Nous recherchons un

Vice President - Vulnerability Assessments – Red Team / Penetration Tester Senior Analyst - CIB NAR

Horaires Temps plein
Marque BNP Paribas Corporate & Institutional Banking
Niveau d'expérience 6 à 10 ans
Niveau d'études Niveau BAC+2/3
Postuler REF: INF000465

About BNP Paribas:

BNP Paribas is a leading bank in Europe with an international reach. It has a presence in 72 countries, with more than 202,600 employees, of which almost 155,000 in Europe. The Group has key positions in its three main activities: Domestic Markets and International Financial Services (whose retail-banking networks and financial services are covered by Retail Banking & Services) and Corporate & Institutional Banking, which serves two client franchises: corporate clients and institutional investors. The Group helps all its clients (individuals, community associations, entrepreneurs, SMEs, corporates and institutional clients) to realize their projects through solutions spanning financing, investment, savings and protection insurance. 

In Europe, the Group has four domestic markets (Belgium, France, Italy and Luxembourg) and BNP Paribas Personal Finance is the European leader in consumer lending.

BNP Paribas is rolling out its integrated retail-banking model in Mediterranean countries, in Turkey, in Eastern Europe and a large network in the western part of the United States. In its Corporate & Institutional Banking and International Financial Services activities, BNP Paribas also enjoys top positions in Europe, a strong presence in the Americas as well as a solid and fast-growing business in Asia-Pacific.

www.cib.bnpparibas.com


Business Overview:

The Vulnerability Assessments (VA) Team is the offensive security arm of BNPP Cyber Security. The team is responsible for managing the Penetration Testing and Red Team Assessments program.

The Vulnerability Assessments (VA) Team performs global intelligence-led exercises against people, process, and technology. The Red Team challenges the organization to improve the effectiveness of Cyber Security by conducting exercises using the same Tactics, Techniques and Procedures (TTPs) as real adversaries. To be successful in this role, candidates are expected to act as subject matter experts in offensive security with a proven track record in exploitation, escalation of privileges, and lateral movement.

Candidate Success Factors:

Candidates will be measured on the following four performance drivers which will dictate how individual impact is considered on the Americas platform:

  • Results and Impact
  • Leadership and Collaboration
  • Client, Customer and Stakeholder Focus
  • Compliance Culture and Conduct

Responsibilities:

  • Develops, manages, and oversees offensive cybersecurity tests to validate the completeness and effectiveness of cybersecurity controls.
  • Manages vendor contracts, relationships, and staff for the execution of cybersecurity tests.
  • Designs, builds, and improves the technical infrastructure necessary to perform cybersecurity testing by both in-house and outsourced penetration testers who are executing either remotely or onsite.
  • Assist infrastructure and application owners in validating their remediation efforts for findings resulting from offensive cybersecurity test.
  • Lead penetration testing and red team assessments.
  • Lead, plan, and execute all Social Engineering simulations.
  • Analyze cyber intelligence and design attack models for use against the organization.
  • Testing of the overall security of critical infrastructure components and applications to ensure they comply with internal policies, security architecture best practices, and industry standards.
  • Supporting Purple Team operations.
  • Reporting information security vulnerabilities to businesses and vendors.
  • Act as thought leaders for addressing new security challenges such as IoT, cloud, robotics, and artificial intelligence.
  • Conduct vulnerability assessments and penetration tests (application and/or infrastructure) and articulate security issues to technical and non-technical audience.
  • Identify, research, and validate known and unknown exploits on cyber infrastructure.
  • Work closely with the Blue Team to identify gaps, address findings, and improve breach response.
  • Act as advisors for the Blue Team during major events and hunt activities.


Minimum Required Qualifications

  • Strong problem solving and analytical skills, verbal and written communication skills.
  • Excellent interpersonal skills and the ability to work effectively with others as a team.
  • Ability to work independently and effectively managing and prioritizing multiple tasks.
  • Solid understanding of IT security concepts with an emphasis on Security and Risk Assessment.
  • Knowledge and experience with law and regulations surrounding the financial services sector.
  • Advanced user of Microsoft Excel, Microsoft Word and Microsoft PowerPoint.
  • Excellent understanding of networking concepts and Information Security, including emerging threats and attack methodologies.
  • Demonstrable understanding of Information Technology principles, including software, hardware, and networking.
  • A broad understanding of all areas of banking and the threats faced by the financial sector.
  • Strong ability to analyze threat actor TTPs at a highly detailed and technical level, examine and develop the controls, lead and execute tests of those controls using penetration testing and red team techniques.
  • Conducting adversary emulations and penetration testing (application and/or infrastructure) and articulating security issues to technical and non-technical audience.
  • Identifying, researching, validating, and exploiting various different known and unknown security vulnerabilities on server and client side.
  • Conducting Purple Team Testing.
  • Creating metrics to establish value to senior management.
  • Define cyber KPIs.
  • Vulnerability Assessment tools, e.g. Nessus, Qualys, etc.
  • Strong familiarity with at least one major pen testing framework (MITRE ATT@CK, CBEST) and the ability to self-learn new frameworks as required.
  • Exploitation frameworks, e.g. Metasploit, CANVAS, Core Impact.
  • Post-Exploitation Frameworks: Cobalt Strike, SILENTTRINITY, Covenant, Faction, Merlin, APfell, Red Team Toolkit, Voodoo.
  • Social Engineering campaigns, e.g. email phishing, phone calls, SET.
  • Deep understanding of OSI model.
  • Security devices, e.g. Firewalls, VPN, AAA systems.
  • OS Security, e.g. Unix, Linux, Windows, Cisco, etc.
  • Understanding of common protocols, e.g. LDAP, SMTP, DNS, Routing Protocols.
  • Web development and programming languages i.e. Python, Perl, Ruby, Java, and/or .Net.
  • Reporting information security vulnerabilities to businesses.

Preferred Qualifications:

  • Bachelor degree in Computer Science or Engineering (relevant concentration preferred) with 5-10+ years of experience preferably within a pen test or red team function in the financial sector; or a Graduate Degree (Masters) in MIS.
  • Information Security certifications (e.g., CISSP, CISA, CISM, SANS coursework).
  • SharePoint administration and document management.
  • Understanding of the Tactics, Techniques, and Procedures of cyber threat actors.
  • Understanding of geo-political dynamics and how they affect the wider cyber threat landscape.
  • Experience working with the Kill Chain, Diamond Model of Intrusion and similar frameworks and concepts.
  • Excellent writing and presentation skills to communicate findings and recommendations to different audiences and stakeholders.

FINRA Registrations Required: 

N/A

BNP Paribas is committed to providing a work environment that fosters diversity, inclusion, and equal employment opportunity without regard to race, color, gender, age, creed, sex, religion, national origin, disability (physical or mental), marital status, citizenship, ancestry, sexual orientation, gender identity and gender expression, or any other legally protected status.


Primary Location: US-NJ-Jersey CityJob Type: Standard / PermanentJob: MISCELLANEOUSEducation Level: Bachelor Degree or equivalent (>= 3 years)Experience Level: At least 7 yearsSchedule: Full-time Reference: INF000465