VAPT - Consultant - Pune

  • Pune
  • Kpmg India
About KPMG in India KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Jaipur, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada. KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment.Cyber security assessmentsRed TeamingSecurity architecture designInfrastructure and application security assessmentsVulnerability assessment and penetration testing Security reviews of traditional IT and non-IT network environments including Telecom and OT networksICS SecurityIOT SecurityAPI Security TestingEqual employment opportunity information KPMG India has a policy of providing equal opportunity for all applicants and employees regardless of their color, caste, religion, age, sex/gender, national origin, citizenship, sexual orientation, gender identity or expression, disability or other legally protected status. KPMG India values diversity and we request you to submit the details below to support us in our endeavor for diversity. Providing the below information is voluntary and refusal to submit such information will not be prejudicial to youStrong understanding of IT security standards and frameworks (OWASP, NIST, CIS)Strong understanding of security risks in networks and application platformsStrong understanding of network security, infrastructure security and application securityStrong understanding of OSI, TCP/IP model and network basicsDemonstrate technical penetration testing skills on IT infrastructure, web applications, mobile platforms and Red teamingStrong technical skills: Information security, network security, Windows security, UNIX/Linux security, web and mobile application security, Cloud platformsBroad knowledge of security technologies for applications, databases, networks, servers, and desktops Solid technical skills in both information security architecture and penetration testing and ability to assess testing tools and deploy the right ones.Scripting and programming experience is beneficialAbility to perform manual penetration testingExperience in Application Security Testing (Web, Mobile & ERP [SAP]), or related functions Vulnerability Assessment, Penetration testingPerform penetration testing of various thick client software, web applications, and communications infrastructure to assist in hardening the cybersecurity posture against malicious actorsConduct security research on the latest emerging advanced persistent threats (APTs), malware, and other security developments to assist in enterprise security efforts. Apply this security research into assessments.Perform technical writing to communicate the preparation, testing, and recommendation phases for various security tests. Work with stakeholders to remediate system vulnerabilities.Train team members and colleagues on the latest cybersecurity tactics, techniques, and procedures (TTPs) to grow the skill of the firmUnderstanding of various security technologies including end point security, perimeter security, advanced threat protection, malware defense and security managementExpertise in the phases of penetration testing. Familiarity with Kali Linux distribution and the associated penetration testing tools suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag exercises considered a plus.Good Understanding of OWASP top 10 and mitigation techniquesExperience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, Security Misconfiguration, CSRF, authentication/ authorization issuesDatabase testing: MySQL, Oracle, NoSQL Understanding of cyber security management, cyber analytics, security intelligence platforms and threat intelligence frameworksWriting business proposals and response to client RFP/ RFIsIdentifying business opportunities and lead delivery and program management for large cyber security programsDelivery team and client relationship managementExperience on both commercial, open source tools and frameworks but not limited: Burpsuite, Metasploit, Core-Impact, Kali-Linux, AppScan, WebInspect, SSLScan, Soap UI Pro, SonarQube, Qualys, Nikto, Nessus, nmap, sqlmap, OWASP ZAP