Global Security – Mobile Penetration Testing Consultant - X-Force Red

IBM

Introduction
Are you passionate about breaking into applications, networks, systems, databases, devices and other technologies to uncover security vulnerabilities and help fix them? Are you interested in joining a team of like-minded passionate experts, many of whom have decades of experience breaking into anything and everything to help organizations strengthen their security? If so, X-Force Red, IBM Security’s team of veteran hackers, is looking for a Global Security Consultant, and you may be the perfect fit.

The Global Security Consultant will be part of the X-Force Red Offensive Security team. The consultant’s primary duty is to perform penetration tests against clients’ application and network assets. Engagements typically range from two to four weeks. Secondary duties include assisting in the sales process with potential or existing clients, and acting as a client’s primary technical contact for projects delivered by other consultants. X-Force Red consultants provide subject matter expertise in the form of research, tooling, and consulting engagements.

Your Role and Responsibilities
In the role as a Mobile Penetration Testing Consultant you should have in-depth of knowledge and experience understanding a client’s environment, running tests against these environments, and escalating or gaining access to system by leveraging weak controls. The consultant must be able to rapidly learn new technologies and processes with minimal assistance. There is a potential for 25% travel, including international travel. Travel depends on project requirements.

In this role you will be responsible for the following:

Effective communication and presentation skills.
The ability to lead large groups and be a primary facilitator.
Demonstrated written skills.
Drive to do research, publications, blogs, presentations, etc.
Comfortable working in a project based / client serving model.
Ability to lead and shape client expectations.
Help drive pursuits and engage in complex deals, matching outcomes to expectations.
Ability to work easily with diverse and dynamic teams.
Ability to work in a matrix management model.
Ability to self-start, and work independently on projects.
Preference for candidates with Secondary language.

Required Technical and Professional Expertise
You are required to have the following technical and professional experience for this role:Penetration testing experience.
Consulting experience.
System administration, network administration, or programming experience.
Ability to perform penetration tests against IOS applications.
Ability to perform penetration tests against Android applications.
Ability to perform penetration tests against web applications.
Strong understanding of networks, firewalls, protocols, routing, and security technologies.
History of presenting at regional or major security conferences.
History of published research, blog posts, or other publications.
Effective English writing skills.
Experience coordinating security testing projects with multiple consultants.

Preferred Technical and Professional Expertise
2+ years of experience managing one or more of the following: Firewalls, IDS/IPS, Security Incident and Event Management (SIEM).
Programming experience in one or more of the following: Java, .Net, Python, or Ruby.
Ability to perform penetration tests against at least one of the following: internal networks, wireless networks, thick-client applications, embedded applications, hardware.
CISSP, OSCP, or other technical certifications.
Experience in reverse engineering software or hardware.
Conversational fluency in a second language.
Hands-on experience in security aspects of compliance standards (ISO 27001, SSAE 16, COBIT, PCI, SOX, HIPAA, GLBA, etc.).
Experience editing documents for grammar, clarity, and technical accuracy.

About Business Unit
IBM is a leading provider of enterprise security solutions. Named by industry analysts as a leader in 12 security market segment categories, IBM Security is a multi-billion dollar business that is rapidly growing. In an industry focused on building walls, IBM Security is focused on creating an open, connected security ecosystem that leverages AI and cloud to help clients improve compliance, stop threats, and grow their business securely.

Your Life @ IBM
What matters to you when you’re looking for your next career challenge?

Maybe you want to get involved in work that really changes the world? What about somewhere with incredible and diverse career and development opportunities – where you can truly discover your passion? Are you looking for a culture of openness, collaboration and trust – where everyone has a voice? What about all of these? If so, then IBM could be your next career challenge. Join us, not to do something better, but to attempt things you never thought possible.

Impact. Inclusion. Infinite Experiences. Do your best work ever.

About IBM
IBM’s greatest invention is the IBMer. We believe that progress is made through progressive thinking, progressive leadership, progressive policy and progressive action. IBMers believe that the application of intelligence, reason and science can improve business, society and the human condition. Restlessly reinventing since 1911, we are the largest technology and consulting employer in the world, with more than 380,000 IBMers serving clients in 170 countries.

Location Statement
For additional information about location requirements, please discuss with the recruiter following submission of your application.

Being You @ IBM
IBM is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, pregnancy, disability, age, veteran status, or other characteristics. IBM is also committed to compliance with all fair employment practices regarding citizenship and immigration status.

6fac3445-56d8-4266-bac0-8ecc824adda0 6fac3445-56d8-4266-bac0-8ecc824adda0 6fac3445-56d8-4266-bac0-8ecc824adda0 6fac3445-56d8-4266-bac0-8ecc824adda0 6fac3445-56d8-4266-bac0-8ecc824adda0 6fac3445-56d8-4266-bac0-8ecc824adda0 6fac3445-56d8-4266-bac0-8ecc824adda0 6fac3445-56d8-4266-bac0-8ecc824adda0 6fac3445-56d8-4266-bac0-8ecc824adda0 6fac3445-56d8-4266-bac0-8ecc824adda0

Monster

Source

© 2019 Disabled Veterans National Foundation a tax-exempt 501(C)(3) nonprofit organization EIN #26-1446183 
By creating an account, you agree to DVNF's Terms of Service, Cookie Policy and Privacy Policy. You consent to receiving news letters and messages from the Disabled Veterans National Foundation and may opt out from receiving such messages by following the unsubscribe link in our messages, or as detailed in our terms. | Privacy Policy
cloud-syncearthbullhorncrosslistchevron-down linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram