A career in IBM Consulting is rooted by long-term relationships and close collaboration with clients across the globe.
You'll work with visionaries across multiple industries to improve the hybrid cloud and AI journey for the most innovative and valuable companies in the world. Your ability to accelerate impact and make meaningful change for your clients is enabled by our strategic partner ecosystem and our robust technology platforms across the IBM portfolio; including Software and Red Hat.
Curiosity and a constant quest for knowledge serve as the foundation to success in IBM Consulting. In your role, you'll be encouraged to challenge the norm, investigate ideas outside of your role, and come up with creative solutions resulting in ground breaking impact for a wide network of clients. Our culture of evolution and empathy centers on long-term career growth and development opportunities in an environment that embraces your unique skills and experience.
- Conduct Vulnerability Assessment and Penetration Testing and configuration review for network, web application, mobile application and Source Code review.
- Involved in performing manual and automated penetration testing.
- Conduct and compile findings on new vulnerabilities, new tools for departmental useCreate project deliverables / reports and assist the immediate supervisor during submissions and client discussions
- Provide required detailed reports to management and client
- Ensure timely delivery of status updates and final reports to clients
- Handle the project as well as BAU operations
- Hands-on Experience is performing web application VAPT, Infrastructure VAPT and code review Well familiar with basics of TCP/ IP and Networking principles.
- Good understanding of OWASP top 10 and web Application security audits.
- Manual Penetration Testing skills and techniques are required besides automated tools and frameworks.
- Familiar working with Publicly available exploits codes.
- Hands on knowledge on Tools: Nmap, Kali Linux, Metasploit, Burp, Paros Proxy Nessus, Wireshark, SQL map etc.
- The candidate should be we well versed with application security concepts, network scanning tools.