Position: Sr. Penetration Tester( Onsite/Hybrid )
Location: Plano, TX
Duration: 6-12 Months + Contract to Hire( CTH )
Total Positions: 2
Client: PEPSICO
Work Authorization: H4-EAD/GC-EAD/GC/US Citizens
JOB DESCRIPTION
760725==Sr. Penetration Tester- PLANO
Contract to hire -Hybrid
Hybrid schedule: requires 3 days a week on site (candidate can choose which days). 7701 Legacy Drive, Plano, TX, 75024
Experience conducting manual API and mobile PenTest using burp suite. Proficient in understanding application-level vulnerabilities like XSS, SQL Injection, CSRF, authentication bypass, weak cryptography, authentication flaws etc.
Skilled in performing penetration tests on web APIs and mobile apps before release.MITRE ATT&CK working on Red Teaming TTPs and Threat Modelling. Leveraging Bash, PowerShell and Python automation.
API testing: Postman, SoapUI, Crackmapexec, Hash cat, Responder, Bloodhound, Impacket, Postman Performing manual testing and identifying vulnerabilities such as Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), SQL Injection, privilege escalations, authentication weaknesses, access control weaknesses, use of insecure cryptographic protocols, security misconfiguration.
Summary Within the Cyber Fusion Center, the Offensive Security Team continuously evaluates PepsiCo s cyber security posture through penetration tests and red team engagements to proactively identify gaps and drive mitigations to minimize PepsiCo's cyber risk exposure.
Responsibilities
Conduct penetration tests across Web applications, APIs, Mobile applications, infrastructure, cloud environments, and devices.
Conduct red team engagements across complex environments (including operational technologies).
Drive all phases of penetration tests and red team engagements, including Scoping, planning, communications, timelines, and execution of key activities (reconnaissance, vulnerability identification, exploitation, and reporting)
Develop in-depth reports (issue, severity, impact, remediation recommendations) for penetration tests and red team engagements.
Develop tools and techniques to automate, scale, and accelerate adversary emulation capabilities and vulnerability discovery.
Develop exploits and POCs to evade defensive countermeasures and emulate threat actor TTPs.
Establish and mature team documentation, processes, procedures, and team KPIs.
Mentor penetration testers, red team members, and other functions where needed to drive unified and holistic outcomes.
Manage third-party pen test and red team engagements to ensure high-quality products and deliverables
Support offensive security research, innovation, and testing across emerging capabilities (e.g. AI, LLM, ML, NLP, Smart Contracts, etc.).
Accountabilities
Execute on projects, objectives, and deliverables in alignments with team vision, mission, and goals.
Routinely develop and update offensive security documentation, processes, and technologies to adapt to emerging threat landscape.
Develop automation to scale global offensive capabilities and operational resiliency.
Collaborate with partner teams, service owners, and senior leadership to influence, prioritize, and drive the resolution of discovered security findings.
Create and deliver trainings; and participate in security reviews, audits, on-site engagements, and support incidents after-hours when required
Years of experience
5+ years of experience in a technical security role (e.g. Penetration Testing, Red Team, Application Security, Infrastructure Security); or master s degree in computer science/engineering or related cyber field, and 2 years of relevant experience.
Mandatory Technical Skills
Advanced knowledge of security tools (Burp Suite, Metasploit, Cobalt Strike, Empire, Nmap, bloodhound, etc.) and multiple operating systems (e.g. Windows, Linux).
Proficient in at least one scripting language (Python, bash, PowerShell) or one programming language (Java, C#, C++).
Experience in multiple security domains (e.g. Network security, Application Security, Infrastructure Security, Cloud Security, Security operations).
Experience in aligning threat and vulnerability management efforts to frameworks and control objectives - MITRE ATT&CK, NIST CSF, ISO27001, CIS, OWASP.
Familiarity with defensive and monitoring technologies such as Intrusion prevention/detection systems (IPS/IDS), Web application firewalls (WAF), security information and event management systems (SIEMs), and endpoint detection/response (EDR) tools, as well as user and entity behavior analytics (UEBA).
Experience in developing offensive security tooling and automation is a plus