Sr System Analyst - IT Identity and Access Management (https://careers.coned.com/jobs/14420619-sr-system-analyst)
Systems Specialist-Portfolio Manager, Enterprise Data & Analytics (https://careers.coned.com/jobs/14411110-systems-specialist)
System Analyst, IT Information Security (https://careers.coned.com/jobs/14403921-system-analyst)
Act as a senior technical resource, mentor team members, and contribute to the development of the ConEd Red Team Program.
With oversight from management and the lead analyst, competently perform a variety of penetration testing, red team, and social engineering assessment activities that are of comparable sophistication to real-world adversarial attacks.
Develop assessment strategies with key stakeholders.
Create accurate documentation that provides concise explanations and conveys informative descriptions of findings, including technical explanations/walkthroughs, root causes, impact, and remediation/mitigation strategies.
Continuously learn, improve, and hone your skills to deliver advanced assessments.
Develop scripts and tools to automate tedious processes and increase efficiency.
Stay abreast of TTPs, global security incidents, industry trends, advisories, publications, research, talks, and other relevant developments
Effectively communicate technical concepts to non-technical audiences.
Coordinate with business owners to remediate/mitigate findings and verify changes are successful.
Represent the department in the company and industry with research, talks, publications, articles, posts, training, etc.
Assist with developing internal methodologies and process improvement for the team, including mentoring and transferring knowledge across team members.
Collaborate with blue teams to bolster detection and response capabilities.
Less than 2 years Perform OSINT/Reconnaissance to identify publicly damaging information, misconfigurations, and interesting targets Required
Less than 2 years Perform scoping, define rules of engagement, and deliver assessments from kickoff through remediation Required
3-5 years Be experienced with common pentesting platforms, such as Kali Linux, as well as related tooling, such as for network analysis (e.g. nmap), vulnerability analysis (e.g. Nessus), exploitation (e.g. Metasploit), and web app pentesting (e.g. Burp Suite) Required
3-5 years Possess a solid understanding of network architecture and design, network protocols, covert channels, encryption, and data exfiltration Required
3-5 years Be experienced with Windows, Mac, Linux, Unix operating systems, virtualization, storage, databases, and other related systems and technologies and their respective security considerations Required
3-5 years Possess a thorough understanding of network/systems pentesting procedures Required
3-5 years Be able to differentiate between safe and risky/dangerous techniques Required
3-5 years Be able to communicate to both technical and executive/business audiences Required
3-5 years Be able to work independently and within a team Required
Less than 2 years Be comfortable and effective working remotely within a distributed team Required
Less than 2 years Coach teams to build in security by design Required
3-5 years Leverage critical thinking and creativity; think outside the box and do not rely on tooling Required
3-5 years Effectively manage large amounts of information from complex environments and applications Required
3-5 years Possess a deep understanding of general information security concepts and defensive controls, such as risk management, governance, compliance, least privilege, network monitoring, malware protection and analysis, endpoint security, DLP, intrusion detection/prevention, and SIEM systems Preferred
3-5 years Be familiar with assessment frameworks, such as MITRE ATT&CK, PTES, OSSTMM, OWASP Testing Guide, etc. Preferred
Less than 2 years Possess a detailed understanding of systems/network hardening, secure coding practices, and mitigation/remediation strategies Preferred
Less than 2 years Be able to perform assessment activities in a quiet/stealthy manner and circumvent security controls Preferred
3-5 years Be competent with one or more scripting languages, such as Bash, PoSh, Python, Ruby, etc. Preferred
Less than 2 years Be able to perform threat modeling and possess an in-depth understanding of threat and vulnerability analysis Preferred
2 years Familiarity with several web development languages, such as Java, PHP, Ruby on Rails, C#/ASP.NET, SQL, Go, Javascript/Node, HTML, etc. Preferred
The ability to perform exploit development/modification and reverse engineering is preferred Preferred
Be competent with wireless penetration testing procedures and wireless technologies; experience beyond 802.11 (e.g. Bluetooth, Zigbee, etc.) is preferred Preferred
Possess an understanding of physical security controls and their weaknesses Preferred
Have experience with phishing, vishing, and/or on-site/in-person social engineering Preferred
Be competent with application, mobile, and API penetration testing procedures; the ability to perform source code review is preferred Preferred
Be familiar with cloud computing concepts, cloud-native services, and DevOps (CI/CD, Kubernetes, etc.) Preferred
Experience with assessing IoT devices is preferred Preferred
Provide thought leadership within the organization and the industry Preferred
Participation in challenges and CTF events (Hack the Box, Pentester Academy Labs, etc.) is preferred Preferred
Interest in research and published CVEs are preferred Preferred