صاحب العمل نشط
حالة تأهب وظيفة
سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكترونيحالة تأهب وظيفة
سيتم تحديثك بأحدث تنبيهات الوظائف عبر البريد الإلكتروني• Conduct cyber-attack simulations as part of the RED team activity
• Conduct Vulnerability Assessment and Penetration Testing and configuration review for network, web application, mobile application, and thick-client application
• Conduct configuration reviews for OS, DB, Firewall, Routers, Switches, and other security devices/components
• Perform manual testing of web applications
• Conduct source-code review using automated and manual approaches
• Prepare detailed reports
• Ensure timely delivery of status updates and final reports to clients
• Handle Clients queries
• Keep oneself updated on the latest IT Security news, exploits, hacks
• Prepare Threat Intelligence reports for newly discovered threat agents, exploits, attacks
• Locate weaknesses and vulnerabilities of IT/OT systems, web applications, mobile applications, etc. through vulnerability assessment and penetration testing (VAPT), red-teaming, and other techniques
• Conduct security analysis on weaknesses and vulnerabilities discovered
دوام كامل