DXC Technology

Advisor Information Security (BB-3399D)

Found in: Talent IN

Job Description:Essential Job FunctionsMinimum requirementsTwo team members , Security Analyst excluded, must have at least 1 certification each from the following. Those 2 certifications must be different from each other. Example: SC_1 has GIAC GPEN and SM_1 has OSCP – Eligible; SC_1 has GIAC GPEN and SM_1 has GIAC GPEN - Not eligiblea. GIAC GPEN Certification (Network Penetration Testing and Ethical Hacking) - Offensive Security Certified Expertb. GIAC GWAPT Certification (Web Application Pen Tester) c. GIAC GCIH Certification (Hacker Techniques, Exploits & Incident Handling) d. OSCP - Offensive Security Certified Professional e. GIAC GXPN (Advanced Penetration Testing, Exploits, and Ethical Hacking) f. GIAC GMOB Certification (Mobile Device Security and Ethical Hacking) g. OSSTMM Penetration Security Tester/Analyst (OPST/OPSA)h. CEH (Certified Ethical Hacker) i. eMAPT (Mobile Application Penetration Testing) Thorough knowledge in the areas of data protection of the business and corporateAt least 4 years in ICT Security scope consulting (in the role)At least 3 years in activity of Ethical Hacking/Penetration test for IT or IoT or OT applications and infrastructureUnderstanding of the main security standards and best practices as well as organization, and methodologies for security assuranceParticipation with the role of security consultant in at least in one project of Ethical Hacking/Penetration test for IT or IoT or OT applications andinfrastructure with a duration of at least one solar yearParticipation with the role of security consultant in at least one project in ICT Security scope in large and complex companiesEach resource experience shall comply with the following:i) have been performed in the period 01/01/2014 – 01/09/2019 (“validity window”);ii) have reached a min duration of at least 6 months in case of each Projectsiii) The number of months have to be reproportioned on the real effort the resource has spent on the activity.Each CV shall contain a maximum of 7 references (projects or activities). In case more than 7 references are declared, evaluation of CV shall be based on the first 7 experiences (top-down) included in the CV Rewarding elementsAdditional experience in the specific roleExperience of Ethical Hacking in OT environment (industrial and manufacturing areas, utilities, chemical, automotive, pharmaceutical, etc)Basic QualificationsBachelor's degree or equivalent combination of education and experienceBachelor's degree in computer science, management information systems, or related field preferredCISSP certification preferredNine or more years of experience in computer science, management information systems, or data security experienceExperience working with information security practices, networks, software, and hardwareExperience working with computer programmingExperience working with operating systemsExperience working with computer desktop packages such as Microsoft Word, Excel, etc.Experience working with security architectureOther QualificationsStrong analytical and problem solving skills for resolving security issuesGood organization skills to balance work and lead projectsBasic leadership skills to effectively mentor and lead junior level personnelGood interpersonal skills to interact with customers and team membersStrong communication skills to interact with team members and support personnelStrong skills implementing and configuring networks and network componentsAbility to work with relational databasesAbility to work in a team environmentWork EnvironmentOffice environmentMay require shift workMay require weekend work

calendar_today3 days ago


location_on Noida, India

work DXC Technology

I expressly authorise the Terms and Conditions

Similar jobs