Saturday, October 8, 2011

Web Application Pen-Tester

0 comments



Technical Details :

Understanding of TCP/IP, sockets and network tools
Understanding of HTTP protocol
Building web based applications
Programming in C#, ASP.NET
Programming with Javascript
SQL queries
Use a protocol analyser/sniffer
Write scripts in Python or Ruby

Soft skills:
Clarity of communication
Self organization
Self learning
Visual documentation - explain it with pictures

Role description:

Your primary role will be to perform penetration tests and security audits, especially of applications. You must know how complex applications are built and managed. In addition to penetration testing, your time will be spent on researching new exploitation methodologies, building tools to assist and automate the process of penetration testing and data collection, and perhaps working on reverse engineering projects.

Net-Square's projects:

Since its inception in 2001,Net-Square has worked on innovative technology in the area of information-security. Our projects involve a lot of new R&D, things that have not been generally worked upon before. Our projects involve a lot of systems programming, reverse engineering, exploring the undocumented and automation.

Net-Square's team:

Net-Square's team consists of very sharp people, driven by excellence. We ensure that our work is of the highest quality, be it for a client, or be it for ourselves. We have carved a name in the area of information security and are recognized by many individuals and companies around the world. We are continuously looking for team members who want to excel and be recognized as leading edge researchers in the information security space. Net-Square values self-learning. Our team members are encouraged to discuss their research within the organization.

Send your resume to jobs@net-square.com. Mention career code SEC001 in the subject line.

Wednesday, August 10, 2011

Security Analyst at InfySec

1 comments



Job Title: Security Analyst


Please send your CV to careers@infysec.com with the below specs.

------------------------------​------------------------------​---------------------------
Key responsibilities:
• Conduct technical assessments of computer related security incidents, including malware analysis, packet level analysis, and system level forensic analysis
• Monitoring, managing, and coordinating the information collection and cataloging of activities from a variety of public and private security related information sources
• Work as a team with other members of the GSO as well as members of IT
• Coordination of incident response activities (escalations, notifications, conference calls, etc.)
• Assess severity levels of security threats (e.g., incidents, vulnerabilities, malicious code) and coordinate the appropriate notifications or escalations in a timely manner
• Document initial analysis of vulnerability reports
• Development and maintenance of procedural documentation like SOP and knowledge base.
• Understanding and knowledge in various scripting languages.

Educational Requirements:
Graduate /Masters in Computer Science, Information Science, or Information Systems Management, with two to four years of relevant experience
Skills Requirements:
• Candidates should have a background in Networking, Windows and Unix environments.
• Fundamentally understand TCP/IP and network communications.
• Good systems and network administration skills.
• Good computer security incident handling, forensics and analytical skills.
• In depth knowledge of computer security forensics and security vulnerabilities
• Knowledge on content management solutions.
• Must be well versed in multiple security technologies:
SIEM (RSA enVision, ArcSight, E-security, etc)
Antivirus (MacAfee, Symantec, etc)
Intrusion Detection Systems (Snort/Sourcefire, Tippingpoint, etc)
End-point security (CSA, Mcafee HIPS, etc)
Web Proxy/Content Filtering (Bluecoat, Websense, etc)
Active Directory, PKI, Radius, RSA SecureID
DLP (RSA, Symantec, mcafee )
Wireless Networking

Additional Skills Preferred
• One or more programming/scripting languages (e.g., C++, Perl, Java, Python, General HTML , Wiki markup, etc)
• Virtualization and Cloud computing.
• GCIH, GCIA, CISSP, CEH

Candidates must have:
• A strong interest in, and knowledge of network and computer related security issues
• Ability to work meticulously with careful attention to detail
• Ability to identify and ensure the timely delivery of critical information to internal analysis teams, sponsors, customers, and other interested parties
• Ability to work and communicate effectively within a global team environment
• Ability effectively prioritize work
• Ability to develop and explain technical decisions
• Ability to interact effectively with technical and non-technical audiences via both verbal and written communications (e.g., technical writing, procedural development, requirements analysis)
• Ability to quickly learn new procedures, skills, and techniques
• Ability to work under pressure
• Ability to meet inflexible deadlines
• Ability to deal with difficult individuals while maintaining composure

Preferred Requirements:
Preferred candidates will possess good analytical, technical, problem-solving, and organizational skills. They must have the ability to adjust quickly to shifting priorities and make quick decisions with limited information. They will also be able to make decisions independently and in a self-directed manner in support of the goals of the team and organization, as well as be motivated to tackle challenging problems.

Friday, August 5, 2011

ProMinds Consulting

0 comments
About Company: ProMinds Consulting stresses and upholds the highest ethical values in business. We believe each of our professionals are unique and can contribute significantly and creatively. The management believes the career growth of its employees is important, not just for the individual but for the organization as well. Our objective is to bring out the best in them and leverage our combined strengths for the benefit of our clients.

Begin a partnership with ProMinds Consulting. As a shining star in our business, we will together bring excellence in IT to enable you to achieve your professional goals.

ProMinds Consulting endeavors to
Create a partnership with every employee
Create a conducive working environment
Recognize and reward performers
Foster an environment of business ownership
Work with our employees towards their career development

They are into Penetration Testing and Vulnerability Assessment. The deal with Ethical Hacking jobs. They are into this field since many years. You are always welcome if you want to join this company.They are based upon Hyderabad, If you have know Ethical Hacking and core securities you can apply here.

Send your resumes to info@promindsglobal.com

Followers

Archive

 

Ethical Hacking Jobs in INDIA. Copyright 2011 All Rights Reserved