Key Responsibilities:
• Looking for candidates with GRC skills and a junior-level penetration testing background.
• Conduct end-to-end Vulnerability Assessment and Penetration Testing (VAPT) across mobile apps (iOS/Android), cloud environments (AWS/Azure/GCP), networks, and applications for SME to enterprise clients.
• Support Governance, Risk, and Compliance (GRC) activities, including assisting with risk assessments, policy reviews, and compliance documentation.
• Perform mobile security testing including static/dynamic analysis (MobSF, Frida), reverse engineering, and assessment of anti-tampering controls.
• Conduct host configuration reviews against CIS Benchmarks/NIST standards, identifying misconfigurations (weak permissions, default creds) and providing hardening recommendations.
• Perform thorough source code reviews (SAST/manual analysis) for vulnerabilities (SQLi, XSS, logic flaws) in Java/Python/.NET/Node.js applications.
• Provide expert risk prioritization (CVSS, exploitability) and remediation guidance tailored to client environments and business impact.
• Deliver detailed technical reports with proof-of-concepts (PoCs), executive summaries, and actionable mitigation steps.
• Conduct risk assessment on digital solutions and third parties. Identify potential risks and provide options to protect the OT critical infrastructure, ICT Infrastructure, application systems and cloud environment.
• Conduct compliance checks on internal controls to ensure compliance with established policies and applicable regulations.
• Assist in developing policies, standards and guidelines to safeguard digital assets in adherence to business needs, industrial best practices and regulatory requirements.
• Manage security projects and solution implementation activities that address cybersecurity risks.
• Plan, design and conduct cyber security incident response workshops and exercises (table-top exercises, simulation, and drills)
• Be aware of latest industry standards, regulatory requirements and the potential impacts to cybersecurity policies, standards and procedures.
• Participate in client briefings to explain findings, address concerns, and align security improvements with business goals