Image result for TUV India Private Limited

With over 10,000 employees in more than 70 countries of Europe, Asia, America and Africa, the TUV NORD Group is actively committed to its national and international customers. Its broad certification, service and testing/inspection portfolio encompasses both specific individual tests/inspections and also management of complex safety solutions
    Analysis and evaluation of software for weaknesses and faults in source code and binary which can lead to vulnerabilities
    Assessment Includes source /binary/byte code analysis, application vulnerability scanning, binary fault injection, fuzzing, pedigree analysis, malware analysis, data hiding]
    Analysis and evaluation of a system under test (SUT) by performing actual controlled cyber-attacks utilizing external and internal threats. Includes vulnerability scanning, attack throwing, attack automation and reconstruction.
    Mastering of Reverse Engineering principals;
    Assembly language skills
    Debugging methodologies
    Solid knowledge of TCP/IP networking, VPNs, and the applicable security concepts;
    Solid Knowledge of Operating systems and Databases
    Hands on experience with Crypto devices, encryption technology;
    Mastering of a programming language and the ability to conduct security code reviews;
    Vulnerability analysis and fuzzing experience;
    System hardening experience;
    Common Criteria and ISO 15408 experience will be highly regarded
    Analysis and evaluation of wired networks for vulnerabilities which can be exploited to compromise the confidentiality, integrity, and availability of information systems
    Analysis and evaluation of information technology hardware for weaknesses and faults which can be exploited to compromise data or the information system
    Analysis and evaluation of wireless networks for vulnerabilities which can be exploited to compromise the confidentiality, integrity, and availability of information systems
    Analysis and evaluation of the security measures and mechanisms protecting a location containing an information system.
    4+ years experience

Post a Comment

 
Top