Key Responsibilities:

  • Conduct or support authorized penetration testing of infrastructure and related information assets.
  • Gather information about network topography and usage through technical analysis and open source research and document findings.
  • Conduct network scouting and analyses vulnerabilities of systems within a network.
  • Identify methods that attackers could use to exploit system and network vulnerabilities and continuously research and study security threats and attack vectors.
  • Make recommendations to enable effective remediation of vulnerabilities and cyber security gaps identified.
  • Provide stakeholders with actionable recommendations derived from attack scenarios testing and findings
  • Include business considerations in security strategies and recommendations.
  •  Make recommendations to management to make mitigation and correction measures or accept risks when security deficiencies are identified during testing.
  • Carry out vulnerability scanning on systems and both external and internal information assets.
  • Report penetration testing and vulnerability assessment findings including risk level, proposed mitigation and details necessary to reproduce the test results.
  • Conduct remote testing of a network to expose weaknesses in security defense measures or externally exposed systems.
  • Plan and create penetration methods, scripts and tests as required for the scoped system under penetration test activity.
  • Present test findings, risks and conclusions to technical and non-technical audiences.
  • Explain business impact of vulnerabilities identified through testing to make case for addressing them.
  • Test for vulnerabilities in web applications, client applications and standard applications.
  • Identify foreign language terminology within computer programs (e.g., comments, variable names)
  • Research current technology to understand cyber defense capability required by systems or networks.
  • Provide timely notice of imminent or hostile intentions or activities as result of a vulnerability which may impact the organization's objectives, resources, or capabilities.
  • Ensure penetration testing is carried out when required for new or updated applications.
  • Conduct trial runs of programs and software applications to ensure that the desired information is produced, and instructions and security levels are correct.
  • Coordinate with other cyber defense staff to validate network alerts and provide expert technical support to resolve cyber defense incidents.

Qualifications & Experience:

  • Bachelor’s degree in Computer Science or Information Technology preferably at a post-graduate level
  • Related fields certification OSCP  , CREST , GXPEN.
  • 3-5 years of relevant experience in information security and penetration test.

Job Details

Industry:
Functional Area:
Total Positions:
7 Posts
Job Shift:
First Shift (Day)
Job Type:
Department:
Cyber Security
Job Location:
Gender:
No Preference
Minimum Education:
Bachelors
Career Level:
Experienced Professional
Experience:
3 Years - 5 Years
Apply Before:
Nov 27, 2022
Posting Date:
Oct 26, 2022

Work Environment

Supervisor’s gender:
Male
Percentage of female coworkers:
10-19%

VaporVM

Call Center · 1-10 employees - Lahore

rentVm enables the power of Cloud Computing. rentVm delivers Infrastructure-as-a-Service technology to Software Developers, Healthcare, Education, small and medium size businesses and enterprises to enable Public and Private (enterprise) Cloud environments. Our extensive experience in system integration and solutions centric services help our customers to quickly migrate and adopt to cloud based services.

What is your Competitive Advantage?

Get quick competitive analysis and professional insights about yourself
Talk to our expert team of counsellors to improve your CV!
Try Rozee Premium
I found a job on Rozee!