Jobs

Penetration tester / Ethical hacker

Mumbai/ Bangalore/ Noida/ AhmedabadMumbaiMaharashtraIndiaAsiaBangaloreKarnatakaIndiaAsiaNoidaUttar PradeshIndiaAsiaAhmedabadGujaratIndiaAsiaMay 5, 2024

Fynd is India's largest omnichannel commerce platform helping retail businesses accelerate growth. Founded by Farooq Adam, Harsh Shah, and Sreeraman MG in 2012.The company is headquartered in Mumbai and currently employs 350+ spread across design, engineering, data science, operations and sales. Trusted by over 600 brands and 10,000 stores.We are looking for penetration tester/ pen tester/ ethical hacker, wherein you will perform authorised tests on computer systems in order to expose weaknesses in their security that could be exploited by criminals. You can choose to specialise in manipulating a particular type of system, such as:* networks and infrastructures* Windows, Linux and Mac operating systems* embedded computer systems* web/mobile applications* SCADA (supervisory control and data acquisition) control systems* Internet of Things (IoTs).As well as identifying problems, you may also provide advice on how to minimise risks.You may work in-house for large companies where system security is a crucial function. However, more commonly you'll work for a security consultancy or risk management organisation, where you'll work with external clients testing the vulnerability of their systems.

Roles and Responsibilties

  • As a penetration tester, you'll understand complex computer systems and technical cyber security terms. You'll need to:
  • work with clients to determine their requirements from the test, for example the number and type of systems they would like testing
  • plan and create penetration methods, scripts and tests
  • carry out remote testing of a client's network or onsite testing of their infrastructure to expose weaknesses in security
  • simulate security breaches to test a system's relative security
  • create reports and recommendations from your findings, including the security issues uncovered and level of risk
  • advise on methods to fix or lower security risks to systems
  • present your findings, risks and conclusions to management and other relevant parties
  • consider the impact your 'attack' will have on the business and its users
  • understand how the flaws that you identify could affect a business, or business function, if they're not fixed.

What do we offer?

Cyber Security Jobs by Category

Cyber Security Jobs by Location

Cyber Security Salaries