You want more out of a career. A place to share your ideas freely — even if they’re daring or different. Where the true you can learn, grow, and thrive. At Verizon, we power and empower how people live, work and play by connecting them to what brings them joy. We do what we love — driving innovation, creativity, and impact in the world. Our V Team is a community of people who anticipate, lead, and believe that listening is where learning begins. In crisis and in celebration, we come together — lifting our communities and building trust in how we show up, everywhere & always. Want in? Join the V Team Life.
The ability to lead and perform full scope penetration testing on complex web applications, Infrastructure, APIs and Mobile applications.
Configuring and safely utilizing attacker tools, tactics, and procedures for Verizon environments.
Developing comprehensive and accurate reports and presentations for both technical and executive audiences.
The ability to make collaborative decisions on the impact of an exposure to Verizon.
Acting as a SME and guide, advising on security vulnerability impact, ratings and remediation recommendations across the organization as needed.
Helping define the Pen Test strategy and standards to further enhance the company’s security posture.
Effectively communicating findings and strategy to client stakeholders including technical staff, executive leadership, and legal counsel.
Working closely with stakeholders and developers providing risk-appropriate and pragmatic recommendations tocorrect found vulnerabilities.
Developing scripts, tools, or methodologies to enhance Verizon’s pen testing processes and effectiveness.
Driving technical oversight and mentoring junior pen testers on pen test engagements, vulnerability impact and ratings and remediation recommendations.
Providing leadership and guidance to advance the offensive capabilities of the team and its subsequent ability to defend the Verizon Enterprise.
Bachelor’s degree or four or more years of work experience.
Four or more years of relevant work experience.
Three or more years’ relevant pen testing or security experience.
A degree in engineering, cyber security or computer science.
Deep understanding of OWASP Top 10, OWASP API Top 10, MASVS.
Strong knowledge of tools used for API, infrastructure, web application, mobile, and network security testing, such as Kali Linux, Metasploit, Wireshark, Burp suite, Cobalt Strike, Nessus, Web Inspect, SQLMap.
3 or more years of application development experience.
Knowledge of secure software deployment methodologies, tools, and practices.
Experience with application security risk procedures, security patterns, authentication technologies and security attack pathologies.
Certifications such as: GXPN, GPEN, eWPT, GCIH, GWAPT, OSCP, OSWA, OSCE, OSWE.
Service Delivery/Governance: ITILv2/3.
Solid understanding of common hosting environments such as containerization platforms (e.g., Docker and Kubernetes) and virtual machines running under hypervisors.
An implementation level familiarity with all common classes of modern exploitation.
Mastery of Unix/Linux/Mac/Windows operating systems, including bash and Powershell.
Programming skills preferred and encouraged, as well as the ability to read and assess applications written multiple languages, such as Python, JAVA, .NET, C#, or others.
Experience with system and application security threats and vulnerabilities and secure configuration management techniques, software debugging principles, software design tools, methods, and techniques, software development models (e.g., Waterfall Model, Spiral Model).
Knowledge of secure coding techniques.
Some experience with software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, and simplicity/minimization).
Knowledge of secure software deployment methodologies, tools, and practices.
Knowledge in discerning the protection needs (i.e., security controls) of information systems and networks.
Strong organization skills and demonstrated ability to manage multiple, often conflicting priorities to successful completion.
Be a continuous learner; with a desire to stay current on security trends, tool, technologies and best practices.
If Verizon and this role sound like a fit for you, we encourage you to apply even if you don’t meet every “even better” qualification listed above.
In this hybrid role, you’ll have a defined work location that includes work from home and a minimum eight assigned office days per month that will be set by your manager.