EY Cybersecurity - Senior Consultant - IoT Security Testing in Salt Lake City, Utah
Cybersecurity - Senior Consultant - IoT Security Testing
Requisition # UNI00G0Q
Post Date Sep 24, 2020
In a rapidly changing IT environment, clients from all industries look to us for trusted solutions for their increasingly complex risks and vulnerabilities. As a member of our Next Generation Security Operations and Response (NGSOR) team you’ll be right at the heart of that goal, helping clients gain insight and context to their cyber threats and assessing, improving, and building security operations in order to mitigate these threats. You’ll get to use your technical and business skills in order to help us drive this mission and have an impact on cyber security at a global level.
You’ll work alongside respected industry professionals, learning about and using the latest tools and techniques to identify and overcome some of the most relevant and pressing security issues in the world. It’s a highly specialized area, where you’ll learn highly sought-after technical skills, all while developing your relationship management abilities – often by working directly on-site with our clients.
What to expect
Our security professionals possess diverse industry knowledge, along with unique technical expertise and specialized skills. The team stays highly relevant by researching and discovering the newest security vulnerabilities, attending and speaking at top security conferences around the world, and sharing knowledge on a variety of topics with key industry groups. The team frequently provides thought leadership and information exchanges through traditional and less conventional communications channels such as speaking at conferences, publishing white papers and blogging.
As part of our Penetration Testing team , you’ll identify potential threats and vulnerabilities in connected product/IoT/embedded devices.
Our professionals work together in planning, pursuing, delivering and managing engagements to assess, improve, build, and in some cases operate integrated security operations for our clients.
Your key responsibilities
Execute connected product/IoT/embedded devicesecurity assessments to identify vulnerabilities and exploit them
Conduct security research and devise newattack techniques against connected products
Develop custom hardware / scripts to assistin compromising connected product devices.
Analyze,disassemble, reverse engineer and exploit connected product.
Solve challenging technical problems anddevise creative solutions.
Perform in-depth analysis of test results andcreate report that describes findings, exploitation procedures, risks and recommendations.
Conveycomplex technical security concepts to technical and non-technicalaudiences.
Stronganalysis skills and attention to detail.
Strong written and verbal communicationskills with the ability to interact with senior management, technical teams,and key client stake holders.
To qualify for the role, you must have
A minimum of 5 years of work experience in penetration testingconnectedproduct/IoT/embedded devicesor related experience with hardware hacking.
Experiencewith vulnerability assessment and penetration testing ofcommercial, consumer, and industrial IoT solutions.
Ability toperform end-to-end connected product security testing (chip to cloud) includinghardware device, device firmware, communications including (i.e. protocols,wireless), supporting mobile applications, back-end infrastructure, API and cloudservices.
Familiarityand understanding of OWASP IoT top 10 vulnerabilities.
Experiencewith soldering / desoldering hardware components and extraction of embeddeddevice flash chips.
Experiencewith firmware extraction techniques including man-in-the-middle network attacks,memory access attacks, firmware upgrade attacks, and using hardware debugging interfacessuch as JTAG, UART, SPI, I2C, USB, and NAND flash chip reader.
Experiencewith firmware extraction, firmware reverse engineering, analysis and identificationof security vulnerabilities.
Proficiency withsoftware debugging tools such as, Binary Ninja, gdb, Ghidra, IDA Pro, or Radare2,to analyze device software and firmware.
Experience with developing custom shell code to exploitembedded device firmware.
Experiencewith intercepting and attacking low power Radio Frequency (RF) communicationprotocols such as Z-Wave, Zigbee, and BLE; using hardware and software toolssuch spectrum analyzer, Software Defined Radio (SDR), HackRF and Gqrx.
Experience withintercepting and testing communication protocols including MQTT, CoAP, 6LowPan,LWM2M etc using software tools such as Scapy,mitmproxy, tcpdump and Wireshark.
Experiencewith performing bus spying, tampering, spoofing and injection testingtechniques.
Willingnessand ability to travel domestically and internationally to meet client needs;estimated 50% travel required annually.
Ideally, you’ll also have
Strongunderstanding of embedded systems architecture and circuit design.
Proficiencywith hardware description languages such asVHDL or Verilog.
Understandingand proficiency with Linux and Unix operating systems.
Deepunderstanding of embedded systems architecture and disassembly / assembly ofmicroprocessors code such as ARM, AVR, MIPS, or x86.
Experiencewith exploiting side-channel attacks against connected product including power,timing, and fault injection techniques using hardware tools such as the ChipWhisperer.
Proficiencywith performing device monitoring and analysis using logic analyzer hardwaretools such as Saleae Logic Pro or Open Workbench Logic Sniffer.
Presented at anindustry recognized information security event such as DEFCON or participatedin CTFs such as IoT village CTF.
Deepunderstanding and experience of fuzzing techniques to discover and exploitidentified vulnerabilities.
Updated andfamiliarized with the latest exploits and security trends in connectedproducts.
Knowledge ofattacking cryptographic protocols including Public Key cryptography.
Understandingof hardware, firmware, IoT communication protocols, network, application, APIsecurity and popular attacks vectors against IoT devices.
Anunderstanding of web-based application vulnerabilities. (OWASP Top 10)
Experiencetesting API, cloud environments, mobile applications, and web applications.
Any one of thefollowing certifications: OSWE, OSWP, OSCE, OSEE, GXPN, GWAPT, GMOB.
What we look for
We’re interested in intellectually curious people with a genuine passion for cyber security. With your specialization in attack and penetration testing, we’ll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us – but also to the industry as a whole. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you.
What working at EY offers
We offer a competitive compensation package where you’ll be rewarded based on your performance and recognized for the value you bring to our business. In addition, our Total Rewards package includes medical and dental coverage, both pension and 401(k) plans, a minimum of three weeks of vacation plus 10 observed holidays and three paid personal days, and a range of programs and benefits designed to support your physical, financial and social wellbeing.
Plus, we offer
Support, coaching andfeedback from some of the most engaging colleagues around
Opportunities todevelop new skills and progress your career
The freedom andflexibility to handle your role in a way that’s right for you
A rewards packagetailored to your unique needs
As a global leader in assurance, tax, transaction and advisory services, we’re using the finance products, expertise and systems we’ve developed to build a better working world. That starts with a culture that believes in giving you the training, opportunities and creative freedom to make things better.Whenever you join, however long you stay, theexceptionalEY experience lasts a lifetime.And with a commitment to hiring and developing the most passionate people, we’ll make our ambition to be the best employer by 2020 a reality.
Join us in building abetter working world. Apply today.
EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, national origin, protected veteran status, disability status, or any other legally protected basis, in accordance with applicable law.