About HireIT People

HireIT People is a staffing and recruiting company.

company website →

Sponsored:

Database Security Engineer← All Jobs

2016-03-31 | Redmond, WA | DOE | 6 Months Contract


Description Sponsored:

Job Title: Database Security Engineer
Location: Redmond, WA
Duration: 6 Months
Primary Skills: SQL and C#/C++ knowledge
Position Type : Contract
Requirement Priority : High

Locals are Highly Preferable

Job description:
Looking for 2-3 Pentest contractors. Looking for people to come in and find security vulnerabilities in SQL 2016 server.
The specific target for the Application Security Component Pentest engagement will be the software, including services and applications that are part of SQL Server 2016 release.
An Application Security Component Pentest will consist on vulnerability discovery at the application layer will focus on identifying flaws documented in both the 2013 OWASP Top 10 and the CWE Top 25 most dangerous software errors.
There is some overlap between the two, but both serve well as references for test case creation during the assignment.
The OWASP Top 10 applies mostly to Web-applications and is listed here as:

2013 OWASP Top 10:
• A1 Injection
• A2 Broken Authentication and Session Management (XSS)
• A3 Cross Site Scripting (XSS)
• A4 Insecure Direct Object References
• A5 Security Misconfiguration
• A6 Sensitive Data Exposure
• A7 Missing Function Level Access Control
• A8 Cross Site Request Forgery (CSRF)
• A9 Using Components with Known Vulnerabilities
• A10 Unvalidated Redirects and Forwards

The CWE Top 25 applies to traditional client/server software as well as Web-applications:
• CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
• CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
• CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
• CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
• CWE-306 Missing Authentication for Critical Function
• CWE-285 Improper Access Control (Authorization)
• CWE-798 Use of Hard-coded Credentials
• CWE-311 Missing Encryption of Sensitive Data
• CWE-434 Unrestricted Upload of File with Dangerous Type
• CWE-807 Reliance on Untrusted Inputs in a Security Decision
• CWE-250 Execution with Unnecessary Privileges
• CWE-352 Cross-Site Request Forgery (CSRF)
• CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
• CWE-798 Use of Hard-coded Credentials
• CWE-805 Buffer Access with Incorrect Length Value
• CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP File Inclusion')
• CWE-494 Download of Code Without Integrity Check
• CWE-863 Incorrect Authorization
• CWE-829 Inclusion of Functionality from Untrusted Control Sphere
• CWE-732 Incorrect Permission Assignment for Critical Resource
• CWE-676 Use of Potentially Dangerous Functions
• CWE-327 Use of a Broken or Risky Cryptographic Algorithm
• CWE-131 Incorrect Calculation of Buffer Size
• CWE-307 Improper Restriction of Excessive Authentication Attempts
• CWE-601 URL Redirection to Untrusted Site (‘Open Redirect’)
• CWE-134 Uncontrolled Format String
• CWE-190 Integer Overflow or Wraparound
• CWE-759 Use of a One-Way hash without a Salt

First priority for evaluation will be on Telemetry, and JSON data. Further scenarios and data services to be defined by the sponsor and group.

TOP 3 must-have skills
a.) SQL and C#/C++ knowledge. At least 3 years (5-8 ideal) years’ experience with Security Penetration testing from a larger firm, specialized consultancy, or as an independent consultant.
b.) Experience performing Application Security Component discovery focusing on OWASP Top 10 and the CWE Top 25 most dangerous software errors.
c.) Experience with Common Attack Vector analysis (Authentication, Authorization, Resource consumption, Input Validation/Sanitization, UI, and Information Disclosure attacks. Transport and Protocol Analysis.)

Featured on ComputerWorld.Com

Thanks & Regards

Avinash Bandari
US IT Recruiter
Hire IT People, LLC
1761 S Street NW Suite # LL4
Washington DC 20009
Tel : (202) 559-7042 or (202) 719-0200 Ext: 127
Fax (866) 507-1637
mailto:avinash@hireitpeople.net
http://www.hireitpeople.com
_
GTalk / IM : avinash.usstaffing

Hire IT People is a Certified Business Enterprise by the Department of Local and Small Business Development, Washington DC.


Share:

Apply
Your Name here
Your Email Address
Enter your message to the company explaining why you are a fit for this job
Please use Microsoft Word format


Similar Jobs:
Sponsored: