The person should be able to perform penetration testing of web applications/services/smart apps and networks.
Evaluating the security of an organization’s infrastructure by continuously assessing and exploiting vulnerabilities to find out where hacking threats may lie.
Password guessing and cracking,
Network traffic sniffing,
Denial of Service attacks
Exploiting buffer overflow vulnerabilities,
Penetration testing or threat modeling tools including opensource and commercial mapping
Scripting and reverse engineering experience are desirable.
Working on Microsoft and Linux servers,
Cisco network switches, virtualization.
Strong grip on Networking & Programming Logics
Basic understanding of web pages and it’s technology
Expertise in Linux machines, computer architecture, and social engineering tactics
Hands-on experience with various operating systems and assembly Language and Cryptography
Candidates with Cyber-security certifications (CHECK, CTM, CTL, CREST, TIGER, OSCP) will be preferred.
Receive emails for the latest jobs matching your search criteria