Security Operations Expert

India

Job Role 

Security Specialist in areas of Security Vulnerability Assessment & Penetration Testing. Responsible for periodic assessment and implementation of remediation with the help of node owners.

 

Job Key Tasks & Responsibilities

  • Good written and verbal communication skills, interpersonal and collaborative skills, and the ability to communicate security and risk-related concepts to technical and nontechnical audiences at various hierarchical levels
  • Identify critical flaws in systems that cyber attackers could exploit
  • Conduct vulnerability assessments for networks, applications and operating systems
  • Conduct network security audits and scanning on a predetermined basis
  • Use automated tools (e.g. Nessus, Qualys) to pinpoint vulnerabilities and reduce time-consuming tasks
  • Use manual testing techniques and methods to gain a better understanding of the environment and reduce false negatives
  • Develop, test and modify custom scripts and applications for vulnerability / penetration testing
  • Compile and track vulnerabilities over time for metrics purposes
  • Write and present a comprehensive Vulnerability Assessment and maintain a database
  • Ability to exploit the vulnerabilities reported
  • Expertise in Network Penetration testing
  • Sound knowledge in PTES
  • Hands on experience on the Open-source tools such as Metasploit, Kali Linux PT tools and etc.

 
 

Soft Skills 

  • Proactive, Problem solving, Analytical reasoning approach with VM  and PT background
  • Ability to work in high intense customer facing environment and drive results.
  • Collaborative skills for working in cross functional matrix environment
  • Expert on MS-Excel, Power point, MS projects and MS Word

Experience & Certification:

Min 6 to 8 years I of relevant experience in Telecom /IT  Security   in a large Enterprise /telecom Operator Environment. Professional security management certification is desirable CEH, OSCP

Come create the technology that helps the world act together

Nokia is committed to innovation and technology leadership across mobile, fixed and cloud networks. Your career here will have a positive impact on people’s lives and will help us build the capabilities needed for a more productive, sustainable, and inclusive world.
We challenge ourselves to create an inclusive way of working where we are open to new ideas, empowered to take risks and fearless to bring our authentic selves to work

What we offer
 
Nokia offers continuous learning opportunities, well-being programs to support you mentally and physically, opportunities to join and get supported by employee resource groups, mentoring programs and highly diverse teams with an inclusive culture where people thrive and are empowered.

Nokia is committed to inclusion and is an equal opportunity employer

Nokia has received the following recognitions for its commitment to inclusion & equality:

  • One of the World’s Most Ethical Companies by Ethisphere
  • Gender-Equality Index by Bloomberg
  • Workplace Pride Global Benchmark

At Nokia, we act inclusively and respect the uniqueness of people. Nokia’s employment decisions are made regardless of race, color, national or ethnic origin, religion, gender, sexual orientation, gender identity or expression, age, marital status, disability, protected veteran status or other characteristics protected by law.
We are committed to a culture of inclusion built upon our core value of respect.

Join us and be part of a company where you will feel included and empowered to succeed.
Apply now Apply later
  • Share this job via
  • or

* Salary range is an estimate based on our InfoSec / Cybersecurity Salary Index 💰

Job stats:  2  0  0

Tags: Audits CEH Cloud Exploit Kali Linux Metasploit Nessus Network security OSCP Pentesting Qualys Vulnerabilities

Region: Asia/Pacific
Country: India

More jobs like this

Explore more InfoSec / Cybersecurity career opportunities

Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.