Consultant Information Security

Company Name:
Supreme Staffing Services, Inc.
Responsible to complete web application penetration testing/ethical hacking for MasterCard applications completing necessary compliance requirements. Web application penetration testing to include multiple phases, with and without access to the system, and utilizing a tool base that is provided however including human analytics.
Remain up to date with new vulnerabilities, exploits, and provide proactively to management as required.
Applies expertise of security principles, theories and concepts, plus high level knowledge of business/function and development life cycle. Solid background with Windows and UNIX platforms (security or system administration); strong understanding of networking fundamentals; strong working knowledge of web applications and services; experience implementing vulnerability assessments in a complex network environment; strong technical writing skills; strong programming skills (shell scripting, perl, C, Python, etc.). Experience with PCI, SOX, GLBA, SAS70, and other audits is preferred; security certification a plus (CISSP, Security+, GIAC, TICSA, IAM, IEM, CEH, etc.).
3 to 5 years of experience in Information Security
Strong knowledge of Windows and Unix platforms (including basic knowledge of virtual environments)
3 to 5 years of experience in penetration testing/ethical hacking of web applications (including Web Services such as SOAP UI and WSDLs)
Strong knowledge of common commercial and/or open source vulnerability assessment tools and techniques used for evaluating operating systems, networking devices, databases and web applications.
Strong knowledge of Web Applications and services, with prior Web Development experience or Java Programming experience is a plus
Strong technical documentation and reporting skills
Fundamental knowledge of networks, ports, protocols, and infrastructure setup
Understanding of regulatory compliance requirements (PCI, GLBA, SOX, SAS70)
Must be able to quickly master new technology / software for the purposes of evaluating or subverting the security functionality of the technology / software
Must be able to work within a team based environment
Must be able to take on multiple tasks and complete within defined timelines
Must be able to work in a quick paced environment with tight deadlines
Must have a technical degree (Computer Science or Management Information Systems).
BS Degree in Information Processing, Computer Science, Engineering or equivalent combination of experience and formal education.

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.