Role & Responsibilities:
- Responsible for Securing Environment by implementing Effective Vulnerability management
- Responsible for maintaining and enhancing the daily operations of the Security team providing 9/5 security support.
- Responsible for Incident Validation, Incident Analysis, Solution Recommendation, Escalation resolution, Maintain Knowledge base, Patch implementation.
- Responsible for closing incidents/reports.
- Taking ownership and accountability of issue escalation from clients.
- Continuous monitoring of vulnerability trends and metrics to assess the impact to platform and applications Security assurance (VM + Policy compliance scan + PT)
- Development, revision, and maintenance of Standard Operating Procedures and other Operational Documents
- Discover, Prioritize, Guide the Implementation teams, Monitor the Implementations for target components
- Monthly release of patches to teams and Track the Implementations
- Research and provide the procedures to implement/ remediate vulnerabilities
- Providing hardening procedures for Middleware and Database (WebLogic, tomcat, MQ, Apache, Oracle SOA; DB:MS SQL, MY SQL, Oracle, Ingres)
- Streamlining the Patch management Process
- Advise and recommend for TCS endpoint Security in the account
Required Skill & Experience:
- At least 5-7 years of experience
- 6API manual Penetration testing
- Experience in Web application penetration testing followed by OWASP standards.
- Experience with Burpsuite Manual and automated penetration testing.
- Experience in manually analyzing requests/responses, looking for common vulnerabilities, segregating false positives findings for the perfect result.
- In-depth knowledge of OWASP top 10 API and Web Application vulnerabilities (SQL injection, XSS, CSRF etc.)
- Experience/knowledge with DAST and SAST
- Experience in preparing comprehensive security report detailing identifications and recommendations for the vulnerabilities shared and presented with the client.
- Basic knowledge of RESTful API and SOAP API
- Experience in Information security and Vulnerability management