Description
I am urgently looking for a IT Security/Vulnerability Research Analyst who:
- Helps with static and dynamic analysis of mobile and non-mobile software - understands issues associated with this analysis and the limitations of the existing tools
- Performs penetration testing of web-sites and end-point Servers (crown jewels)
- Works with the head of Research to conduct periodic red-team exercises
- Helps in the drafting of reports
- Helps design a web-site for the research group, and update the web-site
- Coordinates with other people for usability testing of mobile secure messaging applications
- Knows python, Java, and C/C++ to the extent they can change the code-base of open source messaging applications, if needed
- perform systems analysis and software approach to determine how crown jewels can be reached
- come up with a software to automate IOC distributions
- Automates penetration (inspired from DARPA's Cyber Grand Challenge)
- Come up with a corpus of hardware and software tests, existing malware that we need to emulate
- Come up with a test bed to emulate the mechanisms used by different malware
- Really loves to break software and hardware apart
- Understands cyber data (such as vulnerability scans, different types of indicators, malware code-base) and cyber-tools (Firewall, ids, SIEM)
- Perform penetration testing of crypto protocols
Our customer prefers the candidate to have a MS with few years of experience so that he/she is independent, but still be flexible in terms of taking technical directions.
For more information please contact Monique Oomen - teamlead IT at YER Interim Solutions.