*Title                 : Application Security*

*Location           : Pittsfield, MA*

*Duration           : 6+ Months*



This service will provide following functions for Application security and
information protection globally:

·         Conduct application security assessment for all types of
applications, internet, extranet, Intranet, mobile, etc.

·         Thorough review of various application architectures and attack
vectors on application tier and database tier components.

·         Conduct application vulnerability assessments, penetration
testing with usage of applications security tools and source code analyzers.

·         Manage and administer IBM AppScan Enterprise tool for Application
assessment and Qualys Dell SecureWorks tool for Database vulnerability
management.

·         Web Application Dynamic Scanning using IBM AppScan Dynamic
Scanner.

·         Web Application Static Scanning using IBM AppScan Source for
Analysis.

·         Manage IBM AppScan GSC component for Web Services vulnerability
assessment.

·         Manage IBM AppScan Web Explorer tool for manual exploration of
web applications.

·         Manage Virtual Forge Code Profiler tool for scanning SAP ABAP
code.

·         Provide secure development standards and practices for the
following application languages/platforms: Microsoft .NET, J2EE, SAP ABAP,
IOS, Android and Oracle DB/MS SQL Server.

·         Review Web-based solutions developed in HTML5, DHTML, CSS, and
JavaScript.

·         Providing fix recommendations for vulnerabilities to software
development teams.

·         Adopt one of leading methodologies used in industry like OWASP,
CVSS, CWE, OSSTMM and/or SANS-25.

·         Design and develop security controls for applications.

·         Use of Secure Software Development Life Cycle (SSDLC) and IT
Processes.

·         Vulnerability Assessment and Penetration Testing.

·         Applications Security Assurance including web and mobile apps.

·         Identify & Remediate Software Vulnerabilities Earlier in the
Development Lifecycle.

·         Building Secure Code Policies, Guidelines, & Standards

·         Empower Developers and Architects to Identify & Eliminate
Software Vulnerabilities.

·         Detailed and In-depth Application Security Analysis.

·         Threat modeling and Application Design review

·         Reporting Vulnerability assessment and fix recommendations.

·         Securing applications before going into production.

-- 

Thanks & Regards

*Divyansh Kumar Singh*

VBeyond Corporation

[email protected] <[email protected]>

*Phone*: 908-988-0328 *Ext*: 303

-- 
You received this message because you are subscribed to the Google Groups 
"Oracle-Projects" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
To post to this group, send email to [email protected].
Visit this group at http://groups.google.com/group/oracle-projects.
For more options, visit https://groups.google.com/d/optout.

Reply via email to