Posted:3 weeks ago|
Platform:
Hybrid
Full Time
Deep understanding of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols, devices, security mechanisms and how they operate.
In-depth knowledge of attack vectors, exploitation techniques, and vulnerability assessment methodologies.
Experience with industry-standard penetration testing tools and frameworks.
Deep technical knowledge of Windows, UNIX and Linux operating systems as both an expert user and system administrator
Programming skills that will be used to construct, modify, and execute testing tools including shell (ksh, bash), [g]awk, Python, PERL, regex, .NET Programming, Java, C, C++, C#, PowerShell, curl, Web application development (PHP, ASP.NET, etc.)
Comprehensive knowledge of software security testing principles, practices, and tools, experience of vulnerability assessments in a complex environment.
Experience or familiarity with vulnerability analysis, computer forensics tools, cryptography principles
Excellent teamwork skills for collaboration on analysis techniques, implementation, and reporting. Must be able to work both independently as well as effectively in teams of individuals with a variety of skills and backgrounds.
Excellent written and verbal communication skills and have demonstrated ability to present material to senior officials.
Highly self-motivated requiring little direction.
Demonstrates creative/out-of-the-box thinking and good problem-solving skills.
Demonstrates strong ethical behavior.
Sense of urgency and attention to detail
Strong knowledge of an enterprise architecture
Ability to obtain a strong and ongoing understanding of the technical details involved in current APT threats and exploits involving various operating systems, applications and networking protocols.
Knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.
Understanding of cloud-based architectures and highly distributed big data architectures
Experience with application security testing tools, such as the Metasploit framework and Burp Suite
One or more of these certifications
CEH: Certified Ethical Hacker /CPT: Certified Penetration Tester/
BS/MS degree in Computer Science, Cyber Security, Engineering, or related technical field
Prior experience with Telecom sector.
Randstad
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
hyderabad, bengaluru
35.0 - 45.0 Lacs P.A.
5.0 - 9.0 Lacs P.A.
5.0 - 9.0 Lacs P.A.
mumbai
7.0 - 11.0 Lacs P.A.
bangalore rural
12.0 - 22.0 Lacs P.A.
12.0 - 22.0 Lacs P.A.
3.0 - 5.0 Lacs P.A.
4.0 - 7.0 Lacs P.A.
4.0 - 7.0 Lacs P.A.
nagpur
17.0 - 25.0 Lacs P.A.