Penetration testing manager
Kuwait International Bank
مجموع سنوات الخبرة :16 years, 0 أشهر
Senior penetration testing consultant - temporary contract
Perform application and infrastructure penetration tests, as well as physical security review and social engineering tests for our global clients.
Attempt to “break into” the specified network.
Review and define requirements for information security solutions.
Perform security reviews of application designs, source code and deployments as required, covering all types of applications (web application, web services, mobile applications, thick client applications, SaaS).
Participate in Security Assessments of networks, systems and applications.
Work on improvements for provided security services, including the continuous enhancement of existing methodology material and supporting assets.
Document malware threats and identify procedures to avoid them.
Analyze programs and software using analysis programs to identify threats.
Classify malware based on threats and commonalities.
Keep up-to-date on the latest malware threats and keep software updated to defend against them.
Help create documentation for corporate security policies.
Understand tools that identify zero day cyber threats and work to protect from them.
Participate in research and development of malware protection tools.
Engineer, implement and monitor security measures for the protection of computer systems, networks and information.
Identify web application vulnerabilities
Identify and define system security requirements.
Design computer security architecture and develop detailed cyber security designs.
Prepare and document standard operating procedures and protocols. 3
Configure and troubleshoot security infrastructure devices.
Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks.
Ensure that the company knows as much as possible, as quickly as possible about security incidents.
Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement
Engineer, implement and monitor security measures for the protection of computer systems, networks and information.
Identify web application vulnerabilities
Identify and define system security requirements.
Design computer security architecture and develop detailed cyber security designs.
Prepare and document standard operating procedures and protocols. 3
Configure and troubleshoot security infrastructure devices.
Develop technical solutions and new security tools to help mitigate security vulnerabilities and automate repeatable tasks.
Ensure that the company knows as much as possible, as quickly as possible about security incidents.
Write comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement
Establishes networking environment by designing system configuration; directing system installation; defining, documenting, and enforcing system standards.
Maximizes network performance by monitoring performance; troubleshooting network problems and outages; scheduling upgrades; collaborating with network architects on network optimization.
Secures network system by establishing and enforcing policies; defining and monitoring access.
Updates job knowledge by participating in educational opportunities; reading professional publications; maintaining personal networks; participating in professional organizations.
Accomplishes information systems and organization mission by completing related results as needed.
Reporting network operational status by gathering, prioritizing information; managing projects.
A management information system (MIS) focuses on the management of information systems to provide efficiency and effectiveness of strategic decision making. The concept may include systems termed transaction processing system, decision support system, expert system, or executive information system. The term is often used in the academic study of businesses and has connections with other areas, such as information systems, information technology, informatics, e-commerce and computer science; as a result, the term is used interchangeably with some of these areas.
لقد تم حذف الرابط بسبب انتهاكه لسياسة الموقع. يرجى التواصل مع قسم الدعم لمزيد من المعلومات.