Karir

CYBER SECURITY CONSULTANT

As an expert consultant, candidates will design and implement the best security solutions needs.

REQUIREMENTS

  1. Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field.
  2. 4-6 years of professional experience
  3. Candidates must have knowledge and working experience in IDS/IPS, penetration and vulnerability testing
  4. Candidates must have knowledge and working firewall and intrusion detection/prevention protocols
  5. Candidates must have skills in sub netting, DNS, encryption technologies and standards, VPNs, VLANs, VoIP and other network routing methods
  6. Familiar with ISO 27001/27002, ITIL and COBIT frameworks
  7. Fast learner and able to implement leading edge information technologies
  8. Able to work as part of team and independently
  9. Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  1. CISSP: Certified Information Systems Security Professional
  2. OSCP: Offensive Security Certified Professional

 

CYBER SECURITY AUDITOR

A Security Auditor probes the safety and effectiveness of computer systems and their related security components. As a security auditor, candidates will be conducting a security audit, provide issue a detailed report that outlines the effectiveness of the system, explains any security issues and suggests changes and improvements.

REQUIREMENTS

  1. Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field.
  2. 5 years of professional experience
  3. Candidates must have knowledge of regulatory and industry data security standards (e.g. FFIEC, HIPAA, PCI, NERC, SOX, NIST, EU/Safe Harbor and GLBA)
  4. Candidates must have knowledge and working experience in firewall and intrusion detection/prevention protocols
  5. Familiar with ISO 27001/27002, ITIL and COBIT frameworks
  6. Fast learner and able to implement leading edge information technologies
  7. Able to work as part of team and independently
  8. Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  1. CISSP: Certified Information Systems Security Professional
  2. CISA: Certified Information Systems Auditor

 

CYBER SECURITY SOFTWARE DEVELOPER

As a software security developer, candidates will be developing security software, creating new exploits tools and develop tools for virus/spyware/malware detection, intrusion detection, traffic analysis, etc.

REQUIREMENTS

  1. Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  2. 5 years of professional experience
  3. Candidates must have knowledge and working experience in Windows, UNIX and Linux operating systems
  4. Candidates must have skills in programming C, C++, C#, Java, ASM, PHP, Perl, Python
  5. Familiar with relational databases (e.g. SQL, MySQL, SQLite, etc.)
  6. Fast learner and able to implement leading edge information technologies
  7. Able to work as part of team and independently
  8. Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  1. CSSLP: Certified Secure Software Lifecycle Professional
  2. ECSP: EC-Council Certified Secure Programmer

 

CYBER SECURITY ANALYST

A Security Analyst detects and prevents cyber threats to an organization. As a security analyst, candidates will work to find out the weaknesses in the infrastructure (software, hardware and networks) and find creative ways to protect it.

REQUIREMENTS

  1. Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  2. 2 – 5 years of professional experience
  3. Candidates must have knowledge and working experience in IDS/IPS, penetration and vulnerability testing
  4. Candidates must have skills in TCP/IP, computer networking, routing and switching
  5. Candidates must have knowledge and working experience in Firewall and intrusion detection/prevention protocols
  6. Familiar with DLP, anti-virus and anti-malware
  7. Fast learner and able to implement leading edge information technologies
  8. Able to work as part of team and independently
  9. Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  1. ECSA: EC-Council Certified Security Analyst
  2. CEH: Certified Ethical Hacker

 

PENETRATION TESTER

A Penetration Tester (a.k.a. Ethical Hacker) probes for and exploits security vulnerabilities in applications, networks and systems. As a penetration tester, candidates will conduct legal vulnerability assessment, penetration testing for organization’s and/or customer’s needs.

REQUIREMENTS

  1. Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  2. 2 – 4 years of professional experience
  3. Candidates must have skills in programming C, C++, C#, Java, ASM, PHP, PERL, Python
  4. Familiar working with Forensics tools
  5. Candidates must have knowledge in cryptography principles, various penetration testing method and methodology
  6. Able to do Vulnerability analysis and reverse engineering
  7. Fast learner and able to implement leading edge information technologies
  8. Able to work as part of team and independently
  9. Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  1. OSCP: Offensive Security Certified Professional
  2. CEH: Certified Ethical Hacker

 

CYBER FORENSICS EXPERT

A Forensics Expert is a digital detective, harvesting and analyzing evidence from computers, networks and other forms of data storage devices. As a forensics expert, candidates will be work against the bad guys, investigating traces of complex cybercrimes and/or cyber terrorist or a malware attacker.

