Information/Cyber Security Specialist at PTC
pune, maharashtra, India -
Full Time


Start Date

Immediate

Expiry Date

01 Feb, 26

Salary

0.0

Posted On

03 Nov, 25

Experience

2 year(s) or above

Remote Job

Yes

Telecommute

Yes

Sponsor Visa

No

Skills

Offensive Security, Red Teaming, Penetration Testing, Cloud Defense, Automation, Tool Development, Threat Intelligence, Malware Analysis, Reverse Engineering, Social Engineering, Digital Forensics, Incident Response, Vulnerability Management, Scripting, Exploit Development, Network Security

Industry

Software Development

Description
Our world is transforming, and PTC is leading the way. Our software brings the physical and digital worlds together, enabling companies to improve operations, create better products, and empower people in all aspects of their business. Our people make all the difference in our success. Today, we are a global team of nearly 7,000 and our main objective is to create opportunities for our team members to explore, learn, and grow – all while seeing their ideas come to life and celebrating the differences that make us who we are and the work we do possible. The Cyber Security Consultant (Offensive Security) should have a strong passion for offensive security, with skills in red teaming and penetration testing. The role involves working with a team focused on security monitoring, cloud defense implementation, architecture reviews, pentesting, social engineering campaigns, automation, and tool development. The candidate should have a solid understanding of TTPs (Tactics, Techniques, and Procedures) and an innovative, offensive mindset. The candidate will be part of the Global Information/ Cyber Security Group and will be operating from Pune. This is a critical position where the candidate must provide operational readiness in a high availability environment to tackle any sort of security incidents and ensure business continuity. Job Description Execute long term offensive security engagements and identify security gaps within the infrastructure and services. Perform Recon, Weaponization, Payload Delivery and C&C techniques. Integration, Modification and Automation of Security tools by means of scripting and use of AI. Research the TTPs of various threat actors and create payloads that can emulate those threat actors. Utilizing Threat intelligence to aid red team campaigns. Execute Windows and Unix lateral movement and foothold techniques. Windows AD environment and exploitation techniques. Exploiting Web, Mobile applications. Performing security code reviews. Performing software reverse engineering and malware analysis Train employees on how to avoid falling prey to social engineering tactics and execute social engineering engagements Analyse digital forensics and be a part of incident response during a security incident Review security groups, VPC configurations, etc. to strengthen the cloud infrastructure setup Participate in tabletop exercises as a part of purple teaming initiative Presenting the findings to senior management and executives. Remediate the identified security gaps by writing code, writing rules for IDS system, etc. KEY COMPETENCIES: Sound Technical skills Leadership Quick decision-making capabilities. Good to assist with remediation strategies for the security findings. Persistence and follow through on tasks Demonstrates ability to follow through on multiple tasks or issues. Assumes responsibility and accountability for successfully completing assignments. Identify obstacles and overcome barriers under guidance. Flexible and adaptable to taking on new responsibilities and learning new technology. Team player who possesses excellent interpersonal skills and communication abilities, with a high degree of self-confidence. REQUIRED EXPERIENCE: 3+ years’ experience in offensive security testing. Understanding of OWASP Top 10, MITRE attack Frameworks and Cyber Kill Chain. AV /EDR bypass is a desirable skill. Vulnerability Management. Understanding of coding skills in .Net, C, C++, Java, Web technologies and UI scripts (JS, typescript, web assembly, etc.) 2+ years of scripting skills using Go, Python, Perl, etc. Understanding of AI in offensive security. 1-2 years’ experience of writing / modifying exploit codes. 2-3 years’ experience with commercial and open-source network/web vulnerability scanners. Extensive experience on Red Team Campaigns and Red Team Tools. Extensive experience using tools such Metasploit, C2, DNSCAT2, Caldera, Clockify etc. Familiarity with various network architectures, network services, system types, network devices, development platforms, software suites & tools like Wireshark. Experience in Code review, Malware Analysis, Reverse Engineering. Fundamental understanding of computer networks and WiFi technology. Solid understanding of cloud computing. QUALIFICATIONS: - Master’s/Bachelor’s degree in Computer Science or years of related experience+. OSCP, CRTO, CRTP, PenTest+, PNPT, Red Teams Ops, etc. Life at PTC is about more than working with today’s most cutting-edge technologies to transform the physical world. It’s about showing up as you are and working alongside some of today’s most talented industry leaders to transform the world around you. If you share our passion for problem-solving through innovation, you’ll likely become just as passionate about the PTC experience as we are. Are you ready to explore your next career move with us? We respect the privacy rights of individuals and are committed to handling Personal Information responsibly and in accordance with all applicable privacy and data protection laws. Review our Privacy Policy here." PTC enables global manufacturers to realize double-digit impact with software solutions that enable them to accelerate product and service innovation, improve operational efficiency, and increase workforce productivity. In combination with an extensive partner network, PTC provides customers flexibility in how its technology can be deployed to drive digital transformation – on premises, in the cloud, or via its pure SaaS platform. At PTC, we don’t just imagine a better world, we enable it.
Responsibilities
The role involves executing long-term offensive security engagements to identify security gaps and performing various security techniques including reconnaissance and payload delivery. The candidate will also be responsible for training employees on social engineering tactics and participating in incident response during security incidents.
Loading...