Enable job alerts via email!

Network Security Engineer

GMI Tech (ZA)

City of Johannesburg Metropolitan Municipality

On-site

ZAR 400,000 - 800,000

Full time

23 days ago

Boost your interview chances

Create a job specific, tailored resume for higher success rate.

Job summary

A leading company in South Africa seeks a skilled Penetration Tester to lead testing initiatives on web and mobile applications. The role involves simulating attacks to identify vulnerabilities, preparing detailed reports, and recommending solutions to enhance security. Ideal candidates will have significant experience in IT and ethical hacking, combined with strong communication skills and a desire to improve application security.

Qualifications

  • 3+ years of IT experience and 1+ year in web application penetration testing.
  • Ability to produce high level reports and communicate threats clearly.
  • Valid Certified Ethical Hacker Certificate preferred.

Responsibilities

  • Lead testing efforts on web and mobile applications.
  • Replicate techniques used by malicious attackers to model threats.
  • Prepare reports and present findings to stakeholders.

Skills

Manual testing experience including OWASP
Application security mechanisms knowledge
Recognizing application security vulnerabilities
Use of penetration testing tools
Programming language knowledge (C, C#, Python, etc.)
Web Services technologies
Experience with Java or .NET frameworks
Analytical and problem-solving skills
Interpersonal skills
Communication and presentation skills

Education

Bachelors degree / Diploma or equivalent experience

Tools

nmap
Wireshark
Nessus
NeXpose
Kali
Metasploit
AppScan
WebInspect
Burp Suite Professional
Acunetix
Arachni
w3af
NTOSpider

Job description

Bachelors degree /Diploma or equivalent experience

3+ years of IT experience

1+ years of hands-on web application penetration testing / ethical hacking experience

The Purpose of Your Role

Lead testing efforts on web and mobile applications and supporting systems.

Replicate the actual techniques and tools used by malicious attackers in an effort to model potential external threats.

Upon completion of the assessment, you will prepare reports and present the results to application owners, developers, and business unit information security teams.

Analyse test results, draw conclusions from results, and develop targeted exploit examples.

Consult with operations and software - development teams to ensure potential weaknesses are addressed.

Contribute to the research or development of tools to assist in the vulnerability discovery process.

Identify threats to improve the overall security of applications and infrastructure.

Recommend solutions to help migitate risks and protect entire network i.e. Architect security solution


Skills:

Ability to demonstrate manual testing experience including all of OWASP

Working knowledge of application security mechanisms such as authentication and authorization techniques, data validation, and the proper use of encryption

Technical knowledge of, and the ability to recognize, various types of application security vulnerabilities

Demonstrated experience with common penetration testing and vulnerability assessment tools such as nmap, Wireshark, Nessus, NeXpose, Kali, Metasploit, AppScan, WebInspect, Burp Suite Professional, Acunetix, Arachni, w3af, NTOSpider

Knowledge of a programming or scripting language such a C, C#, Python, Objective C, Java, Javascript, SQL,

Knowledge of Web Services technologies such as XML, JSON, SOAP, REST, and AJAX

Knowledge of web frameworks, including XML, SOAP, J2EE, JSON and Ajax

Experience with Enterprise Java or .NET web application frameworks, including Struts and Spring

Proven analytical and problem solving skills, as well as the desire to assist others in solving issues

Excellent interpersonal skills with a strong interest in the application security domain

Excellent communication and presentation skills and a proven ability to communicate threats and facilitate progress towards long-term remediation

Highly motivated with the willingness to take ownership / responsibility for their work and the ability to work alone or as part of a team.

Ability to produce high level reports

Preferred Skills and competencies:
A+, N+, S+, CCNA
Vulnerability Scanning

Vulnerability Assessment

Valid Certified Ethical Hacker Certificate

Certified Penetration Testing Professional/ OR CISA/CISM/SISSP AND CISSP certification.

Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.