We are seeking a cybersecurity professional to join our Technology Consulting Cyber Tech, Advisory team, with responsibilities spanning both vulnerability assessment and penetration testing. This role involves performing vulnerability assessments, configuration reviews, internal and external scanning, vulnerability management, and supporting cyber testing practices. The candidate would also have penetration testing experience, simulating cyberattacks to identify and attempt to exploit vulnerabilities in systems, networks, and applications
4-6 years detailed hands-on experience with cybersecurity testing including vulnerability management and penetration testing.
Strong understanding and hands on experience with cyber testing tools like Nessus, Burp Suite, Nmap, Kali linux.
Strong understanding of operating systems and network security technologies, including TCP/IP, firewalls, IDS/IPS, LAN/WAN, routing, switching, and enterprise platforms such as Windows and Linux.
Excellent collaboration, communication, and client facing skills (both written and verbal).
Excellent problem diagnosis and analytical skills.
Strong English verbal and written communication skills, including excellent report writing skills coupled with an acute attention to detail.
Ability to manage and deliver in all aspects of testing including scoping, execution, reporting and stakeholder management as well as experience in dealing with technical and business stakeholders throughout all phases of the engagement.
Ability to work in a team environment with deadlines and multiple priorities while achieving project schedules and milestones.
Demonstrate a strong curiosity for learning and expanding knowledge in the field.
BE/B.Tech or Graduation with science background
Knowledge of programming languages and scripting languages (Perl/Python/Ruby)
Experience working with AppSec penetration testing methodologies (i.e. OWASP) with working knowledge of Web, Mobile, API architectures and testing methodologies.
Assist and conduct internal and external vulnerability assessments.
Conducting internal and external penetration tests on networks, systems, and applications.
Simulating real-world attacks to test the effectiveness of security controls.
Documenting findings in written reports with detailed narratives, proof-of-concept evidence, and remediation recommendations.
Staying current with emerging threats, tools, and techniques in cybersecurity.
Software Powered by iCIMS
www.icims.com