Compare Proposal

Nothing to compare.

Network Penetration & Security Assessment Proeject

  • Posted at : 1 month ago
  • Post Similar Project
2000

Budget
8
Proposals
102
Views
Closed
Status

Posted By -

AK

UAE
0.0
Projects Posted : 2
Projects Paid : 0
Services Purchased : 0
Total Spent :
0
Feedbacks : 0 %

Project Details show (+) hide (-)

A leading Cybersecurity Solution Provider is seeking an Experienced, Certified, Freelance (Project Based) Network & Infrastructure Penetration Tester / Ethical Hacker

******This is for an immediate requirement. Must be avaliable now Career opportunities******************

Prime responsibility is to simulate Gray Box / Black Box attacks on client’s Networks, Firewalls, Web Servers or any other device or appliance discovered during the reconnaissance. Identify vulnerability and Exploitation and Documenting of the finding as final report. Must be comfortable in technical communications skills. Clients interaction very minimum.



Project Responsibilities ·  
      Full Project Planning including schedules and technical requirements ·         PenTest design and select appropriate tools for testing ·         Perform a comprehensive external remote Penetration Test on Firewalls, Networks, an all internet facing devices of the client’s domain according to PTES, NIST, OWASP, OSSTM as required. ·         Perform an Internal Penetration Test and Vulnerability Assessment    ·         Document methodologies & findings ·         Information and full intelligence gathering from all phases of the project including but data intelligence not only from the output of the automated penetration tools but also from information gathered from earlier stages to identify vulnerabilities that the tools will not discover or may not discover ·         Review & analyze findings for Client Report findings and feedback to clients ·         Analyze the outcomes and make recommendations for security improvements ·         Review physical security and assist in social engineering tests where needed ·         Evaluations and Selection of Testing Tools ·         Front of the crowd on the Newest Testing Methodologies



Key Skills
 Excellent understanding of network protocols and network security protocols. ·         Solid technical skills in both information security architecture and penetration testing ·         Ability to assess testing tools and deploy the right ones ·         Project planning skills ·         A solid understanding of ethical hacking ·         Scripting and programming experience is beneficial. ·         Application Testing skills would be favorable however, not necessary. ·         Ability to explain findings to non-technical professionals ·         Excellent report writing and presentation skills ·         Able to work independently but also as part of a team ·         Flexibility to change direction and manage conflicting demands ·         Outstanding organizational and data analytics skills ·         Comfortable working in a fast-paced environment



Qualifications – Must have at least 1 ·  
 Recognized Penetration / Ethical Hacker Certi8ficaiton  (GIAC, CEH, CPTE) ·         Certified Register of Ethical Security Testers (CREST) ·         Cyber-security certifications (CHECK, CTM, CTL, CREST, TIGER, OSCP) ·         Minimum of 5 years hands on experience ·         A degree in computer security, computer science or equivalent




Relevant experience ·       
Penetration testing experience of systems, web-based applications and networks. ·         Solid knowledge and experience of using a variety of penetration testing or threat modelling tools including open source and commercial mapping ·         Experience of threat reporting and assessing vulnerabilities ·         Some consulting experience is advantageous with a proven ability to understand and meet client needs, build relationships and develop a positive dialogue ·         Adept at explaining technical jargon to non-technical parties ·         Scripting skills and reverse engineering experience is desirable ·         Past experience of using problem solving techniques and developing solutions to meet vulnerability threats

Fee This is project based freelance. Fee will be negotiated after short shortlist.

This is for an immediate requirement. Must be avaliable now Career opportunities


Your Job Feed