4 Opening(s)
1.0 Year(s) To 4.0 Year(s)
8.00 LPA TO 12.00 LPA
Sr. No.
Job Description
Duty Statements
1
Manual Testing
Perform threat modelling
Perform architectural analysis
Perform logical security assessment
Monitor third party API’s, SDK and libraries are up to date.
Generate assessment report
Report your findings as per severity
2
Automation testing
To use automated scanning tools
Review false positives and true positives
Generate assessment report
Report your findings as per severity
Analyze reports from interactive source code review tool for false positives and include it in the report.
3
Analysis and reporting
Create detailed assessment report as per company standard.
Report issues as per severity
Follow up and review the fixes
4
Ad hoc request
Work on Ad hoc request related to application security
Conduct pen. Test, Design reviews as per the request
5
Trainings and knowledge
transfer
Conduct periodic security awareness training as per the requirement bases on global standards.
Working Relationships:
Team leads
Peers
Developers
Product managers
Other security teams
Support and operations team
Infrastructure teams
Knowledge
Skills
Attributes
Understanding of OWASP Top 10,SANS Top 25 and WASC, NIST.
Black Box, Grey Box security assessment of web application, Mobile application.
Experience of identification and mitigation of vulnerabilities
Good knowledge of TCP/IP and other application and network level protocols.
Security in SDLC (Application Security)
Strong team player
Interpersonal Skills
Good communication
Active listening
Believes in team work over individual contributions
Articulation of thoughts
Able to express view assertively
Ownership and accountability
Passion
Integrity
Team work
Security Analyst :
Shift : Middle Shift 12pm to 9pm
Relevant Exp : Minimum 1 year in App Sec
Condition: 2 years Bond
1 Opening(s)
1.0 Year(s) To 3.0 Year(s)
5.00 LPA TO 10.00 LPA
Role Purpose: The selected candidate is responsible for supporting Information Security and Privacy Program. It involves supporting, monitoring, and documenting the effectiveness of the program. This is a hands-on position that requires practical experience in the areas of information security, privacy and risk management. The candidate is responsible for executing ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...