About The Role
The primary function of the Security Analyst in the CST team is to continually review the customers’ defined scope for vulnerabilities, identify additional targets that should be included in the scope, and report these to the client in a timely, accurate, and comprehensive manner. The Security Analyst is also responsible for pre-engagement activities including scoping, statements of work, working with customers to determine their testing requirements and restrictions, and on boarding customers into the service.
Essential duties & responsibilities
The Continuous Security Testing service isa consultant led vulnerability identification and verification servicewhich makes use of automated vulnerability scanning along withsignificant manual testing against a broad scope in a continuing engagement. The purposeof the service is to continually monitor a customer’s external attacksurface for new vulnerabilities, changes in the scope of the attacksurface, and proactively inform customers of discovered issues alongwith recommended remediation; with the overall aim of reducing the lifetime of each vulnerability. Manual testing includes identification of issues which automation alone could not identify, exploitation of all issues, often chaining multiple findings together in order to determine the true impact of vulnerabilities for the customer.
Manual identification and exploitation of vulnerabilities.
Manual verification and exploitation of scanner findings.
Detailed analysis of issues identified and exposure for the customer including proof of concept, reproduction steps, and recommended remediation.
Communication of findings to the customer in a detailed, accurate and manageable manner both orally and through written vulnerability/scope notifications and periodic summaries.
Continual professional development to maintain and develop knowledge and technical competencies.
Maintain professional technical qualifications to demonstrate competency to our clients.
Undertaking projects and support tasks as appropriate to the role.
During mentoring and experience progression, the Associate Penetration Tester will be tasked with:
Pre-engagement activities including scoping of assessments and statements of work and determining customer requirements and restrictions.
On boarding customers into the service including configuration of continual scanning and liaising with customer to resolve issues which may reduce the effectiveness of scanning.
Monitoring of the customers’ external perimeter for changes, and proactive discovery of new targets to include within the customer’s scope.
Excellent written and spoken English including presentation, structure, spelling, and grammar. Along with experience conveying technical information in an accessible manner.
Core computing skills including but not limited to:
Networking fundamentals – understanding of OSI Model, TCP/IP, HTTP, DNS, SMB, SMTP and relevant tools.
Microsoft Windows and Office proficiency along with proficiency in one or more Linux distributions.
Good knowledge of web application technologies and security assessment including but not limited to:
REST APIs, XML and JSON formats.
Vulnerability identification and exploitation (not limited to OWASP Top 10).
Experience with common assessment tools such as MITM proxies (Burp Suite Pro and SQLMap).
Knowledge of a scripting language such as Python (preferred), Ruby, PowerShell, or Bash, for the development of new, or editing existing, tools.
Evidence of rapidly and confidently gaining and knowledge of emerging technologies, vulnerabilities, and penetration testing tools and techniques.
Excellent time management including setting priorities and goals to complete assigned and arising tasks.
General knowledge of internal and external infrastructure technologies and security assessment including but not limited to:
Identification and exploitation of misconfigurations or known vulnerabilities in common enterprise infrastructure and services (Windows Domains, Linux servers, virtualisation, databases, switches/routers, etc).
Windows and Linux Sandbox/Desktop Breakout.
Knowledge of Open Source Intelligence gathering techniques. Including but not limited to use of Google dorks, DNS, domain registration, certificate transparency, and other public sources of information.
Experience with live bug bounties, particularly where automation has been implemented.
CPSA - CREST Practitioner Security Analyst (or above)
A related Bachelor’s degree.