Careers

Careers

Sr. Security Analyst   

Years of Experience: 3 to 5 yrs

·       Conduct Security Testing and Source Code Auditing

·       Developing Security Assessment Plan, Security Assessment Report, Security Assessment Questionnaire, Rules of Engagement, kick off Brief, and Exit Brief templates

·       Analyze the vulnerabilities and bugs in the developed source code and plugins such as php, .net, Java etc.

·       Execute vulnerability assessments, threat assessment, mitigation and reporting activities in order to safeguard information assets and ensure protection has been put in place on the systems

·       Finding common web site security issues (XSS, CSRF, session fixation, SQL injection, information leakage, application logic etc.) across various platforms

·       Developed security standards and best practices for their organization

·       Developed custom scripts, used automated tools for exploiting vulnerabilities and formal tests on web-based applications on a regular basis

·       Used various security testing and Network scanning tools such as Acunetix, OWASP Tools and Nessus, Nmap, and OpenVas

·       Perform peer reviews of Security Assessment Reports


Apply

Security Analyst   

Years of Experience: 1 to 3 yrs

·       Conduct network vulnerability assessments using tools to evaluate attack vectors, identify system vulnerabilities and developed remediation plans and security procedures.

·       Conduct Penetrating Testing & Vulnerability Assessments on Web Applications and Mobile Applications, IOT and SCADA based systems

·       Good understanding of OWASP top 10 and web Application security audits.

·       Prepare reports to document vulnerabilities and security breaches and also provides recommendations for the client organizations to close the findings.

·       Use various security testing and Network scanning tools such as Acunetix, OWASP Tools and Nessus, Nmap, and OpenVas

·       Perform peer reviews of Security Assessment Reports

·       Support client users to fix the findings and when they need to install or learn about new security products and procedures


Apply

Associate Security Analyst   

Years of Experience: 0 to 1 yrs

·       Conduct network vulnerability assessments using tools to evaluate attack vectors, identify system vulnerabilities and developed remediation plans and security procedures.

·       Conduct Penetrating Testing & Vulnerability Assessments on Web Applications and Mobile Applications, IOT and SCADA based systems

·       Possess good understanding of OWASP top 10 and web Application security audits.

·       Conduct Vulnerability assessments using white box, black box and grey box techniques on various domains and applications

·       Use various security testing and Network scanning tools such as Acunetix, OWASP Tools and Nessus, Nmap, and OpenVas

·       Prepare reports and detailed the findings for the assessments conducted.


Apply

Cyber Security Intern   

Years of Experience: 0

Details

infySEC invites applicants or candidates for its Summer Internship Program on Ethical Hacking . We are seeking highly motivated students, who are interested in experiencing an exciting Summer of research. The selected students will have the opportunity to work closely with an outstanding research team on challenging problems that range from leading-edge exploratory work to prototyping real-world systems and applications. During the internship, the students will also have the opportunity to participate in the workshops, competitions, events, live projects of the largest industrial research organization in the world and network with like minded individuals. We offer Summer internship positions in various research.

What can you expect to learn on the job ?

  1. Introduction to Basics of Ethical Hacking
  2. Foot-printing Active (Tool Based Practical)
  3. Foot-printing Passive (Passive Approach)
  4. In-depth Network Scanning
  5. Enumeration User Identification
  6. System Hacking Password Cracking &Bypassing
  7. Viruses and Worms
  8. Trojans and Backdoor
  9. Bots and Botnets
  10. Sniffers MITM with Kali
  11. Sniffers MITM with Windows
  12. Social Engineering Techniques Theoretical Approach
  13. Social Engineering Toolkit Practical Based Approach
  14. Denial of Service DOS & DDOS Attacks
  15. Web Session Hijacking
  16. SQL Injection Manual Testing
  17. SQL Injection Automated Tool Based Testing
  18. Basics of Web App Security
  19. Hacking Web servers Server Rooting
  20. Hacking Wireless Networks Manual CLI Based
  21. Hacking Wireless Network: Automated Tool Based
  22. Evading IDS, Firewalls
  23. Honey pots
  24. Buffer Overflow
  25. Cryptography
  26. Penetration Testing: Basics
  27. Mobile Hacking
  28. Cloud Security and many more…

Benefits

  1. Internship Certificate
  2. Toolkit/ Software
  3. Campus Ambassador program access
  4. Workshop Passes
  5. Goodies/ Gift
  6. 6 Months of mentor-ship from industry experts

Only those candidates can apply who

  1. are available for full time (in-office) internship
  2. are available for duration of 3 months
  3. have relevant skills and interests

Other Requirements

  1. Must have a CEH certification or an equivalent
  2. Candidates who are less reliant on tools and automation would be preferred
  3. Candidates with Hall of Fame will be preferred

Apply