Key Responsibilities:/Key Requirements and Technology Experience:
Should be able to Monitor and configure Web Application Firewall.
Perform ethical hacking against applications.
Should be able to do a vulnerability audit provide suggested remediation.
Leads the development of cost effective information technology solutions by creating new, and modifying existing, software applications.
Analyzes complex systems requirements, existing business processes, and information systems.
Codes, tests, and debugs documents, and implements software applications.
Undertakes complex projects requiring additional specialized technical knowledge.
Coordinates with users to determine requirements that are more complex.Should be a GC,US Citizen only.
Minimum years of experience 5+
Troubleshoot and triage fraudulent activity, Perform ethical hacking against applications
Help identify and recommend secure coding practices, Monitor and configure Web Application Firewall.
Track threats and work with team to develop defense mechanisms, Assist in the vulnerability audit and provide suggested remediation.
Any Graduate