CYBER SECURITY CONSULTANT
As an expert consultant, candidates will design and implement the best security solutions needs.
REQUIREMENTS
- Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field.
- 4-6 years of professional experience
- Candidates must have knowledge and working experience in IDS/IPS, penetration and vulnerability testing
- Candidates must have knowledge and working firewall and intrusion detection/prevention protocols
- Candidates must have skills in sub netting, DNS, encryption technologies and standards, VPNs, VLANs, VoIP and other network routing methods
- Familiar with ISO 27001/27002, ITIL and COBIT frameworks
- Fast learner and able to implement leading edge information technologies
- Able to work as part of team and independently
- Having certification(s) in security consultant will be an advantage
Mandatory Certifications:
- CISSP: Certified Information Systems Security Professional
- OSCP: Offensive Security Certified Professional
CYBER SECURITY AUDITOR
A Security Auditor probes the safety and effectiveness of computer systems and their related security components. As a security auditor, candidates will be conducting a security audit, provide issue a detailed report that outlines the effectiveness of the system, explains any security issues and suggests changes and improvements.
REQUIREMENTS
- Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field.
- 5 years of professional experience
- Candidates must have knowledge of regulatory and industry data security standards (e.g. FFIEC, HIPAA, PCI, NERC, SOX, NIST, EU/Safe Harbor and GLBA)
- Candidates must have knowledge and working experience in firewall and intrusion detection/prevention protocols
- Familiar with ISO 27001/27002, ITIL and COBIT frameworks
- Fast learner and able to implement leading edge information technologies
- Able to work as part of team and independently
- Having certification(s) in security consultant will be an advantage
Mandatory Certifications:
- CISSP: Certified Information Systems Security Professional
- CISA: Certified Information Systems Auditor
CYBER SECURITY SOFTWARE DEVELOPER
As a software security developer, candidates will be developing security software, creating new exploits tools and develop tools for virus/spyware/malware detection, intrusion detection, traffic analysis, etc.
REQUIREMENTS
- Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
- 5 years of professional experience
- Candidates must have knowledge and working experience in Windows, UNIX and Linux operating systems
- Candidates must have skills in programming C, C++, C#, Java, ASM, PHP, Perl, Python
- Familiar with relational databases (e.g. SQL, MySQL, SQLite, etc.)
- Fast learner and able to implement leading edge information technologies
- Able to work as part of team and independently
- Having certification(s) in security consultant will be an advantage
Mandatory Certifications:
- CSSLP: Certified Secure Software Lifecycle Professional
- ECSP: EC-Council Certified Secure Programmer
CYBER SECURITY ANALYST
A Security Analyst detects and prevents cyber threats to an organization. As a security analyst, candidates will work to find out the weaknesses in the infrastructure (software, hardware and networks) and find creative ways to protect it.
REQUIREMENTS
- Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
- 2 – 5 years of professional experience
- Candidates must have knowledge and working experience in IDS/IPS, penetration and vulnerability testing
- Candidates must have skills in TCP/IP, computer networking, routing and switching
- Candidates must have knowledge and working experience in Firewall and intrusion detection/prevention protocols
- Familiar with DLP, anti-virus and anti-malware
- Fast learner and able to implement leading edge information technologies
- Able to work as part of team and independently
- Having certification(s) in security consultant will be an advantage
Mandatory Certifications:
- ECSA: EC-Council Certified Security Analyst
- CEH: Certified Ethical Hacker
PENETRATION TESTER
A Penetration Tester (a.k.a. Ethical Hacker) probes for and exploits security vulnerabilities in applications, networks and systems. As a penetration tester, candidates will conduct legal vulnerability assessment, penetration testing for organization’s and/or customer’s needs.
REQUIREMENTS
- Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
- 2 – 4 years of professional experience
- Candidates must have skills in programming C, C++, C#, Java, ASM, PHP, PERL, Python
- Familiar working with Forensics tools
- Candidates must have knowledge in cryptography principles, various penetration testing method and methodology
- Able to do Vulnerability analysis and reverse engineering
- Fast learner and able to implement leading edge information technologies
- Able to work as part of team and independently
- Having certification(s) in security consultant will be an advantage
Mandatory Certifications:
- OSCP: Offensive Security Certified Professional
- CEH: Certified Ethical Hacker
CYBER FORENSICS EXPERT
A Forensics Expert is a digital detective, harvesting and analyzing evidence from computers, networks and other forms of data storage devices. As a forensics expert, candidates will be work against the bad guys, investigating traces of complex cybercrimes and/or cyber terrorist or a malware attacker.
