Security Consultant - USA at IOActive
Remote, Oregon, USA -
Full Time


Start Date

Immediate

Expiry Date

28 Nov, 25

Salary

80000.0

Posted On

29 Aug, 25

Experience

5 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Nmap, Burp Suite, Cryptography, Nessus, Reverse Engineering, Authentication, Analytical Skills, Data Transfer, Entitlements, Testing Tools, Metasploit, English, Encryption, Vulnerability

Industry

Information Technology/IT

Description

The consultant is expected to maintain a high level of expertise regarding known threats and technical advances.
Security Consultants are responsible for performing high-end security evaluations and research. Our consultants work with other team members to deliver high quality results to IOActive’s clients around the world. This is a Remote position.

TECHNICAL SKILLS

  • Demonstrated practical/hands-on experience with Cryptography, Application Development and/or Reverse Engineering.
  • Familiar with security testing tools such as Metasploit, Nmap, Nessus, Burp Suite.
  • Vulnerability assessment and penetration testing experience.
  • Experience with some mix of security-related topics such as authentication, entitlements, identity management, data protection, data leakage prevention, validation checking, encryption, hashing, principle of least privilege, software attack methodologies, secure data transfer, secure data storage, etc.
  • Five years or more of relevant work experience in a related security environment.

Professional Skills

  • Ability to work independently under deadline.
  • Rigorous attention to detail and strong analytical skills.
  • Excellent command of written and spoken English to communicate effectively with clients and team members.
  • Comfortable working as part of a multi-national and multi-disciplinary team.
  • Demonstrate a logical and structured approach to projects
Responsibilities

Our Security Consultants undertake security evaluation projects to meet customer expectations. This includes:

  • Investigate possible logical attack scenarios by interpreting the code review findings, orienting the attack paths, and analyzing the test results
  • Develop sophisticated, state-of-the-art attacks that integrate the latest attack methods against web, networking, devices, etc.
  • Create tools to assist in project goals
  • Communicate complex vulnerabilities to both technical and non-technical client staff
  • Perform research on new attack vectors, discover new vulnerabilities, create new exploitation techniques
  • Evangelize IOActive through blogs, white papers, presentations, etc.
Loading...