Security Tester (Network & Application)
Date Submitted: 05-02-2021 | End date: 05-03-2021
Industry Specialization | : | |
Type of Employment | : | Permanent |
Minimum Experience | : | 2 years |
Work Location | : | South Singapore |
Job Description:
- Perform manual or automated security testing using commercial security testing tools
- Conduct Greybox Testing (Authenticated) and/or Blackbox Testing (Unauthenticated) Penetration Tests
- Conduct Whitebox Testing and Secure Code Review
- Conduct Network and Infrastructure Vulnerability Assessment and Penetration Testing
- Conduct Web, Mobile and Desktop Application Vulnerability Assessment and Penetration Testing
- Find and pinpoint the vulnerabilities of the assess target system / application
- Document and Report the vulnerabilities found in the system
- Provide professional recommendations / advice to mitigate and resolve the vulnerabilities
- Present the security testing results to the relevant stakeholders
Requirements:
- Bachelor’s degree, preferably in computer science or information systems, or equivalent work experience
- Minimum 3 – 5 years security experience in a security analyst, engineer, architect, consultant, or a similar role
- Minimum 3 years’ professional experience in conducting vulnerability assessment and penetration testing
- Required Certifications: Any of the followings:
- CREST Registered Penetration Tester (CREST CRT)
- CREST Practitioner Security Analyst (CREST CPSA)
- Offensive Security Certified Professional (OSCP)
- Offensive Security Certified Expert (OSCE)
- Offensive Security Wireless Professional (OSWP)
- Offensive Security Web Expert (OSWE)
- Certified Ethical Hacker (CEH)
- Certified Ethical Hacker (CEH) Practical
- Penetration Tester (GPEN)
- Web Application Penetration Tester (GWAPT)
- Knowledge in conducting security testing with the following guidelines and standards:
- Open Web Application Security Project (OWASP Top 10 Frameworks)
- Common Vulnerability Scoring System (CVSS)
- Common Vulnerabilities and Exposures (CVE)
- Common Weakness Enumeration (CWE) / SANS Top 25 Software Errors
- High proficiency in manual and automated techniques for penetration testing (network equipment, servers, web applications, APIs, wireless, mobile, databases, and other information systems), as well as executing vulnerability assessments (injection, privilege escalation, fuzzing, buffer overflows, etc.)
- Tools – Proxies, Port Scanners, Vulnerability Scanners, Exploit Frameworks (ex: Burp, Nessus, Nmap, Metasploit)
- Strong oral and written communication skills, including a demonstrated ability to prepare quality documentation and presentations for technical and non-technical audiences