Détails de l'annonce
Référence:
49245
Publiée le:
28 juin 2017
Type de poste:
CDI, ,, CDD, ,, SIVP, ,, Indépendant/Freelance, ,, Stage/PFE
Lieu de travail:
La Goulette, Tunis, Tunisie
Expérience:
Entre 1 et 2 ans
Étude:
Bac + 3
Disponibilité:
Plein temps
Langues:
Arabe , Français , Anglais
Mobilité:
Locale, International
Entreprise:
anonymous logo
KAWAMI
Secteur: informatique / télécoms
Taille: Moins de 20 employés
Description de l'annonce:

Kawami is an innovation consulting firm. Our expertise varies from, Web Development, Web-Marketing, Intrapreneurship, Design, Ideation, Business modeling, Change Design, Business planning, to Customer Discovery.

The services provided by Kawami are here to serve your customer need. So from the very beginning of each project undertaken by Kawami, we make sure to dig very deep to understand what really matters for the customers, and find out the best solutions.

Because all humans are different and unique, here at Kawami we help companies like yours reach their customers on a unique and personnalized way. We have the knowhow to assist you from ideation to commercialization through innovative techniques that are used by the most successfull startups in the world.

We take the initiative at Kawami to make a deep profiling of the customer and different user types. Our team will be heading out of the office to go and meet directly the customers when it is possible and build up a solution that is tailor made for them and their needs.

======================================================================================================

The day-to-day

  • Plan the penetration test

  • Select, design and create appropriate tools for testing

  • Perform the penetration test on computer systems, networks, web-based and mobile applications

  • Document your methodologies

  • Gather the data intelligence not only from the output of the automated penetration tools but also from information gathered from earlier stages to identify vulnerabilities that the tools may not see

  • Review your findings and feedback to clients

  • Analyse the outcomes and make recommendations for security improvements

Key responsibilities

  • Carry out application, network, systems and infrastructure penetration tests

  • Review physical security and perform social engineering tests where appropriate

  • Evaluate and select from a range of penetration testing tools

  • Keep up to date with latest testing and ethical hacking methods

  • Deploy the testing methodology and collect data

  • Report on findings to a range of stakeholders

  • Make suggestions for security improvements

  • Enhance existing methodology material

Key skills

  • Good understanding of network protocols

  • Solid technical skills in both information security architecture and penetration testing

  • Ability to assess testing tools and deploy the right ones

  • Project planning skills

  • A solid understanding of ethical hacking

  • Scripting and programming experience is beneficial

  • Ability to explain findings to non-technical professionals

  • Excellent report writing and presentation skills

  • Customer facing skills and a proven track-record of building client relationships

  • Able to work independently but also as part of a team

  • Flexibility to change direction and manage conflicting demands

  • Outstanding organisational and data analytics skills

  • Comfortable working in a fast-paced environment

Qualifications

  • Certified Register of Ethical Security Testers (CREST)

  • Cyber-security certifications (CHECK, CTM, CTL, CREST, TIGER, OSCP)

  • A degree in computer security, computer science or equivalent

  • Recognised security testing certifications (GIAC, CEH)

Relevant experience

  • Penetration testing experience of systems, web-based applications and networks.

  • Solid knowledge and experience of using a variety of penetration testing or threat modelling tools including open source and commercial mapping

  • Experience of threat reporting and assessing vulnerabilities

  • Some consulting experience is advantageous with a proven ability to understand and meet client needs, build relationships and develop a positive dialogue

  • Adept at explaining technical jargon to non-technical parties

  • Scripting skills and reverse engineering experience is desirable

  • Past experience of using problem solving techniques and developing solutions to meet vulnerability threats