Capgemini Cyber Security Risk Management Analyst (GRCP) in Irving, Texas

Threat Assessment Domain - Job Description

Capgemini Cybersecurity Services :

Capgemini’s Cybersecurity Consulting and Projects Practice Unit provides consulting and projects in all areas of infrastructure including cloud-based services, networks, servers, storage, information security, service management and governance. Activities range from high level consulting, strategy and business case to architecture design and implementation to at times; internal security/compliance projects.

The Cybersecurity Team is a team of Security Consultants qualified and equipped to tackle our customers’ most challenging security-related concerns. Our vision is: “to become the reference point throughout the Capgemini Group for the provision of security and risk management services”. We believe that developing, resourcing and selling a comprehensive suite of Cybersecurity Transformation and Enablement Services is key to realizing our vision. We are reshaping our security expertise and capabilities to become a leading provider of these services. We aim to offer simple solutions to complex problems and in so doing engage our customers with high-value Cybersecurity propositions, that help our customers embrace transformational technologies knowingly and with confidence.

The Threat Assessment role involves supporting our clients during engagements throughout all stages of the assessment lifecycle. You will be expected to conduct Security assessments both on your own and in support of the wider team on ongoing projects, bringing together various sources of data, applying analysis techniques and provides advisory to help our clients improve their Information Security posture to respond to the rapidly evolving Cyber Security threats.

Responsibilities:

  • Managing and delivering security testing assignments.

  • Performing a variety of security testing assignments, including infrastructure, applications and mobile apps.

  • Conduct threat hunting operations using indicators of attack and intelligence about adversary tactics, techniques and procedures (TTPs) to detect attacks and suspicious activity.

  • Conduct open source research using a range of tools and techniques to identify online threats to clients and vulnerabilities in their infrastructure.

  • Analyze various file types, including conducting dynamic and static analysis of malware artefacts, binaries and other suspicious files.

  • Perform source code reviews, threat analysis, wireless network assessments and social engineering assessment.

  • Defining the scope for security testing assignments and managing complex multi-faceted security testing assignments.

  • Providing thought leadership and direction for the Information Security practice on malware, attack vectors and methods to protect against threats.

  • Working with clients to develop appropriate remediation plans.

Supporting member of staff in the sale/ presale of security testing assignments

Qualification

Minimum 4-7 years plus experience in the following areas:

  • Experience in vulnerability assessments and penetration testing using manual testing techniques, scripts, commercial tools and open source tools (ex: Kali Linux, BackTrack 4/5, SET Toolkit, War Dialing, SQL Injection, Web Application Testing, Onapsis, Metasploit, Wireless tools, Nessus, Qualys etc)

  • Experience in vulnerability assessments and penetration testing for web application using various manual testing, scripts and commercial tools (ex: App Scan, Nikto, Burpsuite, Acunetix, Qualys, etc)

  • Conducting secure coding practices, software-based vulnerabilities and mitigation strategies, as well as application security testing techniques, methodologies and code analysis tools (Veracode, App scan, Fortify)

  • Track threat actors and associated tactics, techniques, and procedures (TTPs) by capturing intelligence on threat actor TTPs and developing countermeasures in response to threat actors.

  • Provide forensic analysis of network packet captures, DNS, proxy, Netflow, malware, host-based security and application logs and honeypots

  • Network reconnaissance and open source intelligence (OSINT) gathering

  • Strong knowledge of operating systems e.g. Microsoft, Linux, iOS, Android etc.

  • Strong knowledge of web development and programming languages e.g. Java, .NET, Python, etc.

  • Strong knowledge of web application technology, e.g. Application Servers, Web Servers, Databases

  • Strong knowledge of Web Application vulnerability exploitation, including but not limited to the OWASP

  • Strong knowledge of security related standards/ threat identification and evaluation techniques (e.g. NIST 800-30, Microsoft STRIDE/DREAD)

  • Must be willing to travel up to 60-70%

Desired Certification:

  • OSCP, OSCE, GPEN, GWAPT, CEH, LPT, etc

Academic:

Bachelor’s and/or Master’s degree in information technology related field

Location : Anywhere in the USA with travel expectations.

Please note we are not hiring any candidates that require H1B or work visa assistance or permits.

Job: Infrastructure

Organization: INFRA US PNC

Title: Cyber Security Risk Management Analyst (GRCP)

Location: TX-Irving

Requisition ID: 036084

Other Locations: US-SC-Columbia, US-Maryland, US-Arizona, US-Washington, US-GA-Atlanta, US-NY-New York, US-IL-Chicago