Full time
Hyderabad
Posted 6 months ago
Job description
This role will utilize expertise with information security to discover, analyze, and characterize risks to our network, applications, databases, and other components of our information system. The ideal applicant should be passionate about security, stay up-to-date on the latest technology and industry best practices, and work well in a collaborative team environment.
Responsibilities
- Perform recurring and on-demand scanning of organization systems and cloud environments
- Resolve information security incidents, including targeted threats and internal incidents
- Maintain documentation/standard operating procedure(SOP) regarding threat management, including policies and procedures
- Assist technology teams to test, implement, and automate security solutions
- Research and assess emerging security threats and vulnerabilities
- Communicate the risks of identified vulnerabilities and recommend security controls to mitigate them
Required Skills
- Bachelor s degree in computer science, information security, or a related field
- Work with internal stakeholders to ensure compliance with regulatory requirements and security policies
- Understanding of Networking and web/mobile application tools like Nessus, Burpsuite, Nmap and Metasploit, etc,
- Hands on experience on Linux operating systems like Kali, Ubuntu, Parrot Linux OS is an added advantage
- Knowledge of technical concepts such as cloud computing, automation, networking, and application development
- Professional certification such as CEH, CISSP is not mandatory but an added advantage
- Knowledge of vulnerability data management and reporting process automation
- Knowledge of OWASP Top 10 and Sans Top 25 methodologies
- Basic knowledge of scripting languages such as Python
IT & Information Security – Other
IT Services & Consulting
IT & Information Security
Full Time, Permanent
IT & Information Security – Other
Education
Any Graduate
Any Postgraduate
Key Skills
Computer scienceUbuntuCloud computingLinuxData managementInformation securityApplication developmentApplication securityVulnerability assessmentPython