- 5+ years of Information Security background is essential.
- Experience in evaluating the control environment through Ethical Hacking, Penetration Testing, Red Team assessments.
- Evaluation of security technologies to detect vulnerabilities
- A high level appreciation of Security Architecture and Infrastructure
- Should be familiar with the best practices of OWASP, SANS Institute, ISACA, GAO, FISCAM, NSA, NIST, Internet Engineering Task Force (IETF)
- Develop a framework to test compliance of applications / systems.
- Experience in project management