Applications are invited (only online) for the Group B (Level 6) Technical & Non-Technical positions to be filled by way of Direct Recruitment.
1. Post Name: Technical Assistant
2. No. of Post: 01
3. Starting Basic Pay (Rs.): Rs.35,400/-
4. Desired Experience: Working experience in Embedded System, IoT
5. Job Profile: Design, Development, Testing Debugging of Embedded System, IoT based Products
6. Desired skill set: Embedded System, Analog/Digital Electronics, Micro-Controller / Processor/ FPGA Programming, Python Programming
7. Desired Experience: Excellent working experience in J2EE Technologies. Experience in scripting CSS, JS, etc. Good knowledge of database like PostgreSQL, MySQL, etc. Hands-on experience in using Python and related libraries. Good knowledge on Agile project management techniques. Excellent verbal and written communication skills
8. Job Profile: Carry out the development / customization of applications. Addition / Customization of database layer of the application. Architectural changes of the applications, as per requirements. Co-ordination with client for day-to-day project development tasks, as per plan
9. Desired skill set: Languages Java / J2EE, Application Framework: Spring MVC, Springboot, JPA, Hibernate, Web Technologies: CSS3, HTML5, jQuery, JSP, JavaScript, Bootstrap, AJAX, Communication frameworks: RESTful Webservices, Databases: MySql, Postgres, PL/SQL, Build: MAVEN, Integration: SVN, GitLab
10. Desired Experience: Web and Software Application Security and Audit
11. Job Profile:
a. Ability of formulate policies, procedures and processes in Information Security domain. Ability to analyze black box, grey box and white box vulnerability assessment and penetration testing exercises of web applications, network, mobile applications and recommended mitigation. Perform vulnerability and penetration testing. Compliance testing for various Cyber Security standards towards implementation of security policies and controls. Implementing and mainlining security controls by adopting International best practices
b. Internet traffic monitoring, IP, Domain Name, user profiles tracking using Open Source Intelligence. Carry out proactive security testing as a routine activity based on the defined policies and control structures. Conduct and ensure periodic infrastructure audits (network, servers and systems) and investigation of any cyber violations. Analysis and assess the vulnerabilities in the infrastructure (software, hardware, networks) and devise the possible counter measures.
c. To be part of the Blue team and red team cyber security drills. Ensure cyber security practices and Secure SLDC for all in-house and outsourced applications development. Implement system security engineering across the program acquisition life cycle performing and analyzing assessment activities.
12. Desired skill set: Application Security Audit. Experience in performing penetration testing, secure code review, static, dynamic and manual source code review. Advanced knowledge on Windows and Linux operating systems based applications Strong knowledge of system vulnerabilities and security issues. Experience with scripting, monitoring tools and automation tools. Familiar with backup and recovery software and methodologies. Experience in vulnerability assessment and penetration testing of web applications, operating systems, Mobiles apps & Database.