Cyber Security - IAM Professional Services - Dallas, TX || C2C at Dallas, Texas, USA |
Email: [email protected] |
Role Description: Greetings of the day, My name is Abhishek Yadav, and I am a Staffing Specialist at Q1 TECH. I am reaching out to you on an exciting job opportunity with one of our clients. Title : Cyber Security - IAM Professional Services Location : Dallas, TX (ONSITE) Type : C2C JD - Assisting in technical scoping of security testing activities curation and assessment of vulnerability data (across multiple platforms/tools) from a manual penetration perspective, to focus on true exploitation. Conducting focused research when not deployed on an active project. Provide consultative guidance to customers on findings identified in a clear and actionable fashion both in writing and verbally. Architecture Security Analyzing and Threat Modeling as required. Curation and assessment of vulnerability data (across multiple platforms/tools) from a code assessment perspective, to ensure false positive review and analysis to provide target results to customers. Provide technical guidance in supporting member firms in conducting necessary remedial actions and responding to client vulnerability questions or disclosures. Help develop tooling deployment and relevant scanning configurations to enhance practical testing processes. Escalates key risks and issues to the relevant Regional Operations Manager which need special attention or hold urgency. Operate in the wider organization to drive risk reduction goals and in the continuous improvement vulnerability related services. as needed to meet customer requests support code assessment and network infrastructure Typical security testing activities:o Software/Web Application/Web Services penetration testingo network Penetration Testingo Mobile Application Penetration Testingo Thick Client Penetration Testingo Knows scripting language.o Review test cases from time to timeMinimum Experience 6 to 8 yearsPreferred Certification CISSP, OSCP/CPT/CEPT/ CMWAPT Competencies: Experience (Years): 8-10 Essential Skills: Assisting in technical scoping of security testing activities curation and assessment of vulnerability data (across multiple platforms/tools) from a manual penetration perspective, to focus on true exploitation. Conducting focused research when not deployed on an active project. Provide consultative guidance to customers on findings identified in a clear and actionable fashion both in writing and verbally. Architecture Security Analyzing and Threat Modeling as required. Curation and assessment of vulnerability data (across multiple platforms/tools) from a code assessment perspective, to ensure false positive review and analysis to provide target results to customers. Provide technical guidance in supporting member firms in conducting necessary remedial actions and responding to client vulnerability questions or disclosures. Help develop tooling deployment and relevant scanning configurations to enhance practical testing processes. Escalates key risks and issues to the relevant Regional Operations Manager which need special attention or hold urgency. Operate in the wider organization to drive risk reduction goals and in the continuous improvement vulnerability related services. as needed to meet customer requests support code assessment and network infrastructure Typical security testing activities:o Software/Web Application/Web Services penetration testingo network Penetration Testingo Mobile Application Penetration Testingo Thick Client Penetration Testingo Knows scripting language.o Review test cases from time to time Minimum Experience 6 to 8 yearsPreferred Certification CISSP, OSCP/CPT/CEPT/ CMWAPT Desirable Skills: Assisting in technical scoping of security testing activities curation and assessment of vulnerability data (across multiple platforms/tools) from a manual penetration perspective, to focus on true exploitation. Conducting focused research when not deployed on an active project. Provide consultative guidance to customers on findings identified in a clear and actionable fashion both in writing and verbally. Architecture Security Analyzing and Threat Modeling as required. Curation and assessment of vulnerability data (across multiple platforms/tools) from a code assessment perspective, to ensure false positive review and analysis to provide target results to customers. Provide technical guidance in supporting member firms in conducting necessary remedial actions and responding to client vulnerability questions or disclosures. Help develop tooling deployment and relevant scanning configurations to enhance practical testing processes. Escalates key risks and issues to the relevant Regional Operations Manager which need special attention or hold urgency. Operate in the wider organization to drive risk reduction goals and in the continuous improvement vulnerability related services. as needed to meet customer requests support code assessment and network infrastructure Typical security testing activities:o Software/Web Application/Web Services penetration testingo network Penetration Testingo Mobile Application Penetration Testingo Thick Client Penetration Testingo Knows scripting language.o Review test cases from time to time Minimum Experience 6 to 8 yearsPreferred Certification CISSP, OSCP/CPT/CEPT/ CMWAPT Thanks and Regards Abhishek Yadav Technical Recruiter Email: abhishek.yadav1 @q1tech.com -- Keywords: access management information technology California Texas Cyber Security - IAM Professional Services - Dallas, TX || C2C [email protected] |
[email protected] View all |
Wed May 08 22:02:00 UTC 2024 |