Centific
Location
Bangalore | India
Job description
1. Security Assessment: - Conduct comprehensive security assessments of applications, identifying vulnerabilities, and providing recommendations for remediation. - Perform penetration testing and code reviews to ensure the robustness of applications against security threats. 2. Security Architecture: - Collaborate with development teams to integrate security measures into the application architecture and development process. - Design and implement security controls, ensuring the confidentiality, integrity, and availability of application data and systems. 3. Threat Modeling: - Develop threat models for applications to anticipate and address potential security risks. - Work closely with development teams to prioritize and address identified security threats and vulnerabilities. 4. Incident Response: - Participate in incident response activities, providing expertise to analyze and mitigate security incidents related to applications. - Develop and maintain incident response plans for application security. 5. Security Training and Awareness: - Provide training and awareness programs for development teams to promote secure coding practices. - Stay current with industry trends and emerging threats, sharing knowledge with the organization to enhance security awareness. 6. Security Tools and Automation: - Evaluate, implement, and manage security tools for continuous monitoring, vulnerability scanning, and threat detection. - Develop and maintain automation scripts for security testing and monitoring processes. 7. Compliance and Standards: - Ensure applications comply with industry standards, regulations, and best practices related to security. - Support audits and assessments related to application security. 8. Collaboration: - Collaborate with cross-functional teams, including developers, system administrators, and network engineers, to integrate security measures into the entire application lifecycle. - Work closely with other security professionals to align application security with overall organizational security strategies. 9. Documentation: - Create and maintain documentation related to application security policies, procedures, and guidelines. - Prepare reports and communicate security status and improvements to stakeholders.
Preferred candidate profile with Certifications Must 1. CompTIA PenTest+ 2. EC-Council Certified Ethical Hacker (CEH) 3. Certified Penetration Tester (CPT) 4. Certified Expert Penetration Tester (CEPT) 5. Certified Cloud Penetration Tester (CCPT) 6. Certified Mobile and Web Application Penetration Tester (CMWAPT) 7. EC-Council Licensed Penetration Tester (LPT) Master 8. Global Information Assurance Certification (GIAC) Penetration Tester (GPENJob tags
Salary