Role Purpose
To oversee and serve as a technical resource for all assessment activity related to the security posture of existing and proposed firm systems, platforms, and processes to protect and continually improve the confidentiality, integrity, and availability of information systems per the firm's business objectives, regulatory requirements, and strategic goals.
Responsibilities
- Perform security penetration testing of the Firms systems, platforms, and applications
- Serve as a Subject Matter Expert (SME) for the VAPT function
- Serve as the system owner for common VAPT toolsets, platforms, and processes
- Provide technical assessment reports that are easily understandable by the target audience and include practical and reasonable recommendations based upon sound risk management principles.
Qualification
Possess a Computer Science bachelors degree or substantially equivalent experienceCISSP requiredGIAC GPEN or GWAPT preferredOffensive Security OSCP requiredCommanding knowledge of VAPT concepts and best practices, including the requirements for WhiteHat / ethical hackingExpert understanding of the difference between a vulnerability assessment and a penetration test in the context of assessment scope, objectives, and deliverablesExtensive experience with common automated VAPT tools such as Nessus, Appscan, Burp Suite, Nipper, and TrustwaveExpertise with common attack tools and frameworks such as Wireshark, Kali, Metasploit, etc.Expertise with mobile platform security technology, including vulnerability identification and exploitation tools, as well as mobile platform security best practices, frameworks, etc.Understands VAPT in the context of risk management and organizational prioritiesPassionate in the practice and pursuit of VAPT excellenceAble to validate the presence of identified vulnerabilities with accuracyMastery of common application platforms and technologies to effectively understand and evaluate complex application assessments via the use of manual techniques and simple tools such as proxies and browser pluginsAuthoritative mastery of OWASP, CVE, general security controls, and other foundational topics, such as the latest application and operating system exploitsExpert knowledge of common scripting and programming languages is advantageous.Ongoing commitment to understanding the threat landscape and common adversary motivations / practices. Ability to quickly adapt practices to evolving circumstancesAble to maintain critical thinking and composure under pressureStrong written and oral communication skills. Ability to convey complex concepts to non-technical constituents. Proficiency in oral and written EnglishCapable of assisting with the preparation of internal training materials and documentationAble to be productive and maintain focus without direct supervision