Dieses Jobangebot ist archiviert und steht nicht mehr zur Verfügung.
Vakante Jobangebote finden Sie unter Projekte.

Security Consultant - Brussels, Belgium - English Speaking

Eingestellt von Octopus Computer Associates

Gesuchte Skills: Network, Consultant, Sql, Toolkit

Projektbeschreibung

SECURITY CONSULTANT - BRUSSELS, BELGIUM - ENGLISH SPEAKING

(SECURITY, PKI, ETHICAL HACKING, TEST, TESTING, PENETRATION TESTING)

One of our Blue Chip Clients is urgently looking for a Security Consultant.

PLEASE FIND SOME DETAILS BELOW:

Endpoint security

- OS Hardening (GPO's)
- HIDS/HIPS
- Antimalware protection
- Define Security baselines and check compliance Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- System Hacking with Kali Linux
- Sniffing
- Social Engineering
- Denial of Service attacks
- Session Hijacking
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- Evading IDS, Firewalls and Honeypots
- Cryptography

Penetration Testing

- Security Analysis and Penetration Testing
- TCP IP Packet Analysis
- Information Gathering
- Vulnerability Analysis
- External Network Penetration Testing
- Internal Network Penetration Testing
- Firewall Penetration Testing
- IDS Penetration Testing
- Web Application Penetration Testing
- SQL Penetration Testing
- Database Penetration Testing
- Wireless Network Penetration Testing
- Denial-of-Service Penetration Testing
- Password Cracking Penetration Testing
- Virus and Trojan Detection
- File Integrity Checking
- Information System Incident Handling and Response Threat Management
- apply environmental reconnaissance techniques using appropriate tools and processes.
- analyse the results of a network reconnaissance.
- implement or recommend the appropriate response and countermeasure on a network-based threat
- secure a corporate environment.

Vulnerability Management

- implement an information security vulnerability management process.
- analyse the output resulting from a vulnerability scan.
- Compare and contrast common vulnerabilities found in the targets Cyber Incident Response
- distinguish threat data or behaviour to determine the impact of an incident
- prepare a toolkit and use appropriate forensics tools during an investigation.
- organize communication during the incident response process.
- analyse common symptoms to select the best course of action to support incident response.
- Summarise the incident recovery and post-incident response process.

Security Operations

- Investigative techniques (eg, root-cause analysis, incident handling)
- Digital forensics (eg, media, network, software, and Embedded devices)
- Intrusion detection and prevention
- Incident Management

o Detection/Recovery/Response/Remediation/Mitigation/Lessons learned/Reporting

- Operate and maintain preventative measures o Firewalls o Intrusion detection and prevention systems o Whitelisting/Blacklisting o Anti-malware
- Implement and support patch and vulnerability management
- Participate in and understand change management processes (eg, versioning, baselining, security impact analysis) Security Assessment and Testing
- Disaster recovery and business continuity
- Implement recovery strategies

o Backup storage strategies (eg, offsite storage, electronic vaulting, tape rotation) o Recovery site strategies o Multiple processing sites (eg, operationally redundant systems o System resilience, high availability, quality of service, and fault tolerance

- Implement disaster recovery processes Privileged Access Management (PAM)
- Grant privileges to users only for systems on which they are authorized.
- Grant access only when it's needed and revoke access when the need expires.
- Avoid the need for privileged users to have or need local/direct system passwords.
- Centrally and quickly manage access over a disparate set of heterogeneous systems.
- Create an unalterable audit trail for any privileged operation.

Public Key Infrastructure Management (PKI)

- Securely store CA's private key
- Issue digital certificates for users, applications and devices
- Leverage certificate authentication to verify the identity of a device or user
- Publish certificate revocation lists (CRLs) to verify a user or application's certificate is still trusted by the issuing CA
- Maintain an auditable database of users' private key histories for recovery purposes

Please send CV for full details and immediate interviews. We are a preferred supplier to the client.

Projektdetails

  • Einsatzort:

    Brussel, Belgien

  • Projektbeginn:

    asap

  • Projektdauer:

    12 months+

  • Vertragsart:

    Contract

  • Berufserfahrung:

    Keine Angabe

Geforderte Qualifikationen

Octopus Computer Associates