Expoint - all jobs in one place

Finding the best job has never been easier

Limitless High-tech career opportunities - Expoint

Bank Of America Vice President Manual Ethical Hacker MEH 
Australia, New South Wales, Sydney 
104275595

Today

Job Description:

Job Description:

This intermediate technical role is responsible for performing application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and emerging threats. Key responsibilities include performing research, understanding the bank’s security policies, working with the appropriate partners to complete assessments and simulations, identifying misconfigurations and vulnerabilities, and reporting on associated risk. These individuals partner closely with security partners, CIO clients and multiples lines of business.

Responsibilities:

Key Responsibilities in order of importance:

  • Perform assigned analysis of internal and external threats on information systems and predict future threat behavior
  • Incorporate threat actors' tactics, techniques, and procedures into offensive security testing
  • Perform assessments of the security, effectiveness, and practicality of multiple technology systems
  • Leverage innovative thinking to help solve problems or introduce new ideas to processes or products applicable to offensive security.
  • Prepare and present detailed technical information for various media including documents, reports, and notifications
  • Provide clear and practical advice regarding managed risks
  • Learn and develop advanced technical and leadership skills, Mentor Junior assessors in technical tradecraft and soft skills

Required Skills:

  • Minimum of 4 years of professional pentesting, application security or ethical hacking experience, preferably in a large, complex, enterprise environment
  • Detailed technical knowledge in at least 3 of the following areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services
  • SQL injection/XSS attack without the use of tools
  • Experience performing manual code reviews for security relevant issues
  • Experience working with SAST tools to identify vulnerabilities
  • Able to manually identify and reproduce findings, discuss remediation concepts, develop PoCs for vulnerabilities, use scripting/coding techniques, proficiently execute common penetration testing tools, triage, and support incidents, and produce high value findings
  • Experience performing manual web application assessments i.e., must be able to simulate a
  • Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
  • Experience with vulnerability assessment tools and penetration testing techniques
  • Solid programming/debugging skills
  • Experience of using a variety of tools, included, but not limited to, IBM AppScan, Burp and SQL Map
  • Threat Analysis
  • Innovative Thinking
  • Technology Systems Assessment
  • Technical Documentation

Desired:

  • CISSP, CEH, OSCP, OSWE, GPEN, PenTest+ or similar
  • Strong programming/scripting skills