Posted:3 months ago|
Platform:
Work from Office
Full Time
Current knowledge of application security best practices, common exploits and threat landscape. >Assess an organizations risk posture based on the resident vulnerabilities and prioritize courses of action to risk. >Experience with application threat modeling or other risk identification techniques>Good Knowledge of security management, network & protocols, data and application security solutions. >Manage the life cycle of application security vulnerabilities, from identification to validation ,remediation and perform a deep technical analysis of vulnerabilities and associated exploits. >Provide technical support to system owners to propose mitigation and remediation solutions to identified vulnerability and security issues for different security tools. >Application Code review and reporting of the vulnerabilities and Experience with one or more enterprise vulnerability scanning tools. >Solid Understanding of vulnerability and threat management and importance of strong process and documentation of VM Workflow. >Identifying opportunities for automation, process integration, and Excellent written and verbal communication skills to draft and present comprehensive vulnerability assessment reports.>Nice to have knowledge about Kubernetes, along with the container build pipeline and repository platform. >Identify, test, and report security weaknesses in networks, systems and applications.
Codigo Technologies
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
My Connections Codigo Technologies
6.0 - 10.0 Lacs P.A.