Key Responsibilities:
- Vulnerability Assessments: Conduct in-depth vulnerability assessments across the organization's network, systems, and web applications to identify potential security risks.
- Penetration Testing: Perform penetration testing to uncover vulnerabilities and exploit them to assess the effectiveness of the organization's security defenses.
- Security Tools Proficiency: Utilize advanced security tools such as Kali Linux, Wireshark, Metasploit, Burp Suite, Nessus, and more to ensure robust security testing.
- Threat Modeling & Risk Analysis: Perform threat modeling to identify security risks and provide recommendations on mitigating those risks through preventive, mitigating, and compensating controls.
- Collaboration: Work closely with cross-functional teams, including DevSecOps, SIEM, and patch management, to implement security measures and ensure an effective defense strategy.
- Scripting & Automation: Leverage Python scripts to run vulnerability checks for the latest zero-day attacks and automate vulnerability assessments.
- Security Reporting: Document findings, prepare reports for key stakeholders, and provide actionable recommendations for enhancing the security posture of the organization.
- Continuous Learning: Stay updated with the latest security trends, threats, vulnerabilities, and technologies to keep the organization ahead of cyber risks.
Required Qualifications:
- Education: Bachelor’s degree in Computer Science, Information Technology, or a related field.
- Certifications:
- Certified Ethical Hacker (CEH) – EC-Council
- Certified Secure Computer User – EC-Council
Technical Proficiencies:
- Threat Modeling
- Penetration Testing (Web, Network, and Application)
- Vulnerability Management Tools (Metasploit, Burp Suite, Nessus)
- Network Security Tools (Nmap, Wireshark)
- Linux and Windows Security
- Scripting (Python) for Security Automation
- Web Application Security and DAST (Dynamic Application Security Testing)
Desired Skills and Competencies:
- Strong analytical and problem-solving skills with a detail-oriented approach.
- Ability to collaborate effectively with different teams and communicate complex technical concepts to non-technical stakeholders.
- Commitment to staying current on emerging threats, vulnerabilities, and security technologies.
- Self-motivated, with the ability to work independently and as part of a team.