Job Description
Experience
5 – 10 Years
Job Location
Education
Any Graduation
Nationality
Indian, Saudi Arabian, Pakistani
Gender
Any
Vacancy
1 Vacancy
Job Description
Position: VM Consultant
Job Location : Leading Client in Al Khafji, Saudi Arabia.
Contract Duration: 12 months Extendable Contract.
Job Description:
1) Cyber security experience of 5 to 6+ years, the better chance of getting selected.
2) A well-developed resume showcasing diverse knowledge of various domains of cyber security. VM / pen-testing are the most important. Also, audit knowledge & certifications will be respected.
3) Incident Response approach is extremely important.
4) Very good communication, convincing & presentation skills. This is vital to handle meetings with internal teams & top management (eg. C-suite executives).
5) The candidate should be mature enough to drive the project & lead a team.
6) Knowledge of oil & gas enterprises, networks, and their security requirements.
7) Red team experience will be an added advantage for Atos as he can be utilized to simulate attack scenarios for tabletop exercises.
The roles and responsibilities for the VM consultant will include:
1. Lead the implementation, configuration, and operation of vulnerability scanning tool – rapid 7
2. Provide expert penetration testing and vulnerability analytic support at the network and server level to identify and characterize anomalies on networks that may be susceptible to exploitation
3. Conduct penetration testing for web application, mobile applications, embedded devices, wired and wireless network, servers and operating systems.
4. Make mitigation recommendations and provide secure configuration guidance based on recognized standards, as required
5. Support the security posture of customer through analysis of vulnerabilities of systems that host critical information. Such as common web application and databases (e.g., Web Server, Applications, SQL or Oracle Database Servers, appliances, network devices).
6. Evaluating underlying vulnerabilities within operating systems
7. Communicates the vulnerability assessment results and recommended remediation actions
8. Provide reporting on test results and mitigation activities and assist with the analysis of identified system, network, and data vulnerabilities and indicators of compromise
9. Deliver accurate reports in a manner that can be understood by business system owners and other stakeholders
10. Lead security scanning process
11. Scan for internal and external threats
12. Improve security posture on systems by contributing to baselines
13. Research industry threats and applicability
14. Conduct Penetration testing internally and externally
15. Conduct application security assessment and code review
16. Provide recommendation to close the identified gaps
17. Follow up on the remediation and closure of identified issues
18. Ensure findings are integrated with Security Operations Center for continuous monitoring