Listing Description
Qualifications:
•Associate's or Bachelor's degree with a preference in a science, technology, engineering, or math related field or equivalent work experience (6 years of experience equates to an Associate’s degree when defining “equivalent work experience”)
•3+ years of relevant security consulting or industry experience
•Familiarization with XSS, filter bypassing, SQL Injection, etc.
•Familiarity with common reconnaissance, exploitation, and post exploitation frameworks
•Familiarity with assessment tools, such as scanners, administrative utilities, local proxies, debuggers, fuzzers, etc.
•Ability to perform targeted penetration tests and exploitations without the use of automated tools
•Able to conduct Penetration Tests and Vulnerability Analysis using Automated and Manual TTPs
•Strong familiarity with OWASP Top 10
Additional preferred technical experience:
•OSCP, GPEN, OSCE, GXPN or equivalent penetration testing certification is preferred.
•Deep understanding of cyber security concepts and the ability to device and execute appropriate solutions
•Knowledge of application reverse engineering techniques and procedures
•Have a solid working experience and knowledge of Window and Unix / Linux
•Experience with scripting (Windows or Linux), Bash Python, Perl, or Ruby
Keys to success in this position:
•Analytical with strong problem-solving skills and exercises, balanced decision making
•Ability to write clearly, succinctly, and in a manner that appeals to a wide audience
•Able to handle change in priorities
•Have a passion for variety in their job
•Be a life-long learner to advance their technical skillset
Employee Referral:
Click on "Email to a Friend" to notify a friend or family member of this opportunity.
Learn more about our company!:
As a member of Principal’s global IT community, you are part of a high-performing culture that promotes employee empowerment, innovation, collaboration, and career development while fostering flexibility between professional and personal responsibilities. The work you do while partnering closely with the business puts our customers’ needs first by shaping the financial security of millions of lives across the globe!
Principal was #18 on Computerworld’s list of 100 Best Places to Work in IT 2017 making it 16 years in a row on the list! Click the link to read all about it.
Visa Sponsorship:
This position is not eligible for sponsorship for work authorization by Principal. Therefore, if you will require sponsorship for work authorization now or in the future, we cannot consider your application at this time.
Job Level:
Willing to consider qualified applicants at multiple job levels.
AAEEO:
Principal is an Affirmative Action and Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to age, race, color, religion, sex, gender identity, gender expression, pregnancy, national origin, citizenship status, disability, genetic characteristics, sexual orientation, marital status, domestic partner status, military status, protected veteran status, disability status or any other characteristic protected by law.
Interview Details:
What’s next? Innovation at its finest.
We’ll review your application and if you’re selected for an interview, you’ll receive an invite for an On-Demand Video interview. Haven’t done that before, don’t worry. We’ve got all the tips and tricks available to help you be successful. With an On-Demand Video Interview, you can add your own flair and personality – at your pace.
Be sure to check your email frequently. We’ll communicate our decisions through the email address used on your online profile. If you receive an email from Principal Talent Team, you’ve been selected to begin your video interview and have a set time to submit once you log in.•Perform Penetration Tests and Vulnerability Analysis on web applications, mobile applications, thick clients, and embedded devices.
•Adequately explain, present, demonstrate [when applicable], and document the operational impact of a vulnerability.
•Research and maintain proficiency in tools, techniques, countermeasures, trends in vulnerabilities, and other security topics.
•Analyze business impact and exposure based on emerging security threats, vulnerabilities, risks and help to adjust our overall security strategy accordingly.
•Perform technical security assessments as well as develop technical solutions to help mitigate security vulnerabilities.
•Stay up to date and be an active participate in the overall cyber security industry.
Listing Details
- Citizenship: Us Citizen
- Incentives: Not Provided
- Education: Associates Degree
- Travel: No Travel
- Telework: Optional Telecommute