::Security Engineer :::Hybrid / on site in Auburn Hills, MI OR Plano, TX::9+ months at Auburn, Indiana, USA |
Email: [email protected] |
http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=640991&uid= Hi Please find the requirement below, if you find yourself comfortable with the requirement please reply back with your updated resume and I will get back to you or I would really appreciate if you can give me a call back at my contact number 571-371-0777 Position:: Security Engineer Location:: Hybrid / on site in Auburn Hills, MI OR Plano, TX Duration:: 9+ months Interview Mode :: Phone and Skyp e Visa : No H1B/CPT/OPT Offensive Cyber Security Engineer The Offensive Security Engineer roams the information environment, emulating adversary tactics, techniques, and procedures. Conducts scheduled penetration tests against corporate assets, builds and executes proof-of-concept exploits and continuously probes for weaknesses. This role requires deep knowledge of attack vectors, exploits, network protocols, and common mistakes. Primarily works with commercial, open source, and custom tooling to demonstrate how an adversary's actions can impact business operations. Guides and mentor's other contributors to red team positions. Leads development of new attack and reporting tools. Works closely with Hunt and SOC disciplines to hone detections. Required Skills & Experience: Identifies threat vectors unique to the cyber-attack surface. Requires deep knowledge of attack vectors, exploits, network protocols, and common mistakes Experience emulating adversary tactics, techniques, and procedures Conducting penetration tests against corporate assets Building and executing proof-of-concept exploits Experience with Hunt and SOC disciplines to hone detections Experience with Cloud, Embedded, Linux, Physical, Windows devices Adversary emulation: Identifies weaknesses with high impact or probability of use. Illustrates how an adversary will interact, and the impacts of those interactions. Illustrates how an adversary will take advantage of company resources to use them against us. Participation in purple team events. Continuous improvement of tooling to evade detections. Conducts penetration tests against web applications. Exploits vulnerabilities in Cloud, Embedded, Linux, Physical, or Windows devices. Exploit Execution and Development: Customizes exploit code for known and emerging exploits (SR -- novel) Conducts emerging threat and threat landscape research. Conducts expert malware reversal and research . Company Expert Penetration Testing Provides expert guidance on how penetration testing can solve problems. Work closely with partners in Cyber and Technology to solve problems. Serves as the escalation point for cyber incidents, events, and malware research. Identifies threat vectors unique to the cyber-attack surface. Planning and Organizing Identifies & evaluates projects, products, and solutions to enhance threat detection and other capabilities. Provides expert guidance on highly complex, large projects to incorporate cyber and fraud detection capabilities and considerations. Participates in industry working and information sharing groups. Administration Keeps management informed of status of threats, the threat landscape, and current incidents and events through appropriate reporting. Actively participates on committees representing Cybersecurity. Keeps abreast of leading-edge technologies in the threat detection space . egards Vishwajeet Singh Technical Recruiter Email: [email protected] Direct: 571-371-0777 * 240 Linkedin::: https://www.linkedin.com/in/vishwajeet-singh-82948488/ RIT Solutions, Inc. Address: 4201 Wilson Blvd. Suite 300, Arlington, VA 22203 Experts in Recruitment and IT Solutions Linkedin Page: https://www.linkedin.com/company/rit-solutions-inc/viewAsMember=true Twitter: @RITSolutionsInc To apply to our open jobs please click on link below Jobdiva Job Portal: https://www1.jobdiva.com/candidates/myjobs/searchjobsdone.jspa=xbjdnwgjodtga1y1im2g881fkkeiwd0775lbvq8yqgps8vb2q36w2vj1ga6xxork&compid=-1 Escalation Queries for urgent attention: [email protected] Note: We respect your Online Privacy. This is not an unsolicited mail. This mail cannot be considered Spam as long as we include Contact information and a method to be removed from our mailing list. If you are not interested in receiving our e-mails then please reply with a " REMOVE " in the subject to [email protected] and escalation query mail id mentioned above. Mention all the e-mail addresses to be removed with any e-mail addresses, which might be diverting the e-mail to you. Keywords: information technology Idaho Michigan Texas Virginia http://bit.ly/4ey8w48 https://jobs.nvoids.com/job_details.jsp?id=640991&uid= |
[email protected] View All |
10:55 PM 14-Sep-23 |