• CTC
    2.0L - 3.3L

  • ROLE
    Other

  • LOCATION
    Bengaluru, IN

  • EXPERIENCE
    Junior, Mid-Level




Submit your Application

The salary you're expecting to receive for the job (in lakhs per annum)


After your first application, you can one-click apply to companies.
 If you already have an account, click here to sign in.


 Login Details

You can use these details to log back into your account.


1 The Basics

Let's get started with who you are and what you're looking for.




The number of years you've been working for in your field



2 Resume

Let employers know what you have to offer.




OR


3 Optional Fields

Have more details you'd like to share? Or referred by a friend to sign up? Fill these fields below!








Description

Ideal Candidature for the Position :

Willing & eager to learn , intensive training will be provided to groom , upscale a candidate . Ideal Candidate fitment would be one who can stay for long time , based on performance bonus will be provided & shares will be allocated for only those who show commitment & contribute themselves fully towards the growth of company , with at-least few years of experience as stated below .

About the Role :

Candidate will work with Managing Consultant to learn & deliver a very unique Security Testing Service of NC .Candidate should be open to travel locally as well as abroad . Long Term commitment requirement due to the fact that intensive Training will be provided to individual which will be a Cost & Time to Company which is to Upscale employees to deliver quality 

Detailed JD : 

Tester will be working remotely as well as on Site for this Role, this role will be more focused towards ESA (Enterprise Security Assessment) services. Great opportunity to build a Enterprise Testing team. This will be a Project driven role, NC was established in 2015 with a potential to expand itself across to deliver Solutions around technology to be Technology driving force. We are seeking a talented professional with vast experience in the field of penetration testing including internal, external, web/Application based, esp. someone who is very strong on Application etc. Below is a list of some of the technologies they would like the person to have in addition to Automation/Manual Testing of Web Applications.

This position offers industry base salary, plus bonus, benefits, growth opportunity to grow within the company, also based on performance & commitment shown within 1 year can open up doors for more opportunity within. As an Enterprise Security tester, he/she will focus on a minimum to the below JD · Web applications pen testing (XSS, SQL Injection) should be a priority. ·

Automation and/or manual testing · Systems (varied by type and configuration) Successful candidates must possess a thorough working knowledge of common commercial and/or open source vulnerability assessment tools and techniques used for evaluating operating systems, databases and web applications.

Successful candidates must be able to quickly master new technology / software for the purposes of evaluating or subverting the security functionality of the technology / software. The security projects undertaken will range in complexity and duration but typically require two weeks planning, two weeks testing, and two weeks to analyze information and report findings. The level of effort for each assessment varies dependent on the size and complexity of the system tested and the technologies employed.

Candidate will provide technical information system security testing in support of the appropriate security risk management process. Techniques used in the security assessment and technical testing efforts include in-depth network and application vulnerability testing (both automated and manual testing), demonstrable false positive validation. Automated testing will include tools such as: Tenable Nessus, Cenzic Hailstorm, BurpSuite Professional, DBProtect, Core Impact, Nmap, Metasploit, and other tools found in the BackTrack and Samurai Web Testing Framework distributions.

The candidate shall develop documentation in support of testing efforts that may include: Test Plans, Preliminary Findings Reports, Security Assessment Reports, and other, similar test artifacts, as required by the government. Candidates should be skilled in multiple of the following areas: · Operating Systems: expert understanding of the following operating systems and their related security concerns o Microsoft Windows desktop/server operating systems (Microsoft Windows 2000 and up) o UNIX and Linux, especially Ubuntu, Red Hat Enterprise, SUSE Enterprise, and knowledge of UNIX variants o Apple OS X operating systems Web Applications & Technologies: advanced understanding of application programming languages, application servers, web services, browser technology, common vulnerabilities, security best practices, and automated assessment tools and manual testing techniques specific to web applications. Working knowledge of JavaScript, AJAX, PHP, Perl, SOAP-based web Services and ability to perform code review in Java, C# and/or .Net. Enterprise Solutions, Storage & Databases: advanced understanding of relational database, database management systems, enterprise storage solutions, and security concerns specific to these technologies. Software Programming: experience with Java, Microsoft .NET, Python, Perl, Ruby, Linux/UNIX Shell Scripting.

In addition to one or more of the critical skills listed above, all candidates must be knowledgeable in the following areas: · All candidates shall be comfortable using, configuring, troubleshooting, and administering both Linux and Microsoft operating systems with extensive experience with at least one of these operating systems. · Have a broad knowledge of security best practices, security solutions, and methodologies for conducting advanced security assessments, to include manual assessments and malicious user testing. · Have a broad and expert knowledge of security assessment tools and manual security testing techniques. Advanced understanding of security tool strengths and weaknesses and ability to select, configure, troubleshoot and use the best “tool for the job”. · Have a broad knowledge of cyber security threats and techniques used by adversaries to compromise systems – both technical and non-technical techniques. · Have the ability to think creatively, to think critically, to analyze complex concepts, to articulate themselves clearly and concisely, and to conduct themselves in a professional manner.  

 

In addition to one or more of the critical skills listed above, all candidates must be knowledgeable in the following areas: · All candidates shall be comfortable using, configuring, troubleshooting, and administering both Linux and Microsoft operating systems . ·

Further Training will be provided on the security best practices to be followed , secure coding guidelines ...etc · , one should  have the ability to think creatively, to think critically, to analyze complex concepts, to articulate themselves clearly and concisely, and to conduct themselves in a professional manner.  

 

Thank you . 

 

 

 


Perks

Education

Free Tech

Work From Home

Flexible Work Hours


Similar Jobs