Cybersecurity - Senior Consultant - Iot Security Testing

Ernst & Young LLP Chicago , IL 60602

Posted 7 days ago

In a rapidly changing IT environment, clients from all industries look to us for trusted solutions for their increasingly complex risks and vulnerabilities. As a member of our Next Generation Security Operations and Response (NGSOR) team you'll be right at the heart of that goal, helping clients gain insight and context to their cyber threats and assessing, improving, and building security operations in order to mitigate these threats. You'll get to use your technical and business skills in order to help us drive this mission and have an impact on cyber security at a global level.

The opportunity

You'll work alongside respected industry professionals, learning about and using the latest tools and techniques to identify and overcome some of the most relevant and pressing security issues in the world. It's a highly specialized area, where you'll learn highly sought-after technical skills, all while developing your relationship management abilities - often by working directly on-site with our clients.

What to expect

Our security professionals possess diverse industry knowledge, along with unique technical expertise and specialized skills. The team stays highly relevant by researching and discovering the newest security vulnerabilities, attending and speaking at top security conferences around the world, and sharing knowledge on a variety of topics with key industry groups. The team frequently provides thought leadership and information exchanges through traditional and less conventional communications channels such as speaking at conferences, publishing white papers and blogging.

As part of our Penetration Testing team, you'll identify potential threats and vulnerabilities in connected product/IoT/embedded devices.

Our professionals work together in planning, pursuing, delivering and managing engagements to assess, improve, build, and in some cases operate integrated security operations for our clients.

Your key responsibilities

  • Execute connected product/IoT/embedded device security assessments to identify vulnerabilities and exploit them

  • Conduct security research and devise new attack techniques against connected products

  • Develop custom hardware / scripts to assist in compromising connected product devices.

  • Analyze, disassemble, reverse engineer and exploit connected product.

  • Solve challenging technical problems and devise creative solutions.

  • Perform in-depth analysis of test results and create report that describes findings, exploitation procedures, risks and recommendations.

  • Convey complex technical security concepts to technical and non-technical audiences.

  • Strong analysis skills and attention to detail.

  • Strong written and verbal communication skills with the ability to interact with senior management, technical teams, and key client stake holders.

To qualify for the role, you must have

  • A minimum of 5 years of work experience in penetration testing connected product/IoT/embedded devices or related experience with hardware hacking.

  • Experience with vulnerability assessment and penetration testing of commercial, consumer, and industrial IoT solutions.

  • Ability to perform end-to-end connected product security testing (chip to cloud) including hardware device, device firmware, communications including (i.e. protocols, wireless), supporting mobile applications, back-end infrastructure, API and cloud services.

  • Familiarity and understanding of OWASP IoT top 10 vulnerabilities.

  • Experience with soldering / desoldering hardware components and extraction of embedded device flash chips.

  • Experience with firmware extraction techniques including man-in-the-middle network attacks, memory access attacks, firmware upgrade attacks, and using hardware debugging interfaces such as JTAG, UART, SPI, I2C, USB, and NAND flash chip reader.

  • Experience with firmware extraction, firmware reverse engineering, analysis and identification of security vulnerabilities.

  • Proficiency with software debugging tools such as, Binary Ninja, gdb, Ghidra, IDA Pro, or Radare2, to analyze device software and firmware.

  • Experience with developing custom shell code to exploit embedded device firmware.

  • Experience with intercepting and attacking low power Radio Frequency (RF) communication protocols such as Z-Wave, Zigbee, and BLE; using hardware and software tools such spectrum analyzer, Software Defined Radio (SDR), HackRF and Gqrx.

  • Experience with intercepting and testing communication protocols including MQTT, CoAP, 6LowPan, LWM2M etc using software tools such as Scapy, mitmproxy, tcpdump and Wireshark.

  • Experience with performing bus spying, tampering, spoofing and injection testing techniques.

  • Willingness and ability to travel domestically and internationally to meet client needs; estimated 50% travel required annually.

