drjobs VAPT Pentester / Web Application Security

VAPT Pentester / Web Application Security

Employer Active

1 Vacancy
drjobs

Job Alert

You will be updated with latest job alerts via email
Valid email field required
Send jobs
Send me jobs like this
drjobs

Job Alert

You will be updated with latest job alerts via email

Valid email field required
Send jobs
Job Location drjobs

Bangalore - India

Monthly Salary drjobs

Not Disclosed

drjobs

Salary Not Disclosed

Vacancy

1 Vacancy

Job Description

Greetings from Netsach - A Cyber Security Company.


We are looking for Web Application Security with 3 yrs of relevant experience and mandatory skills set are Web Application Security Security Code review API security Underlying infrastructure security Integration Security Database Security Secure Configuration Review.


Job Title: Web Application Security

Exp: 3 - 5yrs

Job Location: Bangalore

Job Type: Full-time


Interested candidates please share your resume at and



Job Description

1. Job Overview

The primary purpose is to Design Engineer & eventually Embed practical & balanced cyber / information security principles/patterns/controls into all products and platforms. Conduct security assessments gap analysis provide remediation to the relevant squads / stakeholders.

2. Job Purpose

Primary/General Job Purpose:





Key Skills Web Application Security Security Code review API security Underlying infrastructure security Integration Security Database Security Secure Configuration Review.



Experience with following Components:

3. Technical Requirements

Application Security Assessment Skillset

  1. Web Application Security Owasp top 10 CVSS etc
  2. Security Code Review manual code review in Git etc
  3. API Security Review Open shift container review etc.
  4. Database Security Requirements to enhance security on Database
  5. Web Server Security Requirements to enhance security on the web server
  6. Configuration Review has performed different configuration reviews and should have found good misconfigurations in the system.
  7. Integration review How the application connects with different systems performed security review on those integrations.
  8. Transport Layer Security How communication channels are secured and understanding of the Transport layer security mechanisms and controls.



Soft Skills:



4. Person Specifications

Specifications

Description of Knowledge / Skill etc.

Desirable or Essential


  1. Education

Bachelors degree in a computer-related field such as computer science cyber/information security discipline physics mathematics or similar



  1. Experiences

(Years & Type)

Must have minimum 3 years of experience in an information security function with good background in information technology stakeholder management and people management


  1. Knowledge & Skills

Expert at the Web application Security testing in depth testing skillset and ability to bypass weak implementation for attacks ability to bypass WAF for attack scenarios such as XSS SQL Injection etc.


Good understanding of Microservice based architecture (Technical)



Good hands-on experience solutioning technology architectures that involve perimeter protection core protection and end-point protection/detection & API /Micro services Security


Experience working in a DevOps environment with knowledge of Continuous Integration Containers DAST/SAST tools and building Evil Stories (Technical)


The Analyst / Engineer should be able to understand how different systems work and what security controls are implemented in such integrations.


The Analyst / Engineer should be capable in understanding the hardening standards creating one if not available and perform the testing against the hardening standards.

The Analyst / Engineer should be capable of assessing security flaws in underlying infrastructure and the connected components.


The Analyst / Engineer should be capable of assessing the security flaws in the Transport Layer.


The Analyst / Engineer has the skill to follow design principles and applies design patterns to enforce maintainable and reusable patterns in the form of code or otherwise


The Analyst / Engineer can understand and interpret potential issues found in source or compiled code


The Analyst / Engineer has automation skills/capability in the form of scripting or similar

The Analyst / Engineer can attack application and infrastructure assets interpret threats and suggest mitigating measures


Ability to interpret Security Requirements mandated by oversight functions and ensure comprehensive coverage of those requirements via documentation within high level design and/or during agile ceremonies via Evil Stories


Desirable

The Analyst / Engineer can propose options for solutions to the security requirements / patterns that provide a balance of security user experience & performance


Desirable

The Analyst / Engineer has the skill to discuss and present solutions to other architecture security development and leadership teams.

Desirable

The Analyst / Engineer can interpret and understand vulnerability assessment reports and calculate inherent and/or residual risks based on the assessment of such reports

Desirable

Ability to articulate and be a persuasive leader who can serve as an effective member of the senior management team.

Good negotiation skills will be desirable


Desirable

Must have good judgment skills to decide on an exception approval


Desirable

Ability to enforce improvements when necessary using Influence rather than Policing measures


Desirable

Superior written and verbal communication skills to effectively communicate security threats and recommendations to technical or non-technical stakeholders

Desirable

Knowledge of application of Agile methodologies/principles such as Scrum or Kanban


Desirable

  1. Behavioral Competencies



Thank You

Emily Jha

Netsach - A Cyber Security Company


Required Experience:

Manager

Employment Type

Full-Time

About Company

Report This Job
Disclaimer: Drjobpro.com is only a platform that connects job seekers and employers. Applicants are advised to conduct their own independent research into the credentials of the prospective employer.We always make certain that our clients do not endorse any request for money payments, thus we advise against sharing any personal or bank-related information with any third party. If you suspect fraud or malpractice, please contact us via contact us page.