Programming Languages: candidate need to have prior exp Java C #,C
Platform/Environment: - Windows, Unix/Linux, Mac OSX
Database Management System: Oracle, MySQL, MS SQL
Application Packages, etc.:
Years of experience on each of the Technical must have skills: - 7 plus years exp
Vulnerability Assessment Tools mandatory - IBM Appscan, Burp Suite, Dirbuster, OWASP top 10, SAN 25, ZAP Proxy, Qualys, Kali Linux, Metasploit, Accunetix, HP Web inspect, Qradar, SIEM, SOAPUI
Any Certifications required: Certified Ethical Hacker (CEH)
Detailed Job Description:
Candidate will be working as Information Security architect who can help with security assessment for verifi applications.
Ideally we would be looking at some one with strong threat modeling and pentest skills exp in Vulnerability Assessment Tools - IBM Appscan, Burp Suite, Dirbuster, OWASP top 10, SAN 25, ZAP Proxy, Qualys, Kali Linux, Metasploit, Accunetix, HP Web inspect, Qradar, SIEM, SOAPUI
Will be added advantage if candidate is Certified Ethical Hacker (CEH)
Perform web application penetration testing and vulnerability assessments.
Manual security testing on client applications.
Web Application penetration testing, Network Infrastructure Penetration Testing.