Free cookie consent management tool by TermsFeed Associate Penetration Tester Specialist | Antal Tech Jobs
Back to Jobs
3 Days ago

Associate Penetration Tester Specialist

decor
Information Technology
Full-Time
Global Payments Inc.

Overview

Summary

Description Summary of This Role

Conducts planned and authorized real world attack scenarios against corporate assets, networks and applications utilizing common hacking methodologies and tools. Leveraging industry standard methodologies, evaluates corporate security posture through various technical, manual and automated methods to accomplish various designated goals such as the review and evaluation of software or network architecture and design (consulting), the coordinated validation of defensive controls (purple team), attempted exploit, pivot and exfiltration of data (red team) and manual review / validation of the existence of vulnerabilities on systems (penetration testing). This is a highly technical and specialized position within security that requires a wide array of experience, knowledge and discipline in all aspects of IT (development, operations and security).

What Part Will You Play?

  • Creates, coordinates and plans engagements with internal customers with medium oversight from senior team members. Has plans validated and approved by an assigned senior team member and executes according to plan with limited oversight. Ability to identify and exploit more complex scenarios as well as employing stealth and evasion techniques. Be able to accurately answer questions about compliance, regulatory and policy standards.
  • Independently gather requirements in order to create appropriate engagement documentation and schedules. Can begin to document engagement plans for how an engagement is executed by other team members (under guidance of senior member of the team). Gathers and proposes final report findings with preliminary analysis and severity assignments.
  • Perform complex analysis on intelligence data to determine preliminary risks and targets as well as identify risk and findings. Independently set up and lead meetings with internal customers to coordinate the execution of engagements. Ability to communicate complex ideas to various degrees of technical resources. Ability to professionally communicate both verbally and in written form. Ability to evaluate proposed remediation actions and recommend alternate actions under moderate supervision.
  • Understand more complex architecture and design concepts of applications, hardware and networks and how they impact the security posture of the enterprise. Apply corporate and security ethics in every aspect of day to day activities.

What Are We Looking For in This Role?

Minimum Qualifications

  • Bachelor's Degree
  • Relevant Experience or Degree in: with a concentration in security, networking or development / computer science
  • Typically Minimum 4 Years Relevant Exp
  • Ethical Hacking/Penetration Testing, software development, cyber forensics or threat hunting. Additional 4 years related experience may be considered in lieu of a degree.
  • Certified Ethical Hacker (CEH) or GIAC Penetration Tester (GPEN) or equivalent certification

Preferred Qualifications

  • Typically Minimum 6 Years Relevant Exp
  • Ethical Hacking/Penetration Testing, software development, cyber forensics or threat hunting.
  • one or more of the following: CISSP, CEH, GPEN, GXPN, GWAPT, OSCP

What Are Our Desired Skills and Capabilities?

  • Skills / Knowledge - A seasoned, experienced professional with a full understanding of area of specialization; resolves a wide range of issues in creative ways. This job is the fully qualified, career-oriented, journey-level position.
  • Job Complexity - Works on problems of diverse scope where analysis of data requires evaluation of identifiable factors. Demonstrates good judgment in selecting methods and techniques for obtaining solutions. Networks with senior internal and external personnel in own area of expertise.
  • Supervision - Normally receives little instruction on day-to-day work, general instructions on new assignments.
  • Experience with vulnerability exploit techniques and tools. - Ability to setup, configure and utilize ethical hacking tools and exploits. Ability to develop exploits and demonstrate impacts to others
  • Proficient in research and analysis of security intelligence data, system/application/network configurations and logs - Ability to understand and execute complex analysis of intelligence data as well as systems/application/network configurations and logs to determine preliminary threats, targets and evaluate risk appropriately. Ability to apply controls to safely traverse the dark web for research purposes.
  • Experience with activities involving APT Threats - Ability to describe various tools, techniques, and procedures (TTPs) associated with threat actors known to operate in the financial services domain.
Share job
Similar Jobs
View All
2 Days ago
Associate Business Analyst, Abandoned and Unclaimed Property
Information Technology
Why Ryan? Global Award-Winning Culture Flexible Work Environment Generous Paid Time Off World-Class Benefits and Compensation Rapid Growth Opportunities Company Sponsored Two-Way Transportation Exponential Career Growth Abandoned and Unclaimed Prop...
decor
2 Days ago
Full Stack Developer in Mumbai
Information Technology
Key Responsibilities Develop responsive and user-friendly websites using HTML5, CSS3, JavaScript, PHP, and Bootstrap. Work with databases such as MySQL, PostgreSQL, or MongoDB. Deploy and maintain web applications on AWS (EC2, S3, Route 53, etc.)...
decor
2 Days ago
Data Architect
Information Technology
Project Role : Data ArchitectProject Role Description : Define the data requirements and structure for the application. Model and design the application data structure, storage and integration.Must have skills : Data EngineeringGood to have skills :...
decor
2 Days ago
Business Analyst in Gurgaon
Information Technology
As a business analyst at Blue Nectar, you will be a key player in driving data-driven decisions and strategies to propel our company to new heights. Your expertise in Advanced Excel, English Proficiency, and data analytics will be instrumental in id...
decor
2 Days ago
Senior Java Software Engineer - Spring Boot
Information Technology
Senior Java DeveloperWe are looking for a skilled Senior Java Developer who brings a strong foundation in multithreaded application development and is confident working with Spring Boot, ELK stack, and modern CI/CD practices. This role also demands ...
decor
2 Days ago
Senior Java Developer AVP(C12)
Information Technology
The Applications Development Senior Programmer Analyst is an intermediate level position responsible for participation in the establishment and implementation of new or revised application systems and programs in coordination with the Technology tea...
decor
2 Days ago
Java Full Stack Developer - Spring Boot/React.js
Information Technology
Experience Required : 8 to 14 Years.Location : Gurgaon.Time Zone : IST.Primary Tech Stack Java 11+, Spring Boot, Spring Framework, RESTful APIs, AWS, React.JS / Angular. Hospitality domain experience is a plus. Job OverviewWe are looking for ...
decor
2 Days ago
ComUnus Technologies - Business Analyst - NBFC Domain
Information Technology
Job DescriptionAs a Business Analyst, you will play a crucial role in analyzing business requirements, optimizing financial processes, and supporting technology-driven solutions within the NBFC sector.You will collaborate with stakeholders, product ...
decor

Talk to us

Feel free to call, email, or hit us up on our social media accounts.
Social media