What are the responsibilities and job description for the Cyber Security Cloud Application Tester position at Vedic Staffing?
Job Details
/// ONLY LOCAL CANDIDATES OF TEXAS STATE NEEDED - NO RELOCATION ACCEPTED ///
Job Title: Cyber Security Cloud Application Tester Advanced Level
Location: Spring, TX 77389 (Day 1 Onsite)
Job Type: 12 Months (Long Term Contract)
Experience needed 11-12 years
Top Skills:-
Manual Cloud-Based Application Testing.
Current working on .Experience with a diverse set of technologies.SAP applications testing experience is a plus.Little travel or No travel involve in this role.experience Azure cloud platform /AWS/Google Cloud Platformis a must-have
Other enterprise-level security control implementations (NIPS/NIDS), etc., relevant to Cybersecurity testing experience is a mandate.
Job Description:
Client is seeking a , to serve as a member of a Vulnerability Testing Team.
Cloud Application Tester Cyber Security Cloud Tester
Key Roles and Responsibilities:-
Independently by analyzing systems to determine the presence of vulnerabilities.Interact with customers remediation and validation questions
execute manual cloud-based vulnerability assessments
Report findings into tracking system with appropriate risk, quality, and effectiveness
Skills:-
Possess including Preferably in Be familiar with various to level of knowing what they do and how they operate.
Strong understanding of web technologies, e.g. Understanding of compliance and regulatory requirements such as , etc.
Full grasp and ability to articulate and/or train others on the and related conceptsAbility to Ability to capture and analyze network traffic, including ability to discern whether said network traffic contains vulnerabilities and/or sensitive data
Have a solid grasp of expert technical understanding of cloud environmentIAM, infrastructure, networking, automation, authentication, and security policies.
Azure and/or AWS security assessment tools, and techniques
Min 2 years' experience penetration/vulnerability testing of cloud systems in an enterprise environment
HTTP, HTML, CSS, Forms, Database Connectivity, etc.
PCI DSS, SOX, HIPAA
OWASP Top 10
perform manual web application vulnerability assessments without the use of automated tools such as web application scanners
core security fundamentals and concepts, including knowing one s system, defense in depth, the principle of least privilege, access control, encryption and cryptography, security architecture and design, business continuity and disaster recovery, etc.