{"id":269,"date":"2016-08-12T11:25:36","date_gmt":"2016-08-12T05:55:36","guid":{"rendered":"https:\/\/www.hackingtrainer.com\/resources\/?p=269"},"modified":"2017-11-18T14:08:05","modified_gmt":"2017-11-18T08:38:05","slug":"senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016","status":"publish","type":"post","link":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/","title":{"rendered":"Senior Consultant &#8211; Information Security  Full-time at Aujas Network Pvt Ltd in Banglore (Published at 09-08-2016)"},"content":{"rendered":"<p><strong>Conduct penetration testing for thin &amp; thick client based applications<\/strong><br \/>\n\uf0b7 Identify and propose work-around for critical defects.<br \/>\n\uf0b7 Should be able to deal with multiple platforms like Windows, Linux and technologies like Java, .Net<br \/>\n\uf0b7 Conduct Threat Modeling of Applications<br \/>\n\uf0b7 Ability to analyze root causes and deliver strategic recommendations during security reviews<br \/>\n\uf0b7 Conduct Security Code Review, Penetration Testing and Consult Product Development Team to secure Financial and Telecom Applications<br \/>\n\uf0b7 Being a key team member for delivering complete project life cycles &#8211; from capturing Customer requirements to delivering timely solutions to Customers<br \/>\n\uf0b7 Adhering to best practices, and alignment with the Customer\u2019s security requirements for project execution, documentation, and reporting<br \/>\n\uf0b7 Interaction with multi-disciplinary teams for timely meeting of key project milestones and checkpoints<br \/>\n\uf0b7 Manage Customer relationships at the project delivery level<\/p>\n<p><strong>To visit and apply:\u00a0<\/strong>https:\/\/jobs.null.co.in\/job\/14799\/senior-consultant-information-security-at-aujas-network-pvt-ltd\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conduct penetration testing for thin &amp; thick client based applications \uf0b7 Identify and propose work-around for critical defects. \uf0b7 Should be able to deal with multiple platforms like Windows, Linux and technologies like Java, .Net \uf0b7 Conduct Threat Modeling of Applications \uf0b7 Ability to analyze root causes and deliver strategic recommendations during security reviews \uf0b7 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":329,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[5],"tags":[],"class_list":["post-269","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-job-board"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Senior Consultant - Information Security Full-time at Aujas Network Pvt Ltd in Banglore (Published at 09-08-2016)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Senior Consultant - Information Security Full-time at Aujas Network Pvt Ltd in Banglore (Published at 09-08-2016)\" \/>\n<meta property=\"og:description\" content=\"Conduct penetration testing for thin &amp; thick client based applications \uf0b7 Identify and propose work-around for critical defects. \uf0b7 Should be able to deal with multiple platforms like Windows, Linux and technologies like Java, .Net \uf0b7 Conduct Threat Modeling of Applications \uf0b7 Ability to analyze root causes and deliver strategic recommendations during security reviews \uf0b7 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/\" \/>\n<meta property=\"og:site_name\" content=\"HACKING TRAINER\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hackingtrainerb9\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-12T05:55:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-11-18T08:38:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2016\/08\/information-security-jobs-senior-consultant-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2635\" \/>\n\t<meta property=\"og:image:height\" content=\"665\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"HACKINGTRAINER.COM\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hackingtrainer\" \/>\n<meta name=\"twitter:site\" content=\"@hackingtrainer\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"HACKINGTRAINER.COM\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/\"},\"author\":{\"name\":\"HACKINGTRAINER.COM\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/754f8b3ea3ed040c72cf4965aff3ca02\"},\"headline\":\"Senior Consultant &#8211; Information Security Full-time at Aujas Network Pvt Ltd in Banglore (Published at 09-08-2016)\",\"datePublished\":\"2016-08-12T05:55:36+00:00\",\"dateModified\":\"2017-11-18T08:38:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/\"},\"wordCount\":156,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2016\/08\/information-security-jobs-senior-consultant-4.jpg\",\"articleSection\":[\"JOB BOARD\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/\",\"url\":\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/\",\"name\":\"Senior Consultant - Information Security Full-time at Aujas Network Pvt Ltd in Banglore (Published at 09-08-2016)\",\"isPartOf\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2016\/08\/information-security-jobs-senior-consultant-4.jpg\",\"datePublished\":\"2016-08-12T05:55:36+00:00\",\"dateModified\":\"2017-11-18T08:38:05+00:00\",\"author\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/754f8b3ea3ed040c72cf4965aff3ca02\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#primaryimage\",\"url\":\"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2016\/08\/information-security-jobs-senior-consultant-4.jpg\",\"contentUrl\":\"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2016\/08\/information-security-jobs-senior-consultant-4.jpg\",\"width\":2635,\"height\":665,\"caption\":\"information-security-jobs-senior-consultant\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hackingtrainer.com\/resources\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Senior Consultant &#8211; Information Security Full-time at Aujas Network Pvt Ltd in Banglore (Published at 09-08-2016)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/#website\",\"url\":\"https:\/\/www.hackingtrainer.com\/resources\/\",\"name\":\"HACKING TRAINER\",\"description\":\"The Best Training Institute for Ethical Hacking\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hackingtrainer.com\/resources\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/754f8b3ea3ed040c72cf4965aff3ca02\",\"name\":\"HACKINGTRAINER.COM\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4b94e509530c91def9d037254a5f5be19188209635bd0cd7b57ec92de81e5847?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4b94e509530c91def9d037254a5f5be19188209635bd0cd7b57ec92de81e5847?s=96&d=mm&r=g\",\"caption\":\"HACKINGTRAINER.COM\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Senior Consultant - Information Security Full-time at Aujas Network Pvt Ltd in Banglore (Published at 09-08-2016)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/","og_locale":"en_US","og_type":"article","og_title":"Senior Consultant - Information Security Full-time at Aujas Network Pvt Ltd in Banglore (Published at 09-08-2016)","og_description":"Conduct penetration testing for thin &amp; thick client based applications \uf0b7 Identify and propose work-around for critical defects. \uf0b7 Should be able to deal with multiple platforms like Windows, Linux and technologies like Java, .Net \uf0b7 Conduct Threat Modeling of Applications \uf0b7 Ability to analyze root causes and deliver strategic recommendations during security reviews \uf0b7 [&hellip;]","og_url":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/","og_site_name":"HACKING TRAINER","article_publisher":"https:\/\/www.facebook.com\/hackingtrainerb9\/","article_published_time":"2016-08-12T05:55:36+00:00","article_modified_time":"2017-11-18T08:38:05+00:00","og_image":[{"width":2635,"height":665,"url":"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2016\/08\/information-security-jobs-senior-consultant-4.jpg","type":"image\/jpeg"}],"author":"HACKINGTRAINER.COM","twitter_card":"summary_large_image","twitter_creator":"@hackingtrainer","twitter_site":"@hackingtrainer","twitter_misc":{"Written by":"HACKINGTRAINER.COM","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#article","isPartOf":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/"},"author":{"name":"HACKINGTRAINER.COM","@id":"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/754f8b3ea3ed040c72cf4965aff3ca02"},"headline":"Senior Consultant &#8211; Information Security Full-time at Aujas Network Pvt Ltd in Banglore (Published at 09-08-2016)","datePublished":"2016-08-12T05:55:36+00:00","dateModified":"2017-11-18T08:38:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/"},"wordCount":156,"commentCount":0,"image":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2016\/08\/information-security-jobs-senior-consultant-4.jpg","articleSection":["JOB BOARD"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/","url":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/","name":"Senior Consultant - Information Security Full-time at Aujas Network Pvt Ltd in Banglore (Published at 09-08-2016)","isPartOf":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#primaryimage"},"image":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2016\/08\/information-security-jobs-senior-consultant-4.jpg","datePublished":"2016-08-12T05:55:36+00:00","dateModified":"2017-11-18T08:38:05+00:00","author":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/754f8b3ea3ed040c72cf4965aff3ca02"},"breadcrumb":{"@id":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#primaryimage","url":"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2016\/08\/information-security-jobs-senior-consultant-4.jpg","contentUrl":"https:\/\/www.hackingtrainer.com\/resources\/wp-content\/uploads\/2016\/08\/information-security-jobs-senior-consultant-4.jpg","width":2635,"height":665,"caption":"information-security-jobs-senior-consultant"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hackingtrainer.com\/resources\/senior-consultant-information-security-full-time-aujas-network-pvt-ltd-banglore-published-09-08-2016\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hackingtrainer.com\/resources\/"},{"@type":"ListItem","position":2,"name":"Senior Consultant &#8211; Information Security Full-time at Aujas Network Pvt Ltd in Banglore (Published at 09-08-2016)"}]},{"@type":"WebSite","@id":"https:\/\/www.hackingtrainer.com\/resources\/#website","url":"https:\/\/www.hackingtrainer.com\/resources\/","name":"HACKING TRAINER","description":"The Best Training Institute for Ethical Hacking","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hackingtrainer.com\/resources\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Person","@id":"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/754f8b3ea3ed040c72cf4965aff3ca02","name":"HACKINGTRAINER.COM","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.hackingtrainer.com\/resources\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4b94e509530c91def9d037254a5f5be19188209635bd0cd7b57ec92de81e5847?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4b94e509530c91def9d037254a5f5be19188209635bd0cd7b57ec92de81e5847?s=96&d=mm&r=g","caption":"HACKINGTRAINER.COM"}}]}},"_links":{"self":[{"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/posts\/269","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/comments?post=269"}],"version-history":[{"count":0,"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/posts\/269\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/media\/329"}],"wp:attachment":[{"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/media?parent=269"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/categories?post=269"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hackingtrainer.com\/resources\/wp-json\/wp\/v2\/tags?post=269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}