Jobs Career Advice Post Job
X

Send this job to a friend

X

Did you notice an error or suspect this job is scam? Tell us.

Oops! It seems this job from GVA Partners has expired
View current and similar jobs using the button below
  • Posted: Oct 6, 2025
    Deadline: Oct 31, 2025
    • @gmail.com
    • @yahoo.com
    • @outlook.com
  • Growth in Value Alliance (GV Alliance) Partners is a business advisory and market intelligence services firm. Our objectives are to assist organizations to achieve their growth aspirations by providing market intelligence, strategy blueprint, IT solution delivery expertise and business operation improvement capabilities. GVA Partners is also a l...
    Read more about this company

     

    Penetration Tester (Ethical Hacker)

    Job Summary

    • We are seeking a skilled and driven penetration tester with a hacker mindset to proactively Simulate real world attacks to identify, assess and exploit security vulnerabilities.
    • You’ll be part of a fast-paced security team, expected to think like an adversary while maintaining ethical standards and compliance.
    • You must be capable of both automated and manual testing, custom script writing, and producing detailed yet understandable reports.

    Key Responsibilities

    • Conduct black-box, gray-box, and white-box penetration tests on: Web apps, Mobile apps, APIs.
    • Perform social engineering and phishing simulation campaigns
    • Develop and execute custom exploits where necessary
    • Document proof-of-concept exploits and provide risk-ranked findings
    • Conduct red team exercises simulating advanced persistent threats (APT)
    • Analyze security findings from Hacker One and recreate vulnerabilities
    • Collaborate with developers, Appsec Team, DevOps, and product teams to provide remediation guidance
    • Stay current on CVEs, exploits, hacker tools, and threat actor techniques (TTPs)
    • Weekly updates and debriefs with stakeholders
    • Manual Application and Api Penetration testing based on Owasp top 10 (Mobile,Web,Api).

    Minimum Requirements

    • Proven experience in offensive security or ethical hacking
    • Demonstrated history with Bug Bounty programs or CTF competitions
    • Deep understanding of web technologies, cloud platforms, and modern infrastructure
    • Ability to write and explain exploits or security PoCs clearly
    • Strong report writing and communication skills.

    Tools and Platforms (it’s expected to have a knowledge of how to use at least one of each of the listed tools):

    • Burp Suite, OWASP ZAP, Nmap,
    • Mobile security tools: MobSF, Frida, jadx, Objection, genny motion, Andriod studio.
    • Kali Linux, Parrot OS, custom scripts in Python, Bash, PowerShell.
    • Postman, for API testing.

    Security Standards & Compliance:

    • OWASP Top 10 (Web, API, Mobile)
    • CIS Benchmarks
    • NIST 800-53, ISO/IEC 27001.

    Preferred Qualifications:

    • CEH, OSCP, OSCE, GPEN, or similar certifications
    • Experience working in CI/CD environments and with DevSecOps teams
    • Programming or scripting experience (Python, JavaScript, Nodejs, php, Go, Bash).

    go to method of application »

    IT Security Engineer

    Job Description

    • An exciting opportunity exists for a highly skilled IT security engineer to join a dynamic project team.

    Responsibilities

    • Carry out procedural system maintenance on all IT systems.
    • Ensure all networks including but not limited to LAN, MAN, WAN, GAN meets the demand of the company.
    • Troubleshoot system and network problems, diagnosing and solving hardware or software faults and replace parts as required.
    • Maintain all IT system work flows.
    • Maintain and update all IT Networks.
    • Maintain and contribute to the development of IT Network.
    • Participate actively in developing, planning and implementing advance IT systems.
    • Other duties as assigned.

    Functions:

    • Lead cybersecurity initiatives in conjunction with Group Cybersecurity team.
    • Design and implement security controls to safeguard and monitor events for information systems, enterprise applications and data.
    • Lead the implementation of Information Security projects
    • Drive internal and external vulnerability assessment, penetration tests engagements and manage results to remediation.
    • Respond to escalated security events and drive security incident response processes to ensure timely resolution with minimal disruption.
    • Design, document, and deploy secure infrastructure solutions to enhance and evolve the security posture of the business to ensure integrity, availability and confidentiality of all critical enterprise data.
    • Provide expertise on security tools, including but not limited to firewalls, Web Application firewalls, IDS/IDP, anti-malware software
    • Liaise with stakeholders in respect of operational implementation of security policies and best practices
    • Collaborate with the Client Server Team to ensure that technical plans are practical, controls are sustainable, and implementations are managed to minimize risks and adverse impact to servers, workstations and user productivity.
    • Implement the infrastructure, configurations and processes to monitor security related events
    • Prevent data loss and service interruptions by researching new technologies that will effectively protect the enterprise network.

    Supervisory / Managerial Responsibilities:

    • Ensure conformance to Cybersecurity Blueprint/Roadmap
    • Provide inputs to company strategic plan on all initiatives to ensure that Security gaps/vulnerabilities are identified & closed
    • Establish and ensure credibility through strong relationships, value-add to operations and professionalism

    Requirements

    • Minimum of 5 years experience in an area of Security specialisation; with experience working with others
    • Experience working in a Large organization and preferably in the Telecommunications industry
    • Strong background as an Engineer/Architect in application security infrastructure and various network technologies to include devices such as firewalls, VPN, intrusion/extrusion detection, vulnerability & risk assessment tools, encryption technologies, virus/worm/malware prevention, E-business and web application technologies, Data Loss Prevention, whole disk & device encryption solutions, two factor authentication, common Windows (desktop & server) platforms
    • Experience with Microsoft, Solaris, Unix, Oracle and MS SQL
    • Experience working in telecommunications industry
    • Managing network and/or network security
    • Knowledge should be current with information security best practices and global trends
    • Knowledge of security best practices such as; defense in-depth, least privileges, need-to-know, separation of duties, access controls, encryption
    • User account identity, authorization and authentication management.
    • Security incident and event management
    • Experience in researching new or emerging technologies and processes that may be incorporated as solutions to reoccurring security concern.

    Training:

    • Penetration Testing
    • Vulnerability lifecycle management
    • Advanced Security Incidence Reponse
    • Systems Auditing, Database Security, Firewall Design, Intrusion detection system administration Implementation
    • Security enforcement on systems level, security audit and vulnerability management
    • Telecommunications, Network, wireless & Internet Security.

    go to method of application »

    Linux Engineer (RHEL)

    Job Description

    • RedHat, Oracle Enterprise Linux and Solaris operating system installation.
    • Operating system hardening and configuration.
    • Break and fix.
    • Capacity optimization and reporting.
    • Observability and monitoring of infrastructure.
    • Service management operations, includes - incident, request, problem and change implementations.
    • Host storage sub-system administration and migration.
    • Platform automation and scripting.
    • Package and repository management.
    • System patch and vulnerability remediation.
    • Platform management utilizing tools such as RedHat Satellite and Ansible Automation Platform.
    • Engineered system administration, such as Oracle Sparc M6 and Exadata.
    • Virtualized platform administration such as Oracle Virtual Machine Manager, KVM and VMWare VCenter.
    • Business reporting