CYBER SECURITY CONSULTANT

As an expert consultant, candidates will design and implement the best security solutions needs.

REQUIREMENTS

  • Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field.
  • 4-6 years of professional experience
  • Candidates must have knowledge and working experience in IDS/IPS, penetration and vulnerability testing
  • Candidates must have knowledge and working firewall and intrusion detection/prevention protocols
  • Candidates must have skills in sub netting, DNS, encryption technologies and standards, VPNs, VLANs, VoIP and other network routing methods
  • Familiar with ISO 27001/27002, ITIL and COBIT frameworks
  • Fast learner and able to implement leading edge information technologies
  • Able to work as part of team and independently
  • Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  • CISSP: Certified Information Systems Security Professional
  • OSCP: Offensive Security Certified Professional

CYBER SECURITY AUDITOR

A Security Auditor probes the safety and effectiveness of computer systems and their related security components.

As a security auditor, candidates will be conducting a security audit, provide issue a detailed report that outlines the effectiveness of the system, explains any security issues and suggests changes and improvements.

REQUIREMENTS

  • Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field.
  • 5 years of professional experience
  • Candidates must have knowledge of regulatory and industry data security standards (e.g. FFIEC, HIPAA, PCI, NERC, SOX, NIST, EU/Safe Harbor and GLBA)
  • Candidates must have knowledge and working experience in firewall and intrusion detection/prevention protocols
  • Familiar with ISO 27001/27002, ITIL and COBIT frameworks
  • Fast learner and able to implement leading edge information technologies
  • Able to work as part of team and independently
  • Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  • CISSP: Certified Information Systems Security Professional
  • CISA: Certified Information Systems Auditor

CYBER SECURITY SOFTWARE DEVELOPER

As a software security developer, candidates will be developing security software, creating new exploits tools and develop tools for virus/spyware/malware detection, intrusion detection, traffic analysis, etc.

REQUIREMENTS

  • Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  • 5 years of professional experience
  • Candidates must have knowledge and working experience in Windows, UNIX and Linux operating systems
  • Candidates must have skills in programming C, C++, C#, Java, ASM, PHP, Perl, Python
  • Familiar with relational databases (e.g. SQL, MySQL, SQLite, etc.)
  • Fast learner and able to implement leading edge information technologies
  • Able to work as part of team and independently
  • Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  • CSSLP: Certified Secure Software Lifecycle Professional
  • ECSP: EC-Council Certified Secure Programmer

CYBER SECURITY ANALYST

A Security Analyst detects and prevents cyber threats to an organization.

As a security analyst, candidates will work to find out the weaknesses in the infrastructure (software, hardware and networks) and find creative ways to protect it.

REQUIREMENTS

  • Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  • 2 – 5 years of professional experience
  • Candidates must have knowledge and working experience in IDS/IPS, penetration and vulnerability testing
  • Candidates must have skills in TCP/IP, computer networking, routing and switching
  • Candidates must have knowledge and working experience in Firewall and intrusion detection/prevention protocols
  • Familiar with DLP, anti-virus and anti-malware
  • Fast learner and able to implement leading edge information technologies
  • Able to work as part of team and independently
  • Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  • ECSA: EC-Council Certified Security Analyst
  • CEH: Certified Ethical Hacker

PENETRATION TESTER

A Penetration Tester (a.k.a. Ethical Hacker) probes for and exploits security vulnerabilities in applications, networks and systems.

As a penetration tester, candidates will conduct legal vulnerability assessment, penetration testing for organization’s and/or customer’s needs.

REQUIREMENTS

  • Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  • 2 – 4 years of professional experience
  • Candidates must have skills in programming C, C++, C#, Java, ASM, PHP, PERL, Python
  • Familiar working with Forensics tools
  • Candidates must have knowledge in cryptography principles, various penetration testing method and methodology
  • Able to do Vulnerability analysis and reverse engineering
  • Fast learner and able to implement leading edge information technologies
  • Able to work as part of team and independently
  • Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  • OSCP: Offensive Security Certified Professional
  • CEH: Certified Ethical Hacker

CYBER FORENSICS EXPERT

A Forensics Expert is a digital detective, harvesting and analyzing evidence from computers, networks and other forms of data storage devices.

As a forensics expert, candidates will be work against the bad guys, investigating traces of complex cybercrimes and/or cyber terrorist or a malware attacker.

