IT Security officer

Required Qualifications

  • Bachelors in Computer Science/IT, BE/B. Tech with specialization in Cyber security, MCA, M. Tech / Master’s in Information security, or Forensics Analysis Knowledge. 
  • Minimum of 2-8 years of experience in the IT security industry, preferably working in a SOC/NOC environment. 
  • Certifications: Offensive Security Certified Professional (OSCP)/ Certified Ethical Hacker (CEH)/ Certified Information Security Manager (CISM) 


  • Conduct Network/ System Vulnerability Assessments, Penetration Testing using tools to evaluate attack vectors, identify system vulnerabilities, and provide appropriate remediation plans for mitigation of the identified vulnerabilities. 
  • Conduct Application vulnerability assessments, Penetration Testing for web applications, identify and report vulnerabilities, provide recommendations, and track closure of identified vulnerabilities.  
  • Perform Configuration compliance assessments for Endpoints / Assets /network devices and help maintain the security settings at compliant level with Specific Security Standards.  
  • Perform regular monitoring of patch compliance of the assets in the network, Analyze Patch Advisories and provide remediation steps for the stakeholders.   
  • Performing comprehensive review and threat adversary modeling for web applications.  
  • Conduct Vulnerability Assessments, Penetration Testing, Device Hardening, Application Security Assessments, Log Review, Review of Documents, Network Monitoring and Reporting. 
  • Conduct and compile findings on new vulnerabilities, new tools for departmental use.   
  • Perform manual testing of web applications. 
  • Conduct source-code review using automated and manual approaches. 
  • Create project deliverables / reports and assist the client with remediations and discussions.  
  • Keep oneself updated on the latest IT Security news ,exploits, hacks. 
  • Prepare Threat Intelligence reports for newly discovered threat agents, exploits, attacks. 
  • Abide by the project timelines and maintain project discipline. 

Preferred Skills

  • Hands-on Experience in Performing Network Security Assessment and vulnerability Assessment.   
  • Good understanding of OSI layers and fundamental Operating system concepts, security settings for various flavors of Windows and Linux platforms.  
  • Manual Penetration Testing skills and techniques are required besides automated tools and frameworks.   
  • Familiar working with Publicly available exploits codes.   
  • Good knowledge of modifying and compiling exploit code. 
  • Hands-on experience with popular Security tools : Nmap, KALI Linux, Metasploit, Armitage, Maltego, Burp Suite, Paros Proxy, Nessus, Nexpose, Netsparker, Wireshark, Sqlmap, ZAP etc.  
  • Sound knowledge about infrastructure vulnerability scans, identifying security vulnerabilities, weaknesses, threats, and assessing related risks that exists within an IT Infrastructure or business processes.  
  • Sound knowledge about Application vulnerability assessments and relevant knowledge of OWASP top 10 vulnerabilities and SANS.  
  • Good understanding of firewalls, Switches, and Router’s configuration settings and policies, relevant experience in performing rule base reviews and configuration reviews for network devices.  
  • Working knowledge of CIS Security benchmarks. 
  • Has practical experience in auditing various OS , DB , Network and Security technologies 
  • Microsoft office – Word, Excel, PowerPoint. 

Apply now