Job Description :
v\:* {behavior:urldefault#VML);} o\:* {behavior:urldefault#VML);} w\:* {behavior:urldefault#VML);} .shape {behavior:urldefault#VML);} Hello, Kindly post the below requirement! Please check the below requirements Position: Sr. Penetration Tester( Onsite/Hybrid ) Location: Plano, TX Duration: 6-12 Months + Contract to Hire( CTH ) Total Positions: 2 Client: PEPSICO Work Authorization: H4-EAD/GC-EAD/GC/US Citizens JOB DESCRIPTION 760725==Sr. Penetration Tester- PLANO Contract to hire -Hybrid Hybrid schedule: requires 3 days a week on site (candidate can choose which days 7701 Legacy Drive, Plano, TX, 75024 Experience conducting manual API and mobile PenTest using burp suite. Proficient in understanding application-level vulnerabilities like XSS, SQL Injection, CSRF, authentication bypass, weak cryptography, authentication flaws etc. Skilled in performing penetration tests on web APIs and mobile apps before release.MITRE ATT&CK working on Red Teaming TTPs and Threat Modelling. Leveraging Bash, PowerShell and Python automation. API testing: Postman, SoapUI, Crackmapexec, Hash cat, Responder, Bloodhound, Impacket, Postman Performing manual testing and identifying vulnerabilities such as Cross-Site Request Forgery (CSRF), Cross-Site Scripting (XSS), SQL Injection, privilege escalations, authentication weaknesses, access control weaknesses, use of insecure cryptographic protocols, security misconfigurations. Summary Within the Cyber Fusion Center, the Offensive Security Team continuously evaluates PepsiCo s cyber security posture through penetration tests and red team engagements to proactively identify gaps and drive mitigations to minimize PepsiCo''s cyber risk exposure. Responsibilities Conduct penetration tests across Web applications, APIs, Mobile applications, infrastructure, cloud environments, and devices. Conduct red team engagements across complex environments (including operational technologies Drive all phases of penetration tests and red team engagements, including Scoping, planning, communications, timelines, and execution of key activities (reconnaissance, vulnerability identification, exploitation, and reporting) Develop in-depth reports (issue, severity, impact, remediation recommendations) for penetration tests and red team engagements. Develop tools and techniques to automate, scale, and accelerate adversary emulation capabilities and vulnerability discovery. Develop exploits and POCs to evade defensive countermeasures and emulate threat actor TTPs. Establish and mature team documentation, processes, procedures, and team KPIs. Mentor penetration testers, red team members, and other functions where needed to drive unified and holistic outcomes. Manage third-party pen test and red team engagements to ensure high-quality products and deliverables Support offensive security research, innovation, and testing across emerging capabilities (e.g. AI, LLM, ML, NLP, Smart Contracts, etc. Accountabilities 1. Execute on projects, objectives, and deliverables in alignments with team vision, mission, and goals. 2. Routinely develop and update offensive security documentation, processes, and technologies to adapt to emerging threat landscape. 3. Develop automation to scale global offensive capabilities and operational resiliency. 4. Collaborate with partner teams, service owners, and senior leadership to influence, prioritize, and drive the resolution of discovered security findings. 5. Create and deliver trainings; and participate in security reviews, audits, on-site engagements, and support incidents after-hours when required Years of experience 5+ years of experience in a technical security role (e.g. Penetration Testing, Red Team, Application Security, Infrastructure Security); or master s degree in computer science/engineering or related cyber field, and 2 years of relevant experience. Mandatory Technical Skills 1. Advanced knowledge of security tools (Burp Suite, Metasploit, Cobalt Strike, Empire, Nmap, bloodhound, etc and multiple operating systems (e.g. Windows, Linux 2. Proficient in at least one scripting language (Python, bash, PowerShell) or one programming language (Java, C#, C++ 3. Experience in multiple security domains (e.g. Network security, Application Security, Infrastructure Security, Cloud Security, Security operations 4. Experience in aligning threat and vulnerability management efforts to frameworks and control objectives - MITRE ATT&CK, NIST CSF, ISO27001, CIS, OWASP. 5. Familiarity with defensive and monitoring technologies such as Intrusion prevention/detection systems (IPS/IDS), Web application firewalls (WAF), security information and event management systems (SIEMs), and endpoint detection/response (EDR) tools, as well as user and entity behavior analytics (UEBA 6. Experience in developing offensive security tooling and automation is a plus.
             

Similar Jobs you may be interested in ..