Job Summary
We are seeking an experienced Infra. Technology Specialist with 6 to 8 years of experience to join our team. The ideal candidate will have a strong background in Mobile App Reverse Engineering Security Practices - OWASP Top 10 Mobile Security Android and Java. This role is hybrid with day shifts and no travel required. The candidate will play a crucial role in ensuring the security and integrity of our mobile applications.
Responsibilities
Lead the development and implementation of security measures for mobile applications.Oversee the reverse engineering of mobile applications to identify vulnerabilities.Provide expertise in OWASP Top 10 security practices to enhance application security.Conduct regular security assessments and audits of mobile applications.Collaborate with development teams to integrate security best practices into the software development lifecycle.Develop and maintain security documentation and guidelines for mobile applications.Monitor and respond to security incidents and threats related to mobile applications.Ensure compliance with industry standards and regulations for mobile security.Stay updated with the latest trends and advancements in mobile security and reverse engineering.Train and mentor junior team members on mobile security practices.Work closely with cross-functional teams to ensure seamless integration of security measures.Contribute to the continuous improvement of security processes and practices.Provide detailed reports and recommendations based on security assessments and audits.
Qualifications
Possess strong expertise in Mobile App Reverse Engineering.Have in-depth knowledge of Security PracticesOWASP Top 10.Demonstrate proficiency in Mobile Security.Show advanced skills in Android development.Exhibit strong command of Java programming language.Have excellent problem-solving and analytical skills.Possess good communication and collaboration abilities.Show commitment to staying updated with the latest security trends.Have experience in conducting security assessments and audits.Demonstrate ability to develop and maintain security documentation.Exhibit strong attention to detail and accuracy.Show ability to work independently and as part of a team.Have a proactive approach to identifying and mitigating security risks.
Certifications Required
Certified Mobile Application Security Tester (CMAST) Certified Ethical Hacker (CEH)