Penetration Tester with Web Application experienceother related Employment listings - Plano, TX at Geebo

Penetration Tester with Web Application experience

Title:
Penetration Tester with Web Application experienceLocation:
Plano, TX (Hybrid)Duration:
Contract Preferences Web application development or source code review experience.
Strong knowledge of Windows and Linux operating systems.
Working knowledge of containerized applications and container-based security controls and configurations.
Possess current professional certification (i.
e.
GWAPT, OSCP, OSCE, GPEN) Responsibilities Conduct assessments of web applications, mobile applications, databases, client-side applications and tools, and APIs.
Execute manual and automated code analysis to assess the quality and security of source code.
Perform pre-assessment research and preparation including reconnaissance, documentation and configuration review, and customer interviews.
Develop custom tools and exploits.
Analyze security findings, including risk analysis and root cause analysis.
Generate comprehensive reports, including detailed findings, exploitation procedures, and mitigations.
Develop and deliver walkthrough(s), proof(s) of concept (PoCs), articles, and formal presentations.
Execute verification and validation testing for customer mitigations and fixes Qualifications Experience in performing penetration testing on enterprise web applications, microservice and mobile applications.
Familiarity with common web vulnerabilities including:
XSS, XXE, SQL Injection, Deserialization Attacks, File Inclusion/Path Traversal Attacks, Server-side Request Forgery, Remote Execution Flaws, Server Configuration Flaws and Authentication Flaws.
Experience in testing web-based APIs (i.
e.
REST, SOAP, XML, JSON).
Experience in designing and documenting pragmatic remediation guidance for discovered vulnerabilities.
Experience developing actionable intelligence based on open source intelligence (OSINT) gathering.
Experience with 1 or more scripting languages such as Bash, Python, Perl, PowerShell, etc.
Solid understanding of OWASP testing methodology.
Familiarity with front-end web application frameworks (i.
e.
AngularJS, Bootstrap, etc).
3
years of experience using Burp Suite Pro or equivalent application (e.
g.
ZAP).
Recommended Skills Api Angular4 Assessments Bash (Scripting Language) Bootstrap (Front End Framework) Code Review Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3n6kb6d9n294b25lt5', 'ExternalApply-j3n6kb6d9n294b25lt5'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.