Penetration Tester / Ethical Hacker

Date: Feb 12, 2019

City: Pune, MH, IN

Company: Amdocs, Inc.

Job ID: 69947 
Required Travel :Minimal 
Managerial - No 

Who are we?

If you’re a smartphone user then you are part of an ever more connected and digital world. At Amdocs, we are leading the digital revolution into the future. From virtualized telecommunications networks, Big Data and Internet of Things to mobile financial services, billing and operational support systems, we are continually evolving our business to help you become more connected. We make sure that when you watch a video on YouTube, message friends on SnapChat or send your images on Instagram, you get a great service anytime, anywhere, and on any device. We are at the heart of the telecommunications industry working with giants such as AT&T, Vodafone, Telstra and Telefonica, helping them create an amazing new world for you where technology is being used in amazing new ways every single day.

In one sentence

Secures enterprise information by developing, implementing, and enforcing security controls, safeguards, policies, and procedures

What will your job look like?

  • You will develop, implement, and administer security policies and plans for Amdocs    
  • You will carry out information security activities in accordance with the established policies and guidelines                                                                         
  • You will build and assess security policies for the OS, network, and database                      
  • You will analyze and evaluate security vulnerabilities, and manage security systems such as anti-virus, firewalls, patch management, intrusion detection, and encryption
  • You will recommend fixes, security patches, and any other measures required in the event of a security breach                                                                                              
  • You will coordinate security orientation and security awareness programs                           
  • You will assist in coordinating contingency plan tests on a regular basis                              
  • You will build standard operating procedures for security tools and processes per industry best practices
  • You will be responsible for carrying out penetration testing and vulnerability assessment       
  • You will be responsible for carrying out security assessment to comply with customer security needs across countries                 
  • You will design, implement, and report on security system and end-user activity audits; monitor server, application, and network traffic for unusual or suspicious activity; interpret activity and make recommendations for resolution
  • You will be responsible for coordinating, assessing & addressing customer security needs

All you need is...

  • As an Information Security Analyst, candidate has to focus on identifying and assessing vulnerabilities in software systems, Networks and mobile based application.
  • The major focus will be on Application Penetration testing followed by Network Penetration Testing and Mobile Security assessments.
  • Experience to work closely with Application Developers/architects to track the security defects to closure
  • The work involves Test Case Creation, Penetration Testing, Source code reviews, Report Creation & presentation to stakeholders along with operation and construction of tools to assist in these tasks.
  • To actively contribute to the Vulnerability management efforts of the organization via developer query resolution on vulnerabilities and defect tracking to closure.
  • Well versed with OWASP – Top Ten and WASC Threat Classifications
  • Expertise in Vulnerability Assessment and Penetration Testing of Web Applications
  • Business‐Logic based application testing
  • Penetration testing of Mobile applications and websites.
  • Exploitation of the issues found and presenting the impact occurred
  • Source Code Reviews - Well versed in Java Secure Code Review
  • Expertise in Automated Scanning using CheckMarx  and Fortify
  • Well versed with OWASP Code Review concepts & identifiers
  • Familiar with popular tools:
    • Application Proxy: Burp suite, Paros, OWASP ZAP, WireShark
    • Vulnerability Scanners: IBM AppScan, HP WebInspect, Nessus, NTO Spider
    • Exploit Toolkits: Metasploit, Exploit DB etc

Why you will love this job:

  • You will be able to demonstrates an understanding of key business drivers and ensures strategic directions are followed and the organization succeeds
  • You will be able to gathers relevant data, identifies trends and root causes, and draws logical  conclusions to develop solutions
  • You will have ability to assess details, systems and other factors as part of a single and comprehensive picture

                     

Find similar jobs: