Job Title: T&T-Cyber-D&R-ASM-VAPT-AM-Gurgaon
Work you’ll do As a part of our Risk Advisory team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations.
You’ll:
• Works on projects with clearly defined guidelines as team member with responsibility for project delivery
• Works under general supervision with few direct instructions
• Performs cyber security assessments which includes vulnerability assessment & penetration testing, network security architecture review, secure configuration / code review, etc.
• Understands basic business and information technology management processes.
• Demonstrates knowledge of firm's methodologies, frameworks, and tools
• Participate in practice development initiatives The key skills required are as follows:
• Understanding of basic business and information technology management processes
• Good knowledge of TCP/ IP and Networks including Firewall, IDS/IPS, Routers, Switches, and network architecture
• Experience in Infrastructure Penetration Testing and Application Security Testing
• Experience in Secure Code Review (Code Security Review)
• Experience in conducting configuration reviews of Windows, Linux, UNIX, Solaris, Databases, etc.
• Experience with Vulnerability Management tools: Kali Linux, Acunetix, AppScan, Nexpose, Qualys Guard, Nessus, Nmap, Metasploit, Fortify etc.
• Experience in basic scripting such as: Shell, Python, PERL, etc.
• Basic knowledge of Technologies such as: IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Sun NetManage, Cisco Works, Radius, Big Brother, F5
Role and Responsibilities :
• Understanding of basic business and information technology management processes
• Good knowledge of TCP/ IP and Networks including Firewall, IDS/IPS, Routers, Switches, and network architecture
• Experience in Infrastructure Penetration Testing and Application Security Testing
• Experience in Secure Code Review (Code Security Review)
• Experience in conducting configuration reviews of Windows, Linux, UNIX, Solaris, Databases, etc. ,
• Experience with Vulnerability Management tools: Kali Linux, Acunetix, AppScan, Nexpose, Qualys Guard, Nessus, Nmap, Metasploit, Fortify etc.
• Experience in basic scripting such as: Shell, Python, PERL, etc.
• Basic knowledge of Technoilogies such as: IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Sun NetManage, Cisco Works, Radius, Big Brother, F5
• Understanding of basic business and information technology management processes
• Good knowledge of TCP/ IP and Networks including Firewall, IDS/IPS, Routers, Switches, and network architecture
• Experience in Infrastructure Penetration Testing and Application Security Testing
• Experience in Secure Code Review (Code Security Review)
• Experience in conducting configuration reviews of Windows, Linux, UNIX, Solaris, Databases, etc. • Experience with Vulnerability Management tools: Kali Linux, Acunetix, AppScan, Nexpose, Qualys Guard, Nessus, Nmap, Metasploit, Fortify etc.
• Experience in basic scripting such as: Shell, Python, PERL, etc.
• Basic knowledge of Technoilogies such as: IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Sun NetManage, Cisco Works, Radius, Big Brother, F5