
Manual Ethical Hacker
Bank of America
full-time
Posted on:
Location Type: Hybrid
Location: Denver • Colorado • Illinois • United States
Visit company websiteExplore more
Salary
💰 $117,000 - $147,700 per year
About the role
- Perform assigned analysis of internal and external threats on information systems
- Incorporate threat actors' tactics, techniques, and procedures into offensive security testing
- Perform assessments of the security, effectiveness, and practicality of technology systems
- Leverage innovative thinking to solve problems or introduce new ideas
- Prepare and present detailed technical information for various media
- Provide clear and practical advice regarding managed risks
- Mentor Junior assessors in technical tradecraft and soft skills
Requirements
- Minimum of 4 years of professional pentesting, application security or ethical hacking experience
- Detailed technical knowledge in at least 3 areas: security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; common communication protocols; mobile frameworks; single sign-on technologies; exploit automation platforms; RESTful web services
- SQL injection/XSS attack knowledge without the use of tools
- Experience performing manual code reviews for security relevant issues
- Experience working with SAST tools to identify vulnerabilities
- Ability to manually identify and reproduce findings and discuss remediation concepts
- Proficiently execute common penetration testing tools
- Knowledge of network and Web related protocols/technologies (e.g., UNIX/LINUX, TCP/IP, Cookies)
- Experience of using a variety of tools including IBM AppScan, Burp and SQL Map
Benefits
- Industry-leading benefits
- Access to paid time off
- Resources and support for employee wellness
Applicant Tracking System Keywords
Tip: use these terms in your resume and cover letter to boost ATS matches.
Hard skills
pentestingapplication securityethical hackingsecurity engineeringapplication architectureauthentication protocolsapplied cryptographymanual code reviewspenetration testingvulnerability identification
Soft skills
innovative thinkingproblem solvingpresentation skillsrisk managementmentoringcommunication