Role & Responsibilities
- Lead the efforts towards development and implementation of cyber security architecture for Freight Tiger s application and cloud infrastructure.
- Conduct regular vulnerability assessments to identify and mitigate potential security risks in applications and perform penetration testing to simulate cyberattacks and identify weaknesses in the cloud infrastructure.
- Work and coordinate with engineering teams to fix security vulnerabilities & bugs and integrate security measures into the development lifecycle to ensure security is considered in all stages of software and system development.
- Lead incident response plans to address security incidents and investigate security breaches and provide detailed reports on root causes and recommended actions. Conduct cybersecurity best practices and awareness training campaigns across the organization.
- Plan and implement solutions to monitor network traffic and end user computing devices for unusual activities and potential security threats.
- Participate in regular security audits to assess compliance with security standards.
Ideal Candidate
- Graduation or higher preferably in CS or relevant stream.
- CEH or similar industry certification.
- 3 7 years of relevant experience conducting security and vulnerability assessment of Applications and cloud infrastructure.
- Product Expertise: Strong experience with leading security assessment tools like Burp Suite Metasploit Wireshark Snort and Nmap etc.
- Handson exposure of working with AWS environment including the security services like IAM Guard Duty CloudTrail WAF Shield etc.
- Exposure of participation in the audit process preferably for PCIDSS ISO 2701 SOC II etc.
- Strong attention to detail with an analytical mind and outstanding problemsolving skills. Great awareness of cybersecurity trends and hacking techniques.
security integration,burp suite,vulnerability assessments,metasploit,wireshark,soc ii compliance,cyber security,cyber security architecture,iso 2701 compliance,incident response,cloud infrastructure,penetration testing,security audits,snort,aws,nmap,network monitoring,aws security (iam, guard duty, cloudtrail, waf, shield),pci-dss compliance