('binary' encoding is not supported, stored as-is) Need a highly technical security individual for Chicago. Someone to execute client's information security risk assessment process for new IT infrastructure development projects and existing production systems and applications on a continuous basis (includes penetration testing and vulnerability research verions of the risk assessment process). Develop quality software code to exploit specfic security vulnerabilities in network protocols, operating systems, applications, and COTS hardware/software components. Conduct security source code reviews of commercial and custom built applications. These are the types of questions you will need to be able to answer: cross-site scripting and the dangers source routing what were the difference in Interrupts for Linux and Windows in writing shell code (smash the stack for fun and profit) Need someone who can write bufferoverlfows and shell code If you are interested, please send a word-formatted copy of your resume to klevyat_private
This archive was generated by hypermail 2b30 : Mon Mar 31 2003 - 09:09:06 PST