interaction with respective engineering group on the testing needs, testing progress/status and provide detailed analysis report

 

What kind of work will you be doing?

  • Bachelor’s Degree in Information Technology, Computer Science or related field is highly desirable. 
  • Advanced security qualifications such as OSCP (Offensive Security Certified Professional) certification, CEH (Certified Ethical Hacker) or equivalent.
  • Five or more years (5+ years) of experience in information, application, or embedded product security and/or IT risk management.
  • Two or more years (2+ years) of pentesting experience with a strong interest / personal experience in pentesting (CTF, HacktheBox, etc.)
  • Solid understanding of security protocols, cryptography, authentication, authorization, and security
  • Good working knowledge of current IT risks and experience implementing security solutions
  • Ability to interact with a broad cross-section of personnel to articulate and enforce security measures
  • Excellent written and verbal communication skills as well as business acumen
  • Strong ability to establish partnerships and influence change and achieve results within dynamic environment
  • Meaningful technical contributions into the development lifecycle of an application, product, or service

How Does Your Ideal Experience Look?

  • Understanding and development experience of embedded systems / software, and web-based applications
  • Linux network device driver/data-path performance exposure
  • Familiarity with compilers, debuggers, disassemblers, and other low-level development and analysis tools
  • Exposure to binary analysis tools such as IDA Pro, WinDbg, BinWalk, Valgrind, PIN, Panda and S2E
  • Working knowledge of hacking tools and techniques such as memory corruption exploits, rootkits, protocol poisoning, browser-based attacks, DNS poisoning, MetaSploit, nmap, Nessus, etc.
  • An understanding of common cryptographic algorithms and protocols including their weaknesses and attacks against them
  • Understanding of network protocols and experience developing packet-level programs
  • Understanding of common microcontroller programming tools and debugging interfaces
  • Exposure to Layer 2, Layer 3 networking, QoS
  • Knowledge of common malware/botnet exploits and how they are targeted to exploit embedded systems
  • Operating system configuration of Windows, Linux, Android, and iOS
  • Computer boot process including boot loaders
  • Preference given to other practical skills such as: functional analysis, memory image capture, static memory analysis, and data element extraction, etc.
  • Use of Gitlab for issue management, tool usage experience preferred.

The successful candidate will embrace Vertiv’s Core Principals & Behaviors to help execute our Strategic Priorities. 

OUR CORE PRINCIPALS:  Safety.  Integrity. Respect.  Teamwork. Diversity & Inclusion.

 

OUR STRATEGIC PRIORITIES

 

•        Customer Focus

•        Operational Excellence

•        High-Performance Culture

•        Innovation

•        Financial Strength

 

OUR BEHAVIORS

 

•        Own It

•        Act With Urgency

•        Foster a Customer-First Mindset

•        Think Big and Execute

•        Lead by Example

•        Drive Continuous Improvement

•        Learn and Seek Out Development

 

Vertiv is an Equal Opportunity/Affirmative Action employer. We promote equal opportunities for all with respect to hiring, terms of employment, mobility, training, compensation, and occupational health, without discrimination as to age, race, color, religion, creed, sex, pregnancy status (including childbirth, breastfeeding, or related medical conditions), marital status, sexual orientation, gender identity / expression (including transgender status or sexual stereotypes), genetic information, citizenship status, national origin, protected veteran status, political affiliation, or disability. If you have a disability and are having difficulty accessing or using this website to apply for a position, you can request help by sending an email to help.join@vertivco.com. If you are interested in applying or learning more about this role, please visit the company’s career page located on Vertiv.com/Careers.

🚀 Don't miss out on this exciting opportunity to be part of our dynamic team! Apply now!

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  2  0

Tags: Android Audits Black box CEH Cloud Compilers Computer Science Cryptography CTF DNS Exploit Exploits Generative AI GitLab IDA Pro iOS Linux Malware Metasploit Monitoring Nessus Nmap Offensive security OSCP Pentesting Product security Reverse engineering Risk management Security assessment Vulnerabilities White box WinDbg Windows

Perks/benefits: Career development

Region: Europe
Country: Romania

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.