Associate Penetration Tester Specialist

Pune, India

Apply now Apply later

Every day, Global Payments makes it possible for millions of people to move money between buyers and sellers using our payments solutions for credit, debit, prepaid and merchant services.  Our worldwide team helps over 3 million companies, more than 1,300 financial institutions and over 600 million cardholders grow with confidence and achieve amazing results.  We are driven by our passion for success and we are proud to deliver best-in-class payment technology and software solutions.  Join our dynamic team and make your mark on the payments technology landscape of tomorrow. 

Summary of This Role

Conducts planned and authorized real world attack scenarios against corporate assets, networks and applications utilizing common hacking methodologies and tools. Leveraging industry standard methodologies, evaluates corporate security posture through various technical, manual and automated methods to accomplish various designated goals such as the review and evaluation of software or network architecture and design (consulting), the coordinated validation of defensive controls (purple team), attempted exploit, pivot and exfiltration of data (red team) and manual review / validation of the existence of vulnerabilities on systems (penetration testing). This is a highly technical and specialized position within security that requires a wide array of experience, knowledge and discipline in all aspects of IT (development, operations and security).

What Part Will You Play?

  • Creates, coordinates and plans engagements with internal customers with medium oversight from senior team members. Has plans validated and approved by an assigned senior team member and executes according to plan with limited oversight. Ability to identify and exploit more complex scenarios as well as employing stealth and evasion techniques. Be able to accurately answer questions about compliance, regulatory and policy standards.
  • Independently gather requirements in order to create appropriate engagement documentation and schedules. Can begin to document engagement plans for how an engagement is executed by other team members (under guidance of senior member of the team). Gathers and proposes final report findings with preliminary analysis and severity assignments.
  • Perform complex analysis on intelligence data to determine preliminary risks and targets as well as identify risk and findings. Independently set up and lead meetings with internal customers to coordinate the execution of engagements. Ability to communicate complex ideas to various degrees of technical resources. Ability to professionally communicate both verbally and in written form. Ability to evaluate proposed remediation actions and recommend alternate actions under moderate supervision.
  • Understand more complex architecture and design concepts of applications, hardware and networks and how they impact the security posture of the enterprise. Apply corporate and security ethics in every aspect of day to day activities.

What Are We Looking For in This Role?

Minimum Qualifications

  • Bachelor's Degree
  • Relevant Experience or Degree in: with a concentration in security, networking or development / computer science
  • Typically Minimum 4 Years Relevant Exp
  • Ethical Hacking/Penetration Testing, software development, cyber forensics or threat hunting. Additional 4 years related experience may be considered in lieu of a degree.
  • Certified Ethical Hacker (CEH) or GIAC Penetration Tester (GPEN) or equivalent certification


Preferred Qualifications

  • Typically Minimum 6 Years Relevant Exp
  • Ethical Hacking/Penetration Testing, software development, cyber forensics or threat hunting.
  • one or more of the following: CISSP, CEH, GPEN, GXPN, GWAPT, OSCP

What Are Our Desired Skills and Capabilities?

  • Skills / Knowledge - A seasoned, experienced professional with a full understanding of area of specialization; resolves a wide range of issues in creative ways. This job is the fully qualified, career-oriented, journey-level position.
  • Job Complexity - Works on problems of diverse scope where analysis of data requires evaluation of identifiable factors. Demonstrates good judgment in selecting methods and techniques for obtaining solutions. Networks with senior internal and external personnel in own area of expertise.
  • Supervision - Normally receives little instruction on day-to-day work, general instructions on new assignments.
  • Experience with vulnerability exploit techniques and tools. - Ability to setup, configure and utilize ethical hacking tools and exploits. Ability to develop exploits and demonstrate impacts to others
  • Proficient in research and analysis of security intelligence data, system/application/network configurations and logs - Ability to understand and execute complex analysis of intelligence data as well as systems/application/network configurations and logs to determine preliminary threats, targets and evaluate risk appropriately. Ability to apply controls to safely traverse the dark web for research purposes.
  • Experience with activities involving APT Threats - Ability to describe various tools, techniques, and procedures (TTPs) associated with threat actors known to operate in the financial services domain.

Global Payments Inc. is an equal opportunity employer. Global Payments provides equal employment opportunities to all employees and applicants for employment without regard to race, color, religion, sex (including pregnancy), national origin, ancestry, age, marital status, sexual orientation, gender identity or expression, disability, veteran status, genetic information or any other basis protected by law. If you wish to request reasonable accommodations related to applying for employment or provide feedback about the accessibility of this website, please contact jobs@globalpay.com.

Apply now Apply later

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  1  0  0
Category: PenTesting Jobs

Tags: APT CEH CISSP Compliance Computer Science Ethical hacking Exploit Exploits Forensics GIAC GPEN GWAPT GXPN OSCP Pentesting Red team TTPs Vulnerabilities

Perks/benefits: Career development

Region: Asia/Pacific
Country: India

More jobs like this

Explore more career opportunities

Find even more open roles below ordered by popularity of job title or skills/products/technologies used.