AC

Threat Vulnerability Management - TVM

Acme Services
Mumbai2-6 LPA Posted 18 Jul 2025
FULL TIME
Owasp
Network Troubleshooting
Bash
Pci Dss
Virtual Machines

Job Description

  • Technical concepts such as application security, network segregation, access controls, IDS/IPS devices, physical security, and information security risk management;
  • Security testing tools, such as BurpSuite, Mimikatz, Cobalt Strike, PowerSploit, Metasploit, Nessus, HP Web Inspect, or other tools included within the Kali Linux distribution;
  • Networking protocols, TCP/IP stack, systems architecture, and operating systems;
  • Common programming and scripting languages, such as Python, PowerShell, Ruby, Perl, Bash, JavaScript, or VBScript;
  • Well-known Cybersecurity frameworks and industry-leading practices such as OWASP, NIST CSF, PCI DSS, and NY-DFS; and,
  • Traditional security operations, event monitoring, and Security Information and Event Management (SIEM) tools.

Demonstrates thorough abilities and/or a proven record of success in the following areas:

  • Performing penetration testing activities within a client s environment, emphasizing manual stealthy testing techniques;
  • Executing stealthy penetration testing, advanced red team, or adversary simulation engagements using commercially / freely available offensive security tools and utilities built into operating systems;
  • Understanding Windows and Linux operating system setup, management, and power usage, e.g., cmd, bash, network troubleshooting, virtual machines; .
  • Identifying security critical vulnerabilities without utilizing a vulnerability scanning tool, i.e., knowledge of exploitable vulnerabilities and ability to execute stealthy penetration testing engagements;
  • Compromising Active Directory environments and demonstrating business impact by identifying and obtaining access to business critical assets/information;
  • Performing social engineering / phishing activities such as reconnaissance of targets, developing phishing campaigns (e.g., emails and websites), web hosting administrator, developing malicious phishing payloads, or pivoting through phished systems;
  • Participating actively in client discussions and meetings and communicating a broad range of potential add-on services based on identified weaknesses;
  • Managing engagements with junior staff;
  • Preparing concise and accurate documents, leveraging and utilizing MS Office and Google Docs to complete related project deliverables, as necessary;
  • Balancing project economics management with the occurrence of unanticipated issues.
  • Creating a positive environment by monitoring workloads of the team while meeting client expectations and respecting the work-life quality of team members;
  • Proactively seeking guidance, clarification, and feedback; and,

Join WhatsApp Channel