VM Consultant

7 August 2022
Apply Now

Apply for this job

Upload CV (doc, docx, pdf)

Job Description

Experience

5 – 10 Years

Job Location

Khafji – Saudi Arabia

Education

Any Graduation

Nationality

Indian, Saudi Arabian, Pakistani

Gender

Any

Vacancy

1 Vacancy

Job Description

Position: VM Consultant

Job Location : Leading Client in Al Khafji, Saudi Arabia.

Contract Duration: 12 months Extendable Contract.

Job Description:

1) Cyber security experience of 5 to 6+ years, the better chance of getting selected.

2) A well-developed resume showcasing diverse knowledge of various domains of cyber security. VM / pen-testing are the most important. Also, audit knowledge & certifications will be respected.

3) Incident Response approach is extremely important.

4) Very good communication, convincing & presentation skills. This is vital to handle meetings with internal teams & top management (eg. C-suite executives).

5) The candidate should be mature enough to drive the project & lead a team.

6) Knowledge of oil & gas enterprises, networks, and their security requirements.

7) Red team experience will be an added advantage for Atos as he can be utilized to simulate attack scenarios for tabletop exercises.

The roles and responsibilities for the VM consultant will include:

1. Lead the implementation, configuration, and operation of vulnerability scanning tool – rapid 7

2. Provide expert penetration testing and vulnerability analytic support at the network and server level to identify and characterize anomalies on networks that may be susceptible to exploitation

3. Conduct penetration testing for web application, mobile applications, embedded devices, wired and wireless network, servers and operating systems.

4. Make mitigation recommendations and provide secure configuration guidance based on recognized standards, as required

5. Support the security posture of customer through analysis of vulnerabilities of systems that host critical information. Such as common web application and databases (e.g., Web Server, Applications, SQL or Oracle Database Servers, appliances, network devices).

6. Evaluating underlying vulnerabilities within operating systems

7. Communicates the vulnerability assessment results and recommended remediation actions

8. Provide reporting on test results and mitigation activities and assist with the analysis of identified system, network, and data vulnerabilities and indicators of compromise

9. Deliver accurate reports in a manner that can be understood by business system owners and other stakeholders

10. Lead security scanning process

11. Scan for internal and external threats

12. Improve security posture on systems by contributing to baselines

13. Research industry threats and applicability

14. Conduct Penetration testing internally and externally

15. Conduct application security assessment and code review

16. Provide recommendation to close the identified gaps

17. Follow up on the remediation and closure of identified issues

18. Ensure findings are integrated with Security Operations Center for continuous monitoring

Employment Type