Cloud Application Tester

Overview

Remote
Depends on Experience
Contract - W2
Contract - 12 Month(s)

Skills

cloud-based vulnerability
appropriate risk
quality
effectiveness
IAM
infrastructure
networking
automation
authentication
Azure
AWS
HTTP
HTML
CSS
Forms
Database Connectivity
PCI DSS
SOX
HIPAA
OWASP Top 10
analyze network traffic
access control
encryption and cryptography
security architecture
design
business continuity
disaster recovery

Job Details

Location: Spring, TX but the candidate must be local to Houston, TX

seeking a Cyber Security Cloud Tester, to serve as a member of a Vulnerability Testing Team.
key roles and responsibilities:
Independently execute manual cloud-based vulnerability assessments by analyzing systems to determine the presence of vulnerabilities
Report findings into tracking system with appropriate risk, quality, and effectiveness
Interact with customers remediation and validation questions

Skills
Possess expert technical understanding of cloud environment including IAM, infrastructure, networking, automation, authentication, and security policies.
Preferably in Azure and/or AWS
Be familiar with various security assessment tools, and techniques to level of knowing what they do and how they operate.
Min 2 years' experience penetration/vulnerability testing of cloud systems in an enterprise environment
Strong understanding of web technologies, e.g. HTTP, HTML, CSS, Forms, Database Connectivity, etc.
Understanding of compliance and regulatory requirements such as PCI DSS, SOX, HIPAA, etc.
Full grasp and ability to articulate and/or train others on the OWASP Top 10 and related concepts
Ability to perform manual web application vulnerability assessments without the use of automated tools such as web application scanners
Ability to capture and analyze network traffic, including ability to discern whether said network traffic contains vulnerabilities and/or sensitive data
Have a solid grasp of core security fundamentals and concepts, including knowing one s system, defense in depth, the principle of least privilege, access control, encryption and cryptography, security architecture and design, business continuity and disaster recovery, etc.

Employers have access to artificial intelligence language tools (“AI”) that help generate and enhance job descriptions and AI may have been used to create this description. The position description has been reviewed for accuracy and Dice believes it to correctly reflect the job opportunity.