Experience : 1 to 11Yrs
Job Location : Bangalore
Notice Period:30 Days Only
Interview: 30-November-19(Ready to attend F2F Apply)
Contact Number: 7997966557
Mail id: email@example.com
Cyber Risk Services -Infrastructure Security
The Cyber Risk Services - Infrastructure Security services to assist in the design, development, implementation, and sustainment of an enterprise-wide, long-term, end-to-end VM solution to protect their information and confidential data as well as help them build their businesses and supporting technologies more secure, vigilant and resilient. The Cyber Risk Services - Infrastructure Securityteam delivers services to clients through following key areas: Perform analysis to identify vulnerabilities within an organization's security framework and IT/ business assets; Evaluate an organization's security posture and risk appetite - assess the impactand likelihood that inside/outside threats can exploit vulnerabilities on critical business assets User provisioning; Create and/or optimizeprocesses to integrate vulnerability requirements with IT or security operations; and Align the optimized VulnerabilityManagement program back into the security framework - increaseefficiency and reduce costs.
The key job responsibilities include the following: Works on projects with clearly defined guidelines as team member with responsibility for project delivery Works under general supervision with few direct instructions Performs cyber security assessments which includes vulnerability assessment & penetration testing, network security architecture review, secure configuration / code review, etc. Understands basic business and information technology management processes. Demonstrates knowledge of firm's methodologies, frameworks and tools Participate in practice development initiatives
The key skills required are as follows: Understanding of basic business and information technology management processes Good knowledge of TCP/ IP and Networks including Firewall, IDS/IPS, Routers, Switches, and network architecture Experience in Infrastructure Penetration Testing and Application Security Testing Experience in Secure Code Review (Code Security Review) Experience in conducting configuration reviews of Windows, Linux, UNIX, Solaris, Databases, etc. Experience with Vulnerability Management tools: Kali Linux, Acunetix, AppScan, Nexpose, Qualys Guard, Nessus, Nmap, Metasploit, Fortify etc. Experience in basic scripting such as: Shell, Python, PERL, etc. Basic knowledge of Technoilogies such as: IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Sun NetManage, Cisco Works, Radius, Big Brother, F5.
Additional Skills Strong analytical and communication skills (written, verbal and presentation) Open to learn new tools and technologies as per the project requirement Interactive with team members and confident during client meetings, under the guidance of senior members of the project Initiative & drive Be deadline-oriented and quality-focused Familiarity with industry standards and frameworks such as OWASP, CIS, NIST ISO/IEC 17799, etc. Demonstrates basic knowledge of security and privacy controls and risk management processes Demonstrates basic knowledge in one or more Cyber Threat Management domains such as: Threat Management, Cyber Operations/Fusion Managed Services, Malware Analysis, Collective Threat Intelligence and Cyber Risk Sciences, Incident Management and Forensics, Data Protection solution