Advanced Cyber Sec Archt/engr

Honeywell Honeywell · Industrial · Bengaluru, Karnataka, India

This role focuses on assessing the security of GenAI/LLM-enabled systems, including RAG and agentic workflows. Responsibilities include identifying vulnerabilities like prompt injection, data exfiltration, and tool abuse, evaluating guardrails, and reporting findings to engineering teams for remediation. The role requires hands-on penetration testing experience across various domains, with a specific emphasis on GenAI security.

What you'd actually do

  1. Perform GenAI security assessments for LLM/RAG/agentic workflows, including prompt injection, data exfiltration paths, tool/function-call abuse, insecure plugin/tooling, model output handling, and evaluation of guardrails.
  2. Plan and execute manual and automated penetration tests for web applications (OWASP Top 10, SANS 25), including authentication, authorization, business logic, session management, and SSO testing (SAML 2.0, OAuth 2.0, OpenID Connect).
  3. Perform API security testing (REST/GraphQL/gRPC) including schema abuse, authz bypass, injection, mass assignment, broken object-level authorization (BOLA).
  4. Conduct cloud security assessments across AWS/Azure/GCP (as applicable): IAM review, storage exposure, network controls, secrets handling, logging/monitoring, and common misconfiguration exploit paths.
  5. Assess infrastructure security including Linux/Windows hosts, Active Directory, container platforms, Kubernetes; validate privilege escalation and lateral movement paths where authorized.

Skills

Required

  • 5+ years of hands-on experience performing penetration tests and security assessments (web, API, cloud, and infrastructure), with strong manual penetration testing capability.
  • Strong web exploitation experience across common vulnerability classes (e.g., injection, SSRF, deserialization, authn/authz flaws, XXE, IDOR, CSRF, and business logic abuse).
  • Proven experience testing APIs using tools and custom scripts; ability to interpret OpenAPI/Swagger specs and derive abuse cases.
  • Experience conducting cloud security assessments (AWS/Azure/GCP) including networking, and common misconfigurations; familiarity with cloud-native attack paths.
  • Experience assessing infrastructure across Linux/Windows, networking fundamentals, and privilege escalation techniques; exposure to AD and container/Kubernetes environments.
  • Exposure to GenAI security testing and assessment approaches (prompt injection, RAG data exposure, indirect prompt injection, model/tool abuse, sensitive data handling).
  • Develop custom security testing scripts, automated tools, and frameworks to improve testing efficiency and coverage.
  • Deep knowledge of OWASP Top 10, SANS Top 25, and common attack vectors.
  • Proficiency in penetration testing tools (e.g., Metasploit, Burp Suite, Nmap, Nessus).
  • Proficiency with at least one scripting language (Python preferred) for automation and exploit development/support.
  • Solid understanding of networking protocols (TCP/IP, HTTP/S, DNS)
  • Strong written and verbal communication skills with demonstrated experience producing professional pentest reports.
  • Experience working within defined rules of engagement and handling sensitive data responsibly.

Nice to have

  • Experience with adversary emulation/red teaming, phishing simulations, or purple team engagements.
  • Experience assessing mobile apps (iOS/Android) and thick clients.
  • Threat modelling experience and secure design review participation.
  • Experience building security test harnesses for LLM applications (prompt test suites, red-team datasets, model behavior evaluation).
  • Bug bounty track record, public research, CVEs, conference talks, or open-source contributions.
  • Power BI skills: ability to build security metrics dashboards and reports (DAX basics, data modeling, and visualization best practices).
  • OSCP (Offensive Security Certified Professional)
  • CISSP, CEH, or GIAC. GWAPT / GPEN (or equivalent)
  • Cloud security certifications (e.g., AWS Security Specialty, Azure Security Engineer, GCP Professional Cloud Security Engineer)

What the JD emphasized

  • hands-on offensive security experience
  • manual penetration testing capability
  • GenAI security testing and assessment approaches

Other signals

  • GenAI security assessments
  • LLM/RAG/agentic workflows
  • prompt injection
  • data exfiltration paths
  • tool/function-call abuse
  • insecure plugin/tooling
  • model output handling
  • evaluation of guardrails