Overview
The Vulnerability Assessment Penetration Tester (VAPT) plays a crucial role in safeguarding the organizations digital assets by identifying and addressing security vulnerabilities. They are responsible for conducting thorough assessments of systems applications and networks to proactively detect and mitigate potential security risks. This role is essential in ensuring the integrity and resilience of the organizations IT infrastructure against cyber threats.
Key responsibilities
- Performing penetration testing to identify vulnerabilities and security flaws
- Conducting vulnerability assessments on systems applications and networks
- Developing and implementing security testing methodologies
- Producing comprehensive reports on security findings and recommendations
- Collaborating with internal teams to prioritize and remediate identified vulnerabilities
- Staying updated with the latest security threats and mitigation techniques
- Evaluating security controls and recommending improvements
- Participating in red team engagements to simulate realworld attacks
- Assisting in the development of security policies and procedures
- Conducting security awareness training and workshops for staff
Required qualifications
- Bachelors degree in Computer Science Information Technology or related field
- Certifications such as Certified Ethical Hacker (CEH) or Offensive Security Certified Professional (OSCP)
- Experience in conducting penetration testing and vulnerability assessments
- Proficiency in using security testing tools and software
- Strong understanding of networking protocols and technologies
- Knowledge of security best practices and industry standards
- Ability to analyze and interpret security findings and propose remediation
- Excellent communication and report writing skills
- Strong problemsolving and critical thinking abilities
- Experience in web application security testing is a plus
Regards
Mr. Sameer Shaikh
Talent Acquisition Lead
Simplify Software Experts
Email: dot com
ethical hacking,vulnerability assessment,penetration testing,network security,cybersecurity