
Network Security Device Vulnerability Tester
- Ottawa, ON
- $115,700 per year
- Permanent
- Full-time
- Enhancing security coverage by validating features such as MACSec, TLS/SSL, and authentication mechanisms on Ciena network devices.
- Automating test execution using Linux-based scripting tools (e.g., curl, ssh, bash) to accelerate test cycles and reduce manual overhead.
- Supporting compliance efforts by executing FIPS and Common Criteria tests to ensure our platforms meet government and industry security requirements.
- Providing timely insights by tracking and reporting test progress, raising security findings, and collaborating with development and QA teams to resolve issues efficiently.
- 7+ years of experience
- Linux Systems Administration Proficient in system configuration, hardening, and performance tuning.
- Skilled in shell scripting and automation using tools like bash, curl, scp, and ssh for secure remote access and scripting.
- Automation scripting in Python
- Security Protocol Testing Deep understanding of TLS, SSL, MACSec, and IPSec protocols.
- Experience testing secure data transmission and key exchange mechanisms across different network topologies.
- Network Protocol Testing (L2/L3)
- Strong knowledge of Ethernet, IPv4/IPv6, OSPF, BGP, STP, VLAN, and routing/switching protocols.
- Validated functional and security aspects of protocol implementations on networking gear.
- Vulnerability Assessment Experience using tools such as Nessus and NMAP for vulnerability scanning, CVE validation, and compliance checks.
- Secure Remote Access Familiar with secure remote connection techniques and tools to access, test, and monitor devices under test (DUTs) across isolated and production-like lab environments.
- OS: Linux (Ubuntu, CentOS, Red Hat), Unix
- Tools: Ixia and Spirent
- Protocols: MACSec, TLS/SSL, SSH, IPSec, SNMP, BGP, OSPF
- Standards: FIPS, Common Criteria, NIST, STIG
- Authentication & Encryption Hands-on experience with multi-factor authentication, PKI infrastructure, certificate validation, and testing encryption algorithms (AES, RSA, etc.) in embedded devices.
- Experience using tools such as Trivy, OpenVAS, and custom Linux scripts for vulnerability scanning, CVE validation, and compliance checks. Codenomicon fuzzing tool