Job Description
- Hands-on experience with key components of Cybersecurity including Penetration Testing, Red teaming, Vulnerability management, Network & Infrastructure security, managed detection and response.
- Expert knowledge and practical experience with common frameworks, standards and methodologies used such as MITRE, OWASP, NIST Cybersecurity, IS /2.
- Practical experience with conducting penetration tests and executing red team engagements.
- Possession/working towards the following certifications: CISSP, CISA CISM, OSCP, GPEN, GWAPT
- Experience with Dark Web Monitoring and Crawlers
- Prior experience or expertise performing Red team exercises will be a plus
- Experience in writing proof-of-concept exploits and creating custom payloads and modules for common ethical hacking frameworks and tools
- Well versed in system exploits (. Buffer Overflows, PTH attacks, windows authentication framework etc.), network exploitation (. VLAN hopping) or web application exploitation
- Well versed with security tools & frameworks like Metasploit, Core, Canvas etc.
- Should be able to formulate Enterprise Security Strategy, Security policy development
- Should be able to face the security audit and provide responses
- Identify and manage access control strategy
- Need to own and enhance the project security architecture
- Experience in penetration testing, VA, Cyber security testing.
- Is a single point of contact for the security framework implementation and maintenance
- Should have experience in application security tools and interpretation of reports
- Should be aware of top 20 OWASP vulnerabilities and ways to overcome them.
- Should have experience on Load balancers from Radware & F5
- Should have implementation experience for DDOS and WAF
- Should be able to implement robust solutions to overcome the security issues.