IoT Penetration Tester

  • Full Time
  • Fort Lauderdale, FL
  • $70,000 - $90,000 USD / Year
  • This position has been filled

Website Ovise - Tech Talent Partners |

Partnering on this search with an industry utility organization!

Ovise has partnered on this search with an industry-leading utility organization! They are seeking a Penetration Tester with a focus on hacking IoT devices.

You will be responsible for testing the security of IoT devices, networks, and applications to identify vulnerabilities and provide actionable recommendations. Your expertise will play a crucial role in safeguarding our IoT products and ensuring they meet the highest security standards.

Key Responsibilities:

  • Conduct penetration testing on IoT devices, networks, and applications to identify vulnerabilities.
  • Simulate real-world attacks on IoT systems to assess their resilience against cyber threats.
  • Develop and execute test plans, scripts, and methodologies specific to IoT environments.
  • Analyze and document security findings, providing clear, actionable remediation recommendations.
  • Collaborate with development, engineering, and security teams to integrate security measures into IoT products from the ground up.
  • Stay updated on the latest IoT security threats, tools, and techniques to continuously improve testing strategies.
  • Provide detailed reports and presentations on findings, including risk assessments and mitigation strategies.

Qualifications:

  • Bachelor’s degree in Cybersecurity, Computer Science, or related field.
  • Minimum of 5 years of experience in penetration testing, with a focus on IoT devices and ecosystems.
  • Strong knowledge of IoT protocols (e.g., MQTT, CoAP, BLE), embedded systems, and wireless communication.
  • Experience with tools such as Burp Suite, Wireshark, Metasploit, and other IoT-specific testing framework.
  • Proficiency in programming/scripting languages (e.g., Python, C, JavaScript) for developing custom testing tools.
  • Understanding of common IoT vulnerabilities, such as firmware attacks, hardware exploitation, and network-based threats.