Job Description
This role will utilize expertise with information security to discover, analyze, and characterize risks to our network, applications, databases, and other components of our information system. The ideal applicant should be passionate about security, stay up-to-date on the latest technology and industry best practices, and work well in a collaborative team environment.
Responsibilities
- Perform recurring and on-demand scanning of organization systems and cloud environments
- Resolve information security incidents, including targeted threats and internal incidents
- Maintain documentation / standard operating procedure(SOP) regarding threat management, including policies and procedures
- Assist technology teams to test, implement, and automate security solutions
- Research and assess emerging security threats and vulnerabilities
- Communicate the risks of identified vulnerabilities and recommend security controls to mitigate them
Required Skills
Bachelor s degree in computer science, information security, or a related fieldWork with internal stakeholders to ensure compliance with regulatory requirements and security policiesUnderstanding of Networking and web / mobile application tools like Nessus, Burpsuite, Nmap and Metasploit, etc,Hands on experience on Linux operating systems like Kali, Ubuntu, Parrot Linux OS is an added advantageKnowledge of technical concepts such as cloud computing, automation, networking, and application developmentProfessional certification such as CEH, CISSP is not mandatory but an added advantageKnowledge of vulnerability data management and reporting process automationKnowledge of OWASP Top 10 and Sans Top 25 methodologiesBasic knowledge of scripting languages such as PythonRole : IT & Information Security – Other
Industry Type : IT Services & Consulting
Department : IT & Information Security
Employment Type : Full Time, Permanent
Role Category : IT & Information Security – Other
Education
UG : Any Graduate
PG : Any Postgraduate
Key Skills
Computer scienceUbuntuCloud computingLinuxData managementInformation securityApplication developmentApplication securityVulnerability assessmentPython
Skills Required
Cloud Computing, Metasploit, Networking, Nessus, Nmap, Automation, Ubuntu, Burpsuite, Kali, Information Security, Owasp Top 10, Application Development, Python