Consultant, Cyber Adversarial Emulation

Kallang, Singapore

Job Description

b'



Ensign is hiring !
Duties and Responsibilities
  • Enjoy breaking legacy and modern applications and exploiting security misconfigurations and vulnerabilities ethically by joining us as a Pentester. Your role involves learning new and existing technologies like Mobile, Mainframe and IoT, and conducting security assessments to sieve out security issues that are hard to find, then transforming the security issues into actionable reports that could be understood and remediated by the clients.
  • Outside of wearing the Blackhat, you should be capable of communicating and advising the customer in layman as well as technical terms. You will get first-hand experience in understanding and executing the entire pentesting project from end-to-end.

Requirements
  • Familiar with cyber security principles, policies, and industry best practices
  • Experienced in consulting, including internal and client facing experiences.
  • Ability to lead a project and communicate with clients
  • Familiar with programming/scripting languages such as .NET, Python, Bash and PowerShell
  • Possess relevant cybersecurity certifications or accredited experience from CTF and Bug Bounties
  • Ability to travel overseas when required

Preferred Qualifications/Skills
  • 3 to 5 years\xe2\x80\x99 experience with Burp Suite, Frida, dex2jar and the likes
  • Cyber Security Certifications (e.g. OSCP, CREST preferred)
  • Mobile Application Development/Security Testing
  • Static and Dynamic Analysis
  • A creative team player, who seeks experience and knowledge

Beware of fraud agents! do not pay money to get a job

MNCJobz.com will not be responsible for any payment made to a third-party. All Terms of Use are applicable.


Job Detail

  • Job Id
    JD1304389
  • Industry
    Not mentioned
  • Total Positions
    1
  • Job Type:
    Full Time
  • Salary:
    Not mentioned
  • Employment Status
    Permanent
  • Job Location
    Kallang, Singapore
  • Education
    Not mentioned