Ability to assess controls with respect to cloud applications as well as organization-wide controls
Demonstrable understanding of the concepts of technology controls and information security controls
The resource should be able to effectively communicate with cross-functional teams and external vendors, both written and oral communication is critical
The candidate is required to act as a “Go to” person for rest of the team.
Execute Vulnerability Assessment / Penetration Testing of systems/networks and identifies where those systems/networks deviate from acceptable configurations or policy.
𝗗𝗲𝘀𝗶𝗿𝗲𝗱 𝗦𝗸𝗶𝗹𝗹𝘀
Experience of Static and Dynamic Web Application Testing & source-code review of the application
Having good knowledge of compliance with industry standards such as PCI-DSS, ISO 27000 etc.
Experience supporting the implementation of detective, preventative, and corrective security controls to embed the organization’s security frameworks, policies, standards, and procedures effectively (ISO, NIST, PCI etc).