Epicareer Might not Working Properly
Learn More
A

Cyber Security Consultant

RM 6,000 - RM 7,999 / Per Mon

Apply on

Availability Status

This job is expected to be in high demand and may close soon. We’ll remove this job ad once it's closed.


Original
Simplified
Leads or participates on teams that perform vulnerability assessments, penetration tests, social engineering exercises, and other cyber security projects for clients Performs and leads teams performing vulnerability assessments and penetration tests using such tools as NMAP, Nessus, Nipper, BurpSuite, Metasploit and other toolsets as applicable Investigate and report on security threats and incidents Demonstrated ability to coordinate and educate other professionals in areas of expertise Ability to develop creative solutions to complex technical problems Designs, develops, tests, and implements software applications for internal and external customers Contributes to service delivery effectiveness through the consistent application of Best Practices as specified by project plans Provide field specific feedback to R&D and Product Management Requirements: To be successful in this role, it is recommended that you should have the following skills and qualifications: A degree in the related job field. At least 3 to 5 years of working exposure or experience in a similar role. Willing to relocate to the job location. When you send us your resume and personal details, it is deemed you have provided your consent for us to keep or store your information in our database. All the information you have provided is only used for the recruitment process.Acumen will only collect, use, process or disclose personal information where and when allowed to under applicable laws. Only shortlisted candidates will be contacted for an interview. Skill Set: VMware Esxi and Workstation, Virtualbox, Vsphere, McAfee Foundstone, Solarwinds SIEM, HP WebInspect, OWASP tools, AppDetective, Saint, Tenable Nessus, OSSEC HIDS, Websense, Nagios, Puppet, Ansible, Splunk, Sourcefire Snort, IpTables, IPF, Nmap, Netcat, Tcpdump, Nikto, Paros proxy, HAProxy, WebScarab, Wireshark, Ethereal, Metasploit, Netbackup, Apache, Squid, Varnish Reverse proxy , MySQL, Oracle, MSSQL Server, Git, CVS, Dot Project, Solaris Security Toolkit, Asterisk VoIP server, Tomcat, Windows Sharepoint.