Description

Security Testing

 

Melbourne,Australia

Contract

Skills

Security Testing

Software developement

DevOps

Waterfall

Vulnerability scanners

Static code

 

 

Essential

• A minimum of 7 years’ experience in a Security Testing role, including experience in each of a Penetration Testing and Application Security / Source Code Review role

• Demonstratable experience in a software development role

• Strong communication and English language skills, including experience in communicating technical outcomes to a non-technical audience

• Experience and exposure to a variety of software delivery models, including DevOps and Waterfall • Significant experience in performing complex security assessments across a range of domain areas in a large corporate environment

• Exceptional working knowledge of Security Assessment toolsets, such as Vulnerability Scanners, Static Code Analysis and Software Composition Analysis tools

. • Ability to review and provide guidance and feedback on security assessment reports

• Strong understanding of application security architecture principles including transport security, authentication, authorisation, threat modelling, and logging and monitoring.

• Tertiary qualifications in Electrical/Electronic, Computer, Network or Software Engineering; Information/Cyber Security; IT or a related discipline

• Demonstratable skillset exceeding that expected of a person holding OSCE/OSWE (or similar) qualifications

 

 

 

 

High desirable

• Experience in developing security policy, standards, and development guidelines • Experience in training and developing people

• Significant experience in other domain areas of Cyber Security

• A strong understanding of adjacent security dependencies including endpoints, application platforms, databases, network security technologies, development frameworks.

• Current industry certification, including but not limited to: o Offensive Security – OSCP, OSCE3, OSWE o HTB Academy – CTPS, CWEE o CREST – Certified Level qualifications (CCT, CCSC, CCSAS, CCSAM) o SANS – GPEN, GAWN, GWAPT, GXPN. o (ISC)2 – CISSP, CCSP • Demonstrable history of developing exploits and zero-day discover

 

 


 

Education

Any Graduate