Role: Penetration Tester

Location: Wilmington, DE

Duration: 6 Months



*Job Description:*



*Penetration testing of various application systems on a regular basis is a
required skill along with managing and reviewing the work of other testers
including contract testers*. Reporting to Management on a regular basis
through well-defined metrics is required. This individual should have
business acumen and detailed understanding of the Software development life
cycle.



Work with application development team leads to ensure application security
is aligned with policy, security best practices and business needs



*Essential Functions:* Experience and knowledge in a corporate environment
with the following;



Support projects within the SDLC and Agile environments with applications
security testing penetration testing and vulnerability management functions

*Perform Web / Mobile application security assessments and penetration
testing on projects and/or releases*; produce detailed risk reports with
identified vulnerabilities and remediation recommendations

Conduct static and dynamic code analysis as needed to support release
cycles.

Work closely with development team during the envisioning and development
process to guide secure design and secure coding practices

*Manage web application firewall through log analysis, system tuning and
rule development *

Evaluate, track, and ensure compliance of high and critical
vulnerabilities; develop, maintain and update scorecards to reflect
vulnerabilities and communicate to end users

Implement security solutions, and provide technical leadership during the
design, development, and testing phases of major initiatives.



Other Responsibilities:



·         All other related duties as assigned. Knowledge, Skills,
Education, Experience, and Competencies:

·         Knowledge of the software development lifecycle in a large
enterprise environment including agile processes and practices.

·         Experience with performing manual and automated code review and
develop/propose /enforce secure coding standards and policies.

·         Knowledge of in the OWASP top 10 and related exploitation
techniques, including but not limited to cross-site scripting, SQL
injections, session hijacking and buffer overflows to obtain controlled
access to target systems.

·         Good Understanding of various web application architectures and
web technologies ( Java, MS .NET etc

·         Experience in application firewalls, and intrusion prevention
systems (e.g. Mod security) Experience with commercial application scanning
tools (DAST) like IBM''s AppScan, HP’s WebInspect, etc

·         *Experience with commercial static analysis tools (SAST) like
HP’s Fortify, Klockworks etc *

·         In-depth knowledge of any *proxying and/or fuzzing tools such as
Paros, Burp, WebScarab, OWASP ZAP etc*. • Familiar with WebServices
*technologies
like XML, SOAP, and AJAX*

·         *Understanding of server and client side application development
, Middleware software’s (Oracle’s WebLogic, IBM’s WebSphere, Apache Tomcat
) *

·         Proficiency in utilization of information security tools such as
Nmap, Nessus, Burp Suite, Kismet, and Metasploit; manual techniques to
exploit vulnerabilities in networks and applications





*Thanks and Regards,*



*Manu Priya*

*Sr. Technical Recruiter*

*IDC Technologies*

*1851 McCarthy Boulevard, Suite 116|Milpitas, CA , USA, 95035*

*408-459-5794 [Direct]  I **[email protected]*
<[email protected]>

*www.idctechnologies.com* <http://www.idctechnologies.com/>



*Note: **Due to high volume of calls, I may miss your call, email is the
better way to reach me.*

-- 
You received this message because you are subscribed to the Google Groups 
"International SAP Projects" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to 
[email protected].
Visit this group at https://groups.google.com/group/international-sap-projects.
For more options, visit https://groups.google.com/d/optout.

Reply via email to