Offensive Security Consultant candidates are motivated offensive security professionals, often with 2-5 years of pen testing experience not counting previous IT experience. The primary role of an Offensive Security Consultant is to perform External Network Penetration Tests as well as Application Penetration Tests against web applications, mobile applications, and web services. Security Consultants are expected to execute the appropriate testing methodology, identify risk at a level commensurate with the company bar, perform punctually, clearly document findings for multiple audiences, and demonstrate outstanding customer service skills.
Responsibilities
* Deliver Application Penetration Tests against web apps, mobile apps, web services, and fat-clients.
* Security Consultants who have proven adept at application penetration testing will perform small to medium-sized Network Penetration Tests.
* Communicate with customers in a friendly manner, quickly and clearly, and with great accuracy during:
* Kickoff and scoping calls
* Assessment status updates and ongoing project communication
* Non-Billable events such as lunches, conferences, and meetups.
* Work towards professional-level certs such as the OSCP if they have not already been achieved.
* Assist in enhancing various company methodologies and other documentation.
* Work with project management to enhance the company’s overall efficiency.
* Assist peers in identifying / exploiting issues during assessments.
* Demonstrate excellent writing skills both during email correspondence and report creation.
* Prioritize findings based on perceived risk, using existing knowledge of clients’ business to ascertain finding severity.
* Lead by example in behavior, work ethic, and punctuality.
* Interpret and obey any applicable customer testing restrictions based on scope and kickoff calls.
* Utilize non-billable time to work on company-directed internal projects.
* Develop and own an area of expertise e.g. web services, SQL injection killer, mobile apps, Powershell, reporting god, Java, XXE skills, etc.
* Contribute to company methodology and vulnerability repositories.
Qualifications
* 2+ years’ full-time penetration testing experience.
* Full familiarity with OWASP top 10, SANS top 25.
* Applicants with common industry certifications such as OSCP, OSCE, SANS, CREST, etc. will be preferred.
* Applicants with a public disclosure track record will be preferred.
* Excellent communication skills in written, verbal, and in-person formats.
* High-level knowledge of common platforms and their vulnerabilities.
* Ability to configure working login macros.
* Use Repeater and Intruder to manually find flaws.
* Use Scanner in an appropriate manner to automatically find flaws.
* Quickly eliminate false positives based on intuition and response content.
* Research: Search for flaws in fingerprinted services / components, find exploits in vulnerable fingerprinted services / components, use existing research to craft proof of concepts for assessments, and ability to alter existing exploits so they apply to different assessment targets.
#J-18808-Ljbffr