REQUIREMENTS

  • Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  • 1 – 3 years of professional experience
  • Candidates must possess Network skills, including TCP/IP-based network communications (much of modern forensics involves reading network traces)
  • Able to do backup and archiving technologies
  • Familiar with Cryptography principles
  • Experience working with eDiscovery tools
  • Experience working with forensic software applications
  • Data processing skills in electronic disclosure environments
  • Evidence handling procedures and ACPO guidelines
  • Fast learner and able to implement leading edge information technologies
  • Able to work as part of team and independently
  • Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  • GCFA: GIAC Certified Forensic Analyst
  • GCFE: GIAC Certified Forensic Examiner

CEH: Certified Ethical Hacker

INCIDENT RESPONDER

An Incident Responder (a.k.a. CSIRT Engineer or Intrusion Analyst) is a cyber firefighter, rapidly addressing security incidents and threats.

As an incident responder, candidates will work with forensics tools to find the root cause of a problem, monitoring the SOC and also involve education and prevention.

REQUIREMENTS

  • Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  • 2 – 4 years of professional experience
  • Candidates must possess Network skills, including TCP/IP-based network communications (much of modern forensics involves reading network traces)
  • Able to do backup and archiving technologies
  • Familiar with Web-based application security
  • Experience working with eDiscovery tools
  • Experience working with forensic software applications
  • Experience working with Enterprise system monitoring tools and SIEMs
  • Fast learner and able to implement leading edge information technologies
  • Able to work as part of team and independently
  • Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  • CEH: Certified Ethical Hacker
  • GCIH: GIAC Certified Incident Handler

CYBER SECURITY ENGINEER

A Security Engineer builds and maintains IT security solutions.

As a security engineer, candidates will be developing security for systems/projects and handling any technical problems that arise.

REQUIREMENTS

  • Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  • 3 – 5 years of professional experience
  • Candidates must possess knowledge in IDS/IPS, penetration and vulnerability testing
  • Candidates must possess knowledge in identity and access management principles
  • Has the skills in Firewall and intrusion detection/prevention protocols
  • Has the skills in application security and encryption technologies
  • Familiar with Secure coding practices, ethical hacking and threat modeling
  • Familiar with various network routing methods and protocols
  • Fast learner and able to implement leading edge information technologies
  • Able to work as part of team and independently
  • Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  • CEH: Certified Ethical Hacker
  • CCNP Security: Cisco Certified Network Professional Security

SOURCE CODE AUDITOR

A Source Code Auditor reviews source code to discover potential security weaknesses, bugs and violations of programming conventions.

As a source code auditor, candidates will working to find the weaknesses in a programming project – e.g. finding code that might expose data and system resources to hackers.

REQUIREMENTS

  • Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  • 3 – 5 years of professional experience
  • Candidates must possess skills in C, C++, C#, Java, ASM, PHP, PERL, Python, etc
  • Familiar secure coding guidelines and standards (e.g. MITRE, NIST)
  • Experience working with source code analysis tools.
  • Fast learner and able to implement leading edge information technologies
  • Able to work as part of team and independently
  • Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  • GIAC Software Security Certifications
  • CSSLP: Certified Secure Software Lifecycle Professional

FRONT END UI/UX DEVELOPER

Job Description:

  • Convert PSD or sketch files to HTML & CSS for responsive web
  • Excellent skill and understanding on Mobile Web & Responsive Web Design
  • Ensuring the technical feasibility of UI/UX designs
  • Translation of the UI/UX design wireframes to actual code that will produce visual elements of the application
  • work with the UI/UX designer and bridge the gap between graphical design and technical implementation, taking an active role on both sides and defining how the application looks as well as how it works
  • Create cascading style sheets (CSS) that are consistent across all browsers and platforms

Requirements:

  • Min 3 years experience as Front End UI/UX
  • understanding of web markup, including HTML5, CSS3 and Javascript
  • Good understanding of  advanced JavaScript libraries and frameworks, such as AngularJS, KnockoutJS, BackboneJS, ReactJS, DurandalJS etc
  • understanding of client-side scripting and JavaScript frameworks, including jQuery
  • understanding of cross-browser compatibility issues and ways to work around them
  • Familiar with Illustrator & Photoshop

Fill the form and drop your CV