Ideally, you'll also have

  • Strong understanding of embedded systems architecture and circuit design.

  • Proficiency with hardware description languages such as VHDL or Verilog.

  • Understanding and proficiency with Linux and Unix operating systems.

  • Deep understanding of embedded systems architecture and disassembly / assembly of microprocessors code such as ARM, AVR, MIPS, or x86.

  • Experience with exploiting side-channel attacks against connected product including power, timing, and fault injection techniques using hardware tools such as the Chip Whisperer.

  • Proficiency with performing device monitoring and analysis using logic analyzer hardware tools such as Saleae Logic Pro or Open Workbench Logic Sniffer.

  • Presented at an industry recognized information security event such as DEFCON or participated in CTFs such as IoT village CTF.

  • Deep understanding and experience of fuzzing techniques to discover and exploit identified vulnerabilities.

  • Updated and familiarized with the latest exploits and security trends in connected products.

  • Knowledge of attacking cryptographic protocols including Public Key cryptography.

  • Understanding of hardware, firmware, IoT communication protocols, network, application, API security and popular attacks vectors against IoT devices.

  • An understanding of web-based application vulnerabilities. (OWASP Top 10)

  • Experience testing API, cloud environments, mobile applications, and web applications.

  • Any one of the following certifications: OSWE, OSWP, OSCE, OSEE, GXPN, GWAPT, GMOB.

What we look for

We're interested in intellectually curious people with a genuine passion for cyber security. With your specialization in attack and penetration testing, we'll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry as a whole. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you.

What working at EY offers

We offer a competitive compensation package where you'll be rewarded based on your performance and recognized for the value you bring to our business. In addition, our Total Rewards package includes medical and dental coverage, both pension and 401(k) plans, a minimum of three weeks of vacation plus 10 observed holidays and three paid personal days, and a range of programs and benefits designed to support your physical, financial and social wellbeing.

Plus, we offer

  • Support, coaching and feedback from some of the most engaging colleagues around

  • Opportunities to develop new skills and progress your career

  • The freedom and flexibility to handle your role in a way that's right for you

  • A rewards package tailored to your unique needs

About EY

As a global leader in assurance, tax, transaction and advisory services, we're using the finance products, expertise and systems we've developed to build a better working world. That starts with a culture that believes in giving you the training, opportunities and creative freedom to make things better. Whenever you join, however long you stay, the exceptional EY experience lasts a lifetime. And with a commitment to hiring and developing the most passionate people, we'll make our ambition to be the best employer by 2020 a reality.

Join us in building a better working world. Apply today.

EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, national origin, protected veteran status, disability status, or any other legally protected basis, in accordance with applicable law.

icon no score

See how you match
to the job

Find your dream job anywhere
with the LiveCareer app.
Mobile App Icon
Download the
LiveCareer app and find
your dream job anywhere
App Store Icon Google Play Icon
lc_ad

Boost your job search productivity with our
free Chrome Extension!

lc_apply_tool GET EXTENSION

Similar Jobs

Want to see jobs matched to your resume? Upload One Now! Remove
Consulting Senior Consultant Cyber Security Identity & Access Management