REQUIREMENTS

  1. Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  2. 1 – 3 years of professional experience
  3. Candidates must possess Network skills, including TCP/IP-based network communications (much of modern forensics involves reading network traces)
  4. Able to do backup and archiving technologies
  5. Familiar with Cryptography principles
  6. Experience working with eDiscovery tools
  7. Experience working with forensic software applications
  8. Data processing skills in electronic disclosure environments
  9. Evidence handling procedures and ACPO guidelines
  10. Fast learner and able to implement leading edge information technologies
  11. Able to work as part of team and independently
  12. Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  1. GCFA: GIAC Certified Forensic Analyst
  2. GCFE: GIAC Certified Forensic Examiner
  3. CEH: Certified Ethical Hacker

 

INCIDENT RESPONDER

An Incident Responder (a.k.a. CSIRT Engineer or Intrusion Analyst) is a cyber firefighter, rapidly addressing security incidents and threats. As an incident responder, candidates will work with forensics tools to find the root cause of a problem, monitoring the SOC and also involve education and prevention.

REQUIREMENTS

  1. Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  2. 2 – 4 years of professional experience
  3. Candidates must possess Network skills, including TCP/IP-based network communications (much of modern forensics involves reading network traces)
  4. Able to do backup and archiving technologies
  5. Familiar with Web-based application security
  6. Experience working with eDiscovery tools
  7. Experience working with forensic software applications
  8. Experience working with Enterprise system monitoring tools and SIEMs
  9. Fast learner and able to implement leading edge information technologies
  10. Able to work as part of team and independently
  11. Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  1. CEH: Certified Ethical Hacker
  2. GCIH: GIAC Certified Incident Handler

 

CYBER SECURITY ENGINEER

A Security Engineer builds and maintains IT security solutions. As a security engineer, candidates will be developing security for systems/projects and handling any technical problems that arise.

REQUIREMENTS

  1. Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  2. 3 – 5 years of professional experience
  3. Candidates must possess knowledge in IDS/IPS, penetration and vulnerability testing
  4. Candidates must possess knowledge in identity and access management principles
  5. Has the skills in Firewall and intrusion detection/prevention protocols
  6. Has the skills in application security and encryption technologies
  7. Familiar with Secure coding practices, ethical hacking and threat modeling
  8. Familiar with various network routing methods and protocols
  9. Fast learner and able to implement leading edge information technologies
  10. Able to work as part of team and independently
  11. Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  1. CEH: Certified Ethical Hacker
  2. CCNP Security: Cisco Certified Network Professional Security

 

SOURCE CODE AUDITOR

A Source Code Auditor reviews source code to discover potential security weaknesses, bugs and violations of programming conventions. As a source code auditor, candidates will working to find the weaknesses in a programming project – e.g. finding code that might expose data and system resources to hackers.

REQUIREMENTS

  1. Bachelor’s degree and/or a master’s degree in Computer Science, Cyber Security or related field
  2. 3 – 5 years of professional experience
  3. Candidates must possess skills in C, C++, C#, Java, ASM, PHP, PERL, Python, etc
  4. Familiar secure coding guidelines and standards (e.g. MITRE, NIST)
  5. Experience working with source code analysis tools.
  6. Fast learner and able to implement leading edge information technologies
  7. Able to work as part of team and independently
  8. Having certification(s) in security consultant will be an advantage

Mandatory Certifications:

  1. GIAC Software Security Certifications
  2. CSSLP: Certified Secure Software Lifecycle Professional

 

FRONT END UI/UX DEVELOPER

Job Description:

  1. Convert PSD or sketch files to HTML & CSS for responsive web
  2. Excellent skill and understanding on Mobile Web & Responsive Web Design
  3. Ensuring the technical feasibility of UI/UX designs
  4. Translation of the UI/UX design wireframes to actual code that will produce visual elements of the application
  5. work with the UI/UX designer and bridge the gap between graphical design and technical implementation, taking an active role on both sides and defining how the application looks as well as how it works
  6. Create cascading style sheets (CSS) that are consistent across all browsers and platforms

Requirements:

  1. Min 3 years experience as Front End UI/UX
  2. understanding of web markup, including HTML5, CSS3 and Javascript
  3. Good understanding of  advanced JavaScript libraries and frameworks, such as AngularJS, KnockoutJS, BackboneJS, ReactJS, DurandalJS etc
  4. understanding of client-side scripting and JavaScript frameworks, including jQuery
  5. understanding of cross-browser compatibility issues and ways to work around them
  6. Familiar with Illustrator & Photoshop

 

Bila Anda memenuhi kualifikasi, kirimkan lamaran, CV, dan dokumen pendukung lainnya ke recruitment@qelopak.com

Web and Network Development & Maintenance. Hosting, VPS and Domain - Bogor, Indonesia

Qelopak Teknologi Indonesia is your web solution, web maintenance, Network Development, and network development, training center. We also provide server, vps and domain for your website. http://www.qelopak.com/data/img/logo.png Qelopak Teknologi | Web and Network Development & Maintenance. Hosting, VPS and Domain - Bogor, Indonesia
Jl Purnawarman No 11, Ciampea Bogor, Jawa Barat Indonesia
Phone: (0251) 8474192 Email: hello@qelopak.com
Sandi Winata winatasandi05@gmail.com Indonesia
2017-02-05
logo