About Us: GE is the world's Digital Industrial Company, transforming industry with software-defined machines and solutions that are connected, responsive and predictive. Through our people, leadership development, services, technology and scale, GE delivers better outcomes for global customers by speaking the language of industry.
Role Summary: The Sr Cyber Security Researcher is responsible for delivering controlled threat simulation services against company assets and partnering with business security teams to drive change. This includes threat research, structured attack development, vulnerability research and exploit development / testing, scripting, controlled exploitation of configuration weaknesses and software vulnerabilities, evasion of detection mechanisms and more.
Partner with business IT security teams to drive improvement in IT security as a result of Cyber Security Research engagements
Executing engagements; defining scope, coordinating attacks, executing tests and reporting findings, following an established methodology in accordance with defined processes
Conduct adversary simulation to determine if flaws and exposures can be exploited by unfriendly forces
Research, develop, implement, test and document tools, techniques and tactics used by adversaries to compromise and maintain control of information assets
Coordinate with other teams in IT Risk in development of threat agent profiles
Participate in cross-team Task Forces to drive impact of Cyber Security Research findings as appropriate
Bachelor's Degree in Computer Science or a related technical degree (OR significant professional IT experience)
Relevant experience in executing penetration tests
Relevant of experience in scripting
Relevant, deep, hands-on, technical security experience with at least one of: Wired Network technologies (CISCO routers / switches, Checkpoint), Wireless (WLAN, WIMAX, RFID), Enterprise Storage Systems, UNIX / Linux, Windows / AD, iSeries / zSeries, ORACLE, Web applications and Services, Cryptography, Social Engineering and Open Source Intelligence Gathering (OSINT), Mobile platforms, Software Security (Source Code Auditing and Binary Reversing)
Some experience developing exploit code or novel attacks
We are in the process of transitioning to an improved job application system and in the interim we are operating with two systems. Have your Job ID ready (from the email you received when you applied) to log in and check your application status.
Click the appropriate button. If you don't know your job ID, you can still check your status: use both buttons.