Sr Cyber Security Red Team Attack

8 - 13 years

35 - 45 Lacs

Posted:3 weeks ago| Platform: Naukri logo

Apply

Work Mode

Hybrid

Job Type

Full Time

Job Description

Role & responsibilities

red team operations.

Deep understanding of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols, devices, security mechanisms and how they operate.

Distributed Denial of Service (DDoS) attacks

In-depth knowledge of attack vectors, exploitation techniques, and vulnerability assessment methodologies.

Experience with industry-standard penetration testing tools and frameworks.

network probing/testing/analysis tools (Nessus, nmap, burp, wireshark, etc.)

Deep technical knowledge of Windows, UNIX and Linux operating systems as both an expert user and system administrator

Programming skills that will be used to construct, modify, and execute testing tools including shell (ksh, bash), [g]awk, Python, PERL, regex, .NET Programming, Java, C, C++, C#, PowerShell, curl, Web application development (PHP, ASP.NET, etc.)

Comprehensive knowledge of software security testing principles, practices, and tools, experience of vulnerability assessments in a complex environment.

Experience or familiarity with vulnerability analysis, computer forensics tools, cryptography principles

Excellent teamwork skills for collaboration on analysis techniques, implementation, and reporting. Must be able to work both independently as well as effectively in teams of individuals with a variety of skills and backgrounds.

Excellent written and verbal communication skills and have demonstrated ability to present material to senior officials.

Highly self-motivated requiring little direction.

Demonstrates creative/out-of-the-box thinking and good problem-solving skills.

Demonstrates strong ethical behavior.

Sense of urgency and attention to detail

Desirable skills:

Strong knowledge of an enterprise architecture

Ability to obtain a strong and ongoing understanding of the technical details involved in current APT threats and exploits involving various operating systems, applications and networking protocols.

Knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors.

Understanding of cloud-based architectures and highly distributed big data architectures

Experience with application security testing tools, such as the Metasploit framework and Burp Suite

One or more of these certifications

CEH: Certified Ethical Hacker /CPT: Certified Penetration Tester/

OSCP: Offensive Security Certified Professional

BS/MS degree in Computer Science, Cyber Security, Engineering, or related technical field

Prior experience with Telecom sector.

Additional information (if any):

Mock Interview

Practice Video Interview with JobPe AI

Start Job-Specific Interview
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

coding practice

Enhance Your Skills

Practice coding challenges to boost your skills

Start Practicing Now
Randstad logo
Randstad

Staffing and Recruiting

Atlanta GA

RecommendedJobs for You