REQUIREMENTS
- Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
- 1 – 3 years of professional experience
- Candidates must possess Network skills, including TCP/IP-based network communications (much of modern forensics involves reading network traces)
- Able to do backup and archiving technologies
- Familiar with Cryptography principles
- Experience working with eDiscovery tools
- Experience working with forensic software applications
- Data processing skills in electronic disclosure environments
- Evidence handling procedures and ACPO guidelines
- Fast learner and able to implement leading edge information technologies
- Able to work as part of team and independently
- Having certification(s) in security consultant will be an advantage
Mandatory Certifications:
- GCFA: GIAC Certified Forensic Analyst
- GCFE: GIAC Certified Forensic Examiner
- CEH: Certified Ethical Hacker
INCIDENT RESPONDER
An Incident Responder (a.k.a. CSIRT Engineer or Intrusion Analyst) is a cyber firefighter, rapidly addressing security incidents and threats. As an incident responder, candidates will work with forensics tools to find the root cause of a problem, monitoring the SOC and also involve education and prevention.
REQUIREMENTS
- Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
- 2 – 4 years of professional experience
- Candidates must possess Network skills, including TCP/IP-based network communications (much of modern forensics involves reading network traces)
- Able to do backup and archiving technologies
- Familiar with Web-based application security
- Experience working with eDiscovery tools
- Experience working with forensic software applications
- Experience working with Enterprise system monitoring tools and SIEMs
- Fast learner and able to implement leading edge information technologies
- Able to work as part of team and independently
- Having certification(s) in security consultant will be an advantage
Mandatory Certifications:
- CEH: Certified Ethical Hacker
- GCIH: GIAC Certified Incident Handler
CYBER SECURITY ENGINEER
A Security Engineer builds and maintains IT security solutions. As a security engineer, candidates will be developing security for systems/projects and handling any technical problems that arise.
REQUIREMENTS
- Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
- 3 – 5 years of professional experience
- Candidates must possess knowledge in IDS/IPS, penetration and vulnerability testing
- Candidates must possess knowledge in identity and access management principles
- Has the skills in Firewall and intrusion detection/prevention protocols
- Has the skills in application security and encryption technologies
- Familiar with Secure coding practices, ethical hacking and threat modeling
- Familiar with various network routing methods and protocols
- Fast learner and able to implement leading edge information technologies
- Able to work as part of team and independently
- Having certification(s) in security consultant will be an advantage
Mandatory Certifications:
- CEH: Certified Ethical Hacker
- CCNP Security: Cisco Certified Network Professional Security
SOURCE CODE AUDITOR
A Source Code Auditor reviews source code to discover potential security weaknesses, bugs and violations of programming conventions. As a source code auditor, candidates will working to find the weaknesses in a programming project – e.g. finding code that might expose data and system resources to hackers.
REQUIREMENTS
- Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
- 3 – 5 years of professional experience
- Candidates must possess skills in C, C++, C#, Java, ASM, PHP, PERL, Python, etc
- Familiar secure coding guidelines and standards (e.g. MITRE, NIST)
- Experience working with source code analysis tools.
- Fast learner and able to implement leading edge information technologies
- Able to work as part of team and independently
- Having certification(s) in security consultant will be an advantage
Mandatory Certifications:
- GIAC Software Security Certifications
- CSSLP: Certified Secure Software Lifecycle Professional
FRONT END UI/UX DEVELOPER
Job Description:
- Convert PSD or sketch files to HTML & CSS for responsive web
- Excellent skill and understanding on Mobile Web & Responsive Web Design
- Ensuring the technical feasibility of UI/UX designs
- Translation of the UI/UX design wireframes to actual code that will produce visual elements of the application
- work with the UI/UX designer and bridge the gap between graphical design and technical implementation, taking an active role on both sides and defining how the application looks as well as how it works
- Create cascading style sheets (CSS) that are consistent across all browsers and platforms
Requirements:
- Min 3 years experience as Front End UI/UX
- understanding of web markup, including HTML5, CSS3 and Javascript
- Good understanding of advanced JavaScript libraries and frameworks, such as AngularJS, KnockoutJS, BackboneJS, ReactJS, DurandalJS etc
- understanding of client-side scripting and JavaScript frameworks, including jQuery
- understanding of cross-browser compatibility issues and ways to work around them
- Familiar with Illustrator & Photoshop
Bila Anda memenuhi kualifikasi, kirimkan lamaran, CV, dan dokumen pendukung lainnya ke recruitment@qelopak.com