Melbourne,Australia
Contract
Skills
Security Testing
Software developement
DevOps
Waterfall
Vulnerability scanners
Static code
Essential
• A minimum of 7 years’ experience in a Security Testing role, including experience in each of a Penetration Testing and Application Security / Source Code Review role
• Demonstratable experience in a software development role
• Strong communication and English language skills, including experience in communicating technical outcomes to a non-technical audience
• Experience and exposure to a variety of software delivery models, including DevOps and Waterfall • Significant experience in performing complex security assessments across a range of domain areas in a large corporate environment
• Exceptional working knowledge of Security Assessment toolsets, such as Vulnerability Scanners, Static Code Analysis and Software Composition Analysis tools
. • Ability to review and provide guidance and feedback on security assessment reports
• Strong understanding of application security architecture principles including transport security, authentication, authorisation, threat modelling, and logging and monitoring.
• Tertiary qualifications in Electrical/Electronic, Computer, Network or Software Engineering; Information/Cyber Security; IT or a related discipline
• Demonstratable skillset exceeding that expected of a person holding OSCE/OSWE (or similar) qualifications
High desirable
• Experience in developing security policy, standards, and development guidelines • Experience in training and developing people
• Significant experience in other domain areas of Cyber Security
• A strong understanding of adjacent security dependencies including endpoints, application platforms, databases, network security technologies, development frameworks.
• Current industry certification, including but not limited to: o Offensive Security – OSCP, OSCE3, OSWE o HTB Academy – CTPS, CWEE o CREST – Certified Level qualifications (CCT, CCSC, CCSAS, CCSAM) o SANS – GPEN, GAWN, GWAPT, GXPN. o (ISC)2 – CISSP, CCSP • Demonstrable history of developing exploits and zero-day discover
Any Graduate