Ernst & Young LLP

Posted 7 days ago

VIEW JOBS 1/9/2021 12:00:00 AM 2021-04-09T00:00 In a rapidly changing IT environment, clients from all industries look to us for trusted solutions for their increasingly complex risks and vulnerabilities. As a part of our Identity and Access Management (IAM) team you'll be right at the heart of that goal, helping clients gain insight and context to their complex IAM environments and assessing, improving, and building infrastructure, processes and policies in order to meet the client's IAM needs. You'll get to use your technical and business skills in order to help us drive this mission and have an impact on cyber security at a global level. The opportunity We currently have a career opportunity for a Senior to be responsible for leading projects or elements of multiple client engagements including service delivery, business development, and related activities. You'll work alongside respected industry professionals, learning about and using the latest tools and techniques to identify and overcome some of the most relevant and pressing security issues in the world. Your Key Responsibilities Our IAM services assist our clients in aligning security management strategy with business goals by managing who has access to which resources and services, as well as enforcing business, privacy, and security policies. Supported by our strategic alliances with third-party vendors, our experienced professionals can provide broad services including: strategy, assessment, testing, and implementation of IAM solutions. Based on your existing experience, knowledge and ambitions, you could have the opportunity to gain experience across a number of our IAM teams, assessing and delivering foundational components of our services. Some of these teams include: Within the Identity analytics & intelligence team, you'll perform assessments in the following areas: * Current state assessments & Application access assessment * Capability maturity and benchmarking assessments * IAM data analytics The IAM strategy team is all about developing IAM strategy and road map comprising of: * Operating model and governance * IAM policies, procedures and standards On our Identity & access transformation team, you'll provide clients with the following: * Design and architecture * Process design and re-engineering * Cloud and mobile apps access management * Access enforcement implementation * Access administration implementation * Elevated access management Also you will help support the Identity and access governance team in: * IAM program management assistance & Privileged access management * Roles and rules management * SOD management and other IAM compliance related activities Skills and Attributes for Success * Knowledge of the current security environment and industry trends to identify engagement and client service issues, communicate this information to the engagement team and client management through written correspondence and verbal presentations * Work closely with engagement manager to co-lead and own multiple parts of the engagement delivery * Ability to consistently deliver quality client services. Drive high-quality work products within expected timeframes and on budget To qualify for the role you must have * A bachelor's degree in a related field and approximately 2-3 years of related work experience; or a graduate degree and approximately 2 years of related work experience * Experience in one or more of the following: * user provisioning and identity management solutions including design or implementation of user provisioning technologies (such as CA eTrust Admin, IBM Tivoli Identity Manager, Securonix, Saviynt); * role-based access control including design and development of user access roles; * directory services products including design or implementation (such as Radiant Logic) * web access control solutions including design and implementation of products (such as RSA Cleartrust, CA/Netegrity Siteminder); analysis of Segregation of Duties * An understanding of access control concepts including directory services, SAML, LDAP, PKI * Experience in process definition, workflow design, and/or and process mapping * A valid driver's license in the US and a valid passport required; willingness and ability to travel internationally and a willingness to travel; travel is estimated at 60-80% Ideally, you'd also have * Strong presentation and communication skills * CISSP, CISM, CISA, CIPT, CIPM, CRISC or other relevant certification desired What we look for We're interested in intellectually curious people with a genuine passion for cyber security. With your broad exposure across IAM, we'll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us - but also to the industry as a whole. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you. What working at EY offers We offer a competitive compensation package where you'll be rewarded based on your performance and recognized for the value you bring to our business. In addition, our Total Rewards package includes medical and dental coverage, both pension and 401(k) plans, a minimum of three weeks of vacation plus 10 observed holidays and three paid personal days, and a range of programs and benefits designed to support your physical, financial and social wellbeing. Plus, we offer * Support, coaching and feedback from some of the most engaging colleagues around * Opportunities to develop new skills and progress your career * The freedom and flexibility to handle your role in a way that's right for you * A rewards package tailored to your unique needs About EY As a global leader in assurance, tax, transaction and advisory services, we're using the finance products, expertise and systems we've developed to build a better working world. That starts with a culture that believes in giving you the training, opportunities and creative freedom to make things better. Whenever you join, however long you stay, the exceptional EY experience lasts a lifetime. And with a commitment to hiring and developing the most passionate people, we'll make our ambition to be the best employer by 2020 a reality. If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible. Join us in building a better working world. Apply today. EY provides equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, national origin, protected veteran status, disability status, or any other legally protected basis, in accordance with applicable law. Ernst & Young LLP Chicago IL

Cybersecurity - Senior Consultant - Iot Security Testing

Ernst & Young LLP