채용
Advanced Cyber Security Engineer (Pentesting)
We are seeking an Advanced Cyber Security Engineer with 5+ years of hands-on offensive security experience to execute vulnerability assessments and penetration testing across web applications, APIs, cloud environments, infrastructure, and GenAI/LLM-enabled systems. You will work closely with engineering teams to identify exploitable weaknesses, validate risk, and drive remediation through practical guidance and re-testing.
Key Responsibilities
- Plan and execute manual and automated penetration tests for web applications (OWASP Top 10, SANS 25), including authentication, authorization, business logic, session management, and SSO testing (SAML 2.0, OAuth 2.0, OpenID Connect).
- Perform API security testing (REST/GraphQL/gRPC) including schema abuse, authz bypass, injection, mass assignment, rate-limit bypass, and broken object-level authorization (BOLA).
- Conduct cloud security assessments across AWS/Azure/GCP (as applicable): IAM review, storage exposure, network controls, secrets handling, logging/monitoring, and common misconfiguration exploit paths.
- Assess infrastructure security including Linux/Windows hosts, Active Directory, container platforms, Kubernetes; validate privilege escalation and lateral movement paths where authorized.
- Perform GenAI security assessments for LLM/RAG/agentic workflows, including prompt injection, data exfiltration paths, tool/function-call abuse, insecure plugin/tooling, model output handling, and evaluation of guardrails.
- Write high-quality reports with clear reproduction steps, risk ratings, business impact, and actionable remediation guidance; present results to technical and non-technical stakeholders.
- Partner with engineering teams to validate fixes through re-testing and to improve secure-by-design practices.
- Develop and maintain testing playbooks and reusable test cases; mentor junior testers and contribute to internal knowledge sharing.
Required Qualifications
- 5+ years of hands-on experience performing penetration tests and security assessments (web, API, cloud, and infrastructure), with strong manual penetration testing capability.
- Strong web exploitation experience across common vulnerability classes (e.g., injection, SSRF, deserialization, authn/authz flaws, XXE, IDOR, CSRF, and business logic abuse).
- Proven experience testing APIs using tools and custom scripts; ability to interpret OpenAPI/Swagger specs and derive abuse cases.
- Experience conducting cloud security assessments (AWS/Azure/GCP) including networking, and common misconfigurations; familiarity with cloud-native attack paths.
- Experience assessing infrastructure across Linux/Windows, networking fundamentals, and privilege escalation techniques; exposure to AD and container/Kubernetes environments.
- Exposure to GenAI security testing and assessment approaches (prompt injection, RAG data exposure, indirect prompt injection, model/tool abuse, sensitive data handling).
- Develop custom security testing scripts, automated tools, and frameworks to improve testing efficiency and coverage.
- Deep knowledge of OWASP Top 10, SANS Top 25, and common attack vectors.
- Proficiency in penetration testing tools (e.g., Metasploit, Burp Suite, Nmap, Nessus).
- Proficiency with at least one scripting language (Python preferred) for automation and exploit development/support.
- Solid understanding of networking protocols (TCP/IP, HTTP/S, DNS)
- Strong written and verbal communication skills with demonstrated experience producing professional pentest reports.
- Experience working within defined rules of engagement and handling sensitive data responsibly.
Technical Skills & Tools
- Web/API testing: Burp Suite, OWASP ZAP, Postman/Insomnia, custom scripts, fuzzing tools.
- Recon & exploitation: Nmap, nuclei (or similar), Metasploit (as applicable), wordlists, basic reversing/debugging helpful.
- Code & CI/CD: Git, code review for security, SAST/DAST concepts, pipeline security checks.
- GenAI: familiarity with LLM/RAG architectures, evaluation techniques, and security testing patterns for prompt injection and tool/function-call abuse.
Nice to Have
- Experience with adversary emulation/red teaming, phishing simulations, or purple team engagements.
- Experience assessing mobile apps (iOS/Android) and thick clients.
- Threat modelling experience and secure design review participation.
- Experience building security test harnesses for LLM applications (prompt test suites, red-team datasets, model behavior evaluation).
- Bug bounty track record, public research, CVEs, conference talks, or open-source contributions.
- Power BI skills: ability to build security metrics dashboards and reports (DAX basics, data modeling, and visualization best practices).
Certifications (Preferred)
- OSCP (Offensive Security Certified Professional) is strongly preferred.
- Other desired certifications include CISSP, CEH, or GIAC. GWAPT / GPEN (or equivalent)
- Cloud security certifications (e.g., AWS Security Specialty, Azure Security Engineer, GCP Professional Cloud Security Engineer)
Work Style
- Operate independently with ambiguous problem statements and tight timelines.
- Collaborative mindset—able to influence without authority and build strong partnerships with engineering teams.
- High integrity and professionalism when handling sensitive data and access.
총 조회수
0
총 지원 클릭 수
0
모의 지원자 수
0
스크랩
0
비슷한 채용공고

Environment Team Subsurface Water Specialist
Chevron · Bengaluru, Karnataka, India

TECHNOLOGY ARCHITECT L1
Wipro · Bengaluru, India

Software Development Engineer II, Amazon Payments
Amazon · Bengaluru, KA, IND

Custom Software Engineer
Accenture · Bengaluru

Hardware Reliability Engineer, Product Integrity
Amazon · Bengaluru, KA, IND
Honeywell 소개

Honeywell
PublicHoneywell International Inc. is an American publicly traded, multinational conglomerate corporation headquartered in Charlotte, North Carolina. It primarily operates in four areas of business: aerospace, building automation, industrial automation, and energy and sustainability solutions (ESS).
10,001+
직원 수
Charlotte
본사 위치
$130B
기업 가치
리뷰
3.7
10개 리뷰
워라밸
4.2
보상
2.8
문화
3.9
커리어
2.7
경영진
3.1
65%
친구에게 추천
장점
Good work-life balance
Great benefits and job security
Collaborative and friendly environment
단점
Low or uncompetitive compensation
Poor management and communication
Limited growth opportunities
연봉 정보
655개 데이터
Mid/L4
Senior/L5
Mid/L4 · Data Analyst II
2개 리포트
$136,600
총 연봉
기본급
$105,077
주식
-
보너스
-
$136,600
$136,600
면접 경험
3개 면접
난이도
3.0
/ 5
소요 기간
14-28주
합격률
33%
경험
긍정 0%
보통 33%
부정 67%
면접 과정
1
Application Review
2
Recruiter Screen
3
Technical Interview
4
Assessment/Testing
5
Final Interview
6
Offer
자주 나오는 질문
Technical Knowledge
Behavioral/STAR
Past Experience
Problem Solving
Culture Fit
뉴스 & 버즈
American Industrial Partners to acquire Honeywell warehouse automation - Digital Commerce 360
Digital Commerce 360
News
·
1d ago
Honeywell sells Intelligrated division to a private equity firm - DC Velocity
DC Velocity
News
·
2d ago
Honeywell Beat Earnings Expectations. Why the Stock Is Sliding. - Barron's
Barron's
News
·
2d ago
Honeywell disappoints on quarterly results — but delivers on its breakup plan - CNBC
CNBC
News
·
2d ago