vulnerability assessment and penetration testing lead EngineerTrends Group, Inc.
Workplace: MetroManila, Manila, Makati
Salary: Agreement
Work form: Full time
Posting Date: 07/11/2025
Deadline: 27/11/2022
Duties and Responsibilities
Lead, manage and train the Vulnerability Assessment and Penetration Testing team
Prepare audit reports that identify technical and procedural findings and provide recommended remediation strategies/solutions.
Perform technical (evaluation of technology) and non-technical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).
Conduct and/or support authorized penetration testing on enterprise network assets.
Conduct required reviews as appropriate within environment.
Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes).
Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
Analyze the organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.
Minimum Education
College Graduate or Diploma holder of any computer-related course.
Preferably a degree in Information Technology, Engineering, or a related field.
Minimum Experience/Training
5 years experience working in Vulnerability Assessment and Penetration Testing, Red Teaming
Knowledge of ITIL, Infrastructure related technologies & understanding of business relevance of the technologies
Experience working with IT systems and software such as Tenable IO, Nessus, Kali, Parrot, etc.
Competency
Excellent managerial skills and ability to collaborate with team members.
Ability to analyze a high volume of technical data and work in a fast-paced environment.
Strong problem-solving, analytical, and time management skills.
Positive, energetic, enthusiastic attitude
Strong attention to detail
Excellent at multi-tasking & task prioritization
Self-motivated, proactive, and customer-centric attitude
Quick learner and willing to adapt to a dynamic working environment
Knowledge of cybersecurity and privacy principles.
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of cyber threats and vulnerabilities.
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
Knowledge of application vulnerabilities.
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return oriented attacks, malicious code).
Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities.
Knowledge of penetration testing principles, tools, and techniques.
Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
Skill in the use of penetration testing tools and techniques.
Skill in using network analysis tools to identify vulnerabilities. (e.g.,fuzzing, nmap, etc.).
Skill in conducting application vulnerability assessments.
Knowledge of data backup and recovery.
Knowledge of data backup and restoration concepts.
Knowledge of programming language structures and logic.
Knowledge of interpreted and compiled computer languages.
Ability to apply programming language structures (e.g., source code review) and logic.
Paid Bereavement/Family Leave
Medical / Health Insurance
Maternity & Paternity Leave
Life Insurance
Associate / Supervisor IT and Software Information Technology / IT 2 openings Bachelor's degree graduate
The milestones achieved by our first company, Trends, is a testament to how impactful and well-received our humble beginnings have been. Now, we have multiple subsidiaries that operate independently of each other, with distinct business objectives and operational structure. When we are blessed with success, it is our duty to walk in wisdom and plan our course for making the best of it. Empowered by a strong vision, we are now ready to put in the work that comes with positioning our conglomerate to enter the world's biggest economies. From generating growth in the ICT industry, we are now pursuing to nurture leading and global businesses. The time has come to explore the possibilities in ICT and beyond.Equipped with a vision and the right values, we are expanding and reaching new heights as a powerful, nurturing, and timeless conglomerate. We are moving towards a more promising future to cultivate opportunities and provide a customer experience like no other. Trends Group Inc. promises to give our partners the satisfaction they deserve and elevate itself to create and grow leading and global businesses.
Kalibrr
Lead, manage and train the Vulnerability Assessment and Penetration Testing team
Prepare audit reports that identify technical and procedural findings and provide recommended remediation strategies/solutions.
Perform technical (evaluation of technology) and non-technical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications).
Conduct and/or support authorized penetration testing on enterprise network assets.
Conduct required reviews as appropriate within environment.
Make recommendations regarding the selection of cost-effective security controls to mitigate risk (e.g., protection of information, systems and processes).
Maintain knowledge of applicable cyber defense policies, regulations, and compliance documents specifically related to cyber defense auditing.
Maintain deployable cyber defense audit toolkit (e.g., specialized cyber defense software and hardware) to support cyber defense audit missions.
Analyze the organization's cyber defense policies and configurations and evaluate compliance with regulations and organizational directives.
Minimum Education
College Graduate or Diploma holder of any computer-related course.
Preferably a degree in Information Technology, Engineering, or a related field.
Minimum Experience/Training
5 years experience working in Vulnerability Assessment and Penetration Testing, Red Teaming
Knowledge of ITIL, Infrastructure related technologies & understanding of business relevance of the technologies
Experience working with IT systems and software such as Tenable IO, Nessus, Kali, Parrot, etc.
Competency
Excellent managerial skills and ability to collaborate with team members.
Ability to analyze a high volume of technical data and work in a fast-paced environment.
Strong problem-solving, analytical, and time management skills.
Positive, energetic, enthusiastic attitude
Strong attention to detail
Excellent at multi-tasking & task prioritization
Self-motivated, proactive, and customer-centric attitude
Quick learner and willing to adapt to a dynamic working environment
Knowledge of cybersecurity and privacy principles.
Knowledge of computer networking concepts and protocols, and network security methodologies.
Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy.
Knowledge of risk management processes (e.g., methods for assessing and mitigating risk).
Knowledge of cyber threats and vulnerabilities.
Knowledge of specific operational impacts of cybersecurity lapses.
Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth).
Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]).
Knowledge of application vulnerabilities.
Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return oriented attacks, malicious code).
Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities.
Knowledge of penetration testing principles, tools, and techniques.
Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems.
Skill in the use of penetration testing tools and techniques.
Skill in using network analysis tools to identify vulnerabilities. (e.g.,fuzzing, nmap, etc.).
Skill in conducting application vulnerability assessments.
Knowledge of data backup and recovery.
Knowledge of data backup and restoration concepts.
Knowledge of programming language structures and logic.
Knowledge of interpreted and compiled computer languages.
Ability to apply programming language structures (e.g., source code review) and logic.
Paid Bereavement/Family Leave
Medical / Health Insurance
Maternity & Paternity Leave
Life Insurance
Associate / Supervisor IT and Software Information Technology / IT 2 openings Bachelor's degree graduate
The milestones achieved by our first company, Trends, is a testament to how impactful and well-received our humble beginnings have been. Now, we have multiple subsidiaries that operate independently of each other, with distinct business objectives and operational structure. When we are blessed with success, it is our duty to walk in wisdom and plan our course for making the best of it. Empowered by a strong vision, we are now ready to put in the work that comes with positioning our conglomerate to enter the world's biggest economies. From generating growth in the ICT industry, we are now pursuing to nurture leading and global businesses. The time has come to explore the possibilities in ICT and beyond.Equipped with a vision and the right values, we are expanding and reaching new heights as a powerful, nurturing, and timeless conglomerate. We are moving towards a more promising future to cultivate opportunities and provide a customer experience like no other. Trends Group Inc. promises to give our partners the satisfaction they deserve and elevate itself to create and grow leading and global businesses.
Kalibrr
Other Info
Makati City, Metro Manila
Permanent
Full-time
Permanent
Full-time
Submit profile
Trends Group, Inc.
About the company
Trends Group, Inc. jobs
Manila, Metro Manila
Position vulnerability assessment and penetration testing lead Engineer recruited by the company Trends Group, Inc. at MetroManila, Manila, Makati, Joboko automatically collects the salary of , finds more jobs on Vulnerability Assessment and Penetration Testing Lead Engineer or Trends Group, Inc. company in the links above