Security Consultant - Network and Infrastructure Pentesting

Maharashtra, Pune, India

Apply now Apply later

Are you interested in automating the build and deployment process of the application with ensuring the application security? If yes, then Payatu is the place for you. We are always in search of passionate people to expand our renowned Bandit family at Payatu. In the quest for Bandits, here is an excellent opportunity we would like to share with you. 
Who we are?
Payatu is a GPTW certified company where we strive to create a culture of excellence, growth and innovation that empowers our employees to reach new heights in their careers. We are young and passionate folks driven by the power of the latest and innovative technologies in IoT, AI/ML, Blockchain, and many other advanced technologies. We are on the mission of making Cyberworld safe for every organization, product, and individual.
What we look for outside work parameters?
 -Your expertise is your primary qualification, not your degree or certification.  -Your publicly known contributions are your credentials. -Papers you have written, tools you have developed are your references.  -Your write-up reflects your interests and ethics.  -Your published exploits, your CTF scores, and hall of fame listings are the testimonies of your work.  -Your research paper was published and presented at conferences.  -You are learning from the community and enthusiastically contributing back. 
You are a perfect technical fit if:
-Strong fundamental of web application, infrastructure, and network protocols.-Stronghold on Web application security, infrastructure and network security concept and penetration testing skill. -Proficient with command line utilities that are required in penetration testing. -Should be aware of mitigation and remediation strategies. -Proficient with Azure services, OpenShift, Red Hat Enterprise, Linux and Docker. -Hands-on experience in performing penetration testing of web-based applications preferably in the financial domain. -Good to have certifications like CRTP/CRTE/CRTO/OSCP. -Good to have experience in working alongside the development/QA teams. -Good report writing and presentation skills. -Should be able to suggest optimum security improvements to application components. 
You Have All Our Desired Qualities, if:
 -You have experience in web application, infrastructure, and network security assessment.  -You have a history of publishing or presenting good research.  -You have the knack of finding security bugs in everything you touch. -You like automating stuff. -You like writing tools.  -You have excellent written and verbal communication skills and the ability to express your thoughts clearly. -You have the skill to articulate and present technical things in business language. -You can work independently as well as within a team and meet project schedules and deadlines. -You have strong problem solving, troubleshooting, and analysis skills. -You are passionate about your area of expertise and self-driven. -You are comfortable working in a dynamic and fast-paced work environment. -You are Self-driven, proactive, hardworking, team-player. -You are working on something on your own in your field apart from official work. 
Your everyday work will look like:
-Security assessment of web application, infrastructure and network service on various platforms. -Back your findings with Proof-of-concept exploits. -Collect evidence and maintain a detailed write-up of the findings. -Understand and explain the results with impact on business and compliance status. -Explain and demonstrate vulnerabilities to application/system owners. -Provide appropriate remediation and mitigations of the identified vulnerabilities. -Individually or collaboratively review the system designs, source code, configurations, communications for security gaps. -Deliver results within stipulated timelines. -Sharpen your saw with continuous research, learning, training on the latest tools and techniques, keeping up with new research, and sharing the same with the ecosystem. -Communicate well using verbal and written skills, within and out of the team
Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  7  0  0

Tags: Application security Azure Blockchain Compliance CTF Docker Exploits IoT Linux Network security OSCP Pentesting Red Hat Security assessment Vulnerabilities

Perks/benefits: Career development Conferences Startup environment

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.