VonConsulting.ro - 10 ani de Recrutare si Oursourcing IT
  • Acasa
  • Despre Noi
  • Serviciiarrow_drop_down
    • Recrutare
    • Outsourcing
    • Personal Temporar
    • Consultanta
  • Oportunitati in Cariera
  • Contact
  • arrow_drop_down
  • ro
  • en
  • de

Senior Security Engineer – Voice Core Infrastructure

ID: Senior voice core security engineer
Full time
Bucharest - or Remote
Senior
07-11-2022
Responsabilități
  • Participates in consulting on projects from information security perspective, coordinate infrastructure testing services (Pen testing services)
  • Analyses and sorts the incidents reported in the managed platforms and escalates according to the internal framework specific to security incidents
  • Monitors and maintains Vulnerability Scanner / Pen Testing platforms managed by the department
  • Perform penetration testing on various applications or infrastructure platforms as part of internal pen testing engagements
  • Documentation, implementation and monitoring of specific policies and processes, from the perspective of information security and resolution of incidents within company according to the area of expertise
  • Create reports and recommendations from your findings, including the security issues uncovered and level of risk

You may also be involved in:

  • Designing the software and hardware requirements of the Voice Core domain in terms of design principles, functional blocks and interfaces.
  • Coordination of cross-functional programs of the Voice Core information system with the objective to create client specific HW & SW design.
Cerințe
  • 3-5 years of experience conducting automated vulnerability scanning assessments to determine the overall effectiveness of the vulnerability state of components, applications
  • 2-3 years of experience using automated vulnerability scanning and penetration assessment tools.
  • Strong knowledge of Windows system components and networks to include Active Directory concepts.
  • Good technical knowledge of telecom and IT domain
  • Knowledge of Interoperability and interfacing of the information systems
  • Bachelor’s degree in Computer Science, Mathematics, Engineering or related fields or relevant years of experience

Nice to have:

  • Experience in Pen Testing, Mobile Pen Testing, Infrastructure Pen Testing, Cloud PenTesting.
  • Experience within current attack methods, manual penetration testing methods, and hacking tools (Nessus, Nmap, Metasploit, Kali Linux, Acunetix) as a starting point for intensive manual security tests and self-developed testing tools.
Aplică cu CV
close
  • Max. file size: 50 MB.
  • Hidden
  • This field is for validation purposes and should be left unchanged.
Aplică cu LinkedIn
  • Joburi Similare
    • Senior Voice Core Engineer
    • Voice Core Engineer
    • Voice Core Delivery Engineer
    • Voice Core Specialist 2nd Line
    • Voice Service Platforms Specialist – German
  • Joburi Recent Adaugate
    • IP Connectivity & Security Engineer
    • Configuration and Change Manager
    • Full Stack Developer
    • Configuration and Change Manager
    • Security Champion – (Project Security Advocate & Coordinator)
  • Articole Recente
    • The Fanciest Job in Software Engineering?… Yet the Most Sought For?
    • Manifesto for Agile Software Development
    • Behind the Scenes of An IT Recruiter’s Life
    • Why Do So Many Talented People Want to Become Software Developers?
    • Combining brains with data and vision seems to be fun
© 2023 - VonConsulting.
  • Termeni si Conditii
  • Confidentialitate
Manage Cookie Preferences
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
Preferences
{title} {title} {title}