You are successfully logged out of your my randstad account

You have successfully deleted your account

application security - penetration testing.

job details

summary

    job details

    Kindly note that we need 2 manager-level candidates, that require immediate attention.

    Start sharing me profiles for the below JD

     

    • To hire a manager level candidate for – Application Security - Penetration Testing
      • To perform authorized tests on computer systems in order to expose weaknesses in their security that could be exploited by criminals. 
      • Candidate may work in-house for large or mid-sized companies where system security is a crucial function
        • The experience is 5 to 8 yrs.
        • Experience in using Pen-Testing tools like Kali Linux, Nmap, Metasploit, Wireshark, John the Ripper, Hashcat, Hydra, Burp Suite, etc.
        • Experience in black-box assessment, white-box assessment, and gray-box assessment.
        • Experience in performing Pen-testing on Windows, Linux, and Mac operating systems, web & mobile applications
      • Responsibilities
        • plan and create penetration methods, scripts, and tests
        • carry out remote testing of a client's network or onsite testing of their infrastructure to expose weaknesses in security
        • simulate security breaches to test a system's relative security
        • create reports and recommendations from your findings, including the security issues uncovered and the level of risk
        • advise on methods to fix or lower security risks to systems
        • present your findings, risks, and conclusions to management and other relevant parties
        • consider the impact your 'attack' will have on the business and its users
        • understand how the flaws that you identify could affect a business, or business function if they're not fixed.

     

    • To hire a manager level candidate for Third-Party – Security Assessments (TPSA)
      • The candidate required for Third-Party Security Assessment
      • Candidate required for the due diligence activity to gain a level of assurance with the overall security of our Technology Vendors, Third-party Service Providers, Product Companies, and Solution Providers.
      • The experience is 5 to 8 yrs.
      • Responsibilities
        • Effectively liaise with clients and stakeholders.
        • Identification of issues, risks, opportunities, and improvement of policies, processes, procedures, and standards.
        • Documenting Information security risk in relation to Technologies, People, and Processes
        • Ability to map business requirements to technical specifications.
        • Identifying Information Security compensating controls or alternate controls in case primary control requirements are not met.
        • Assisting Vendor risk management process from an Information Security point of view.
        • Raising risk findings with stakeholders and recording it per standardized requirements.
        • Should be able to communicate key risk findings effectively.
        • Perform risk treatment discussions with stakeholders and gain business consensus on the risk treatment roadmap.
        • Work with client Information Security teams, compliance teams, auditing teams, and regulators to identify and document various requirements/obligations and formulate the roadmap for potential program implementations.

    Kindly note that we need 2 manager-level candidates, that require immediate attention.

    Start sharing me profiles for the below JD

     

    • To hire a manager level candidate for – Application Security - Penetration Testing
      • To perform authorized tests on computer systems in order to expose weaknesses in their security that could be exploited by criminals. 
      • Candidate may work in-house for large or mid-sized companies where system security is a crucial function
        • The experience is 5 to 8 yrs.
        • Experience in using Pen-Testing tools like Kali Linux, Nmap, Metasploit, Wireshark, John the Ripper, Hashcat, Hydra, Burp Suite, etc.
        • Experience in black-box assessment, white-box assessment, and gray-box assessment.
        • Experience in performing Pen-testing on Windows, Linux, and Mac operating systems, web & mobile applications
      • Responsibilities
        • plan and create penetration methods, scripts, and tests
        • carry out remote testing of a client's network or onsite testing of their infrastructure to expose weaknesses in security
        • simulate security breaches to test a system's relative security
        • create reports and recommendations from your findings, including the security issues uncovered and the level of risk
        • advise on methods to fix or lower security risks to systems
        • present your findings, risks, and conclusions to management and other relevant parties
        • consider the impact your 'attack' will have on the business and its users
        • understand how the flaws that you identify could affect a business, or business function if they're not fixed.

     

    • To hire a manager level candidate for Third-Party – Security Assessments (TPSA)
      • The candidate required for Third-Party Security Assessment
      • Candidate required for the due diligence activity to gain a level of assurance with the overall security of our Technology Vendors, Third-party Service Providers, Product Companies, and Solution Providers.
      • The experience is 5 to 8 yrs.
      • Responsibilities
        • Effectively liaise with clients and stakeholders.
        • Identification of issues, risks, opportunities, and improvement of policies, processes, procedures, and standards.
        • Documenting Information security risk in relation to Technologies, People, and Processes
        • Ability to map business requirements to technical specifications.
        • Identifying Information Security compensating controls or alternate controls in case primary control requirements are not met.
        • Assisting Vendor risk management process from an Information Security point of view.
        • Raising risk findings with stakeholders and recording it per standardized requirements.
        • Should be able to communicate key risk findings effectively.
        • Perform risk treatment discussions with stakeholders and gain business consensus on the risk treatment roadmap.
        • Work with client Information Security teams, compliance teams, auditing teams, and regulators to identify and document various requirements/obligations and formulate the roadmap for potential program implementations.