Role: Security Analyst/ Penetration Testing engineer
Location: Austin TX
Duration: Long term Contract
Rate: open
Client is seeking a Security Analyst/ Penetration Testing engineer with requisite Appscan (or similar) experience who will be responsible for performing technical security work using application vulnerability scanners and use intercepting proxies to identify significant security weaknesses.
The candidate will combine experience in information security, web development, IT operations, and project management to ensure security risks are effectively identified and appropriately addressed while maintaining a balance between security and usability.
This role will define, deliver and sustain the enterprise web security strategy, standards and solutions from a governance, process, discipline and technology standpoint.
MUST: Appscan/ related tool sets (min 4 years)
Job Skills – Required
- Knowledge of the common application and infrastructure level vulnerabilities - ability to explain these risks to developers.
- Ability to communicate security-related concepts to a broad range of technical and non-technical staff.
- Ability to evaluate technical and functional specifications early within the software development process, identify possible threats or areas of weakness.
- Experience in taking part and contributing to design sessions.
- Platform: Deep knowledge of at least one primary operating system (Unix or Windows), the configuration and management of that platform at an enterprise scale, the security risks to that platform, and how to mitigate those risks.
- Network security: The candidate will be expected to understand the standard network model and the risks present at each layer, the functions of network equipment such as switches, routers, firewalls, proxies, VPN, and load-balancers, and to understand network architecture.
- Desirable: The candidate should have expertise with security-related topics such as authentication, entitlements, identity management, data protection, data leakage prevention, validation checking, encryption, hashing, principle of least privilege, software attack methodologies, secure data transfer, secure data storage etc.
- In-depth knowledge of network technologies such as SFTP, firewall, DMZ design, IPSec, VPN, Wireless, network topologies and protocols.

No comments:
Post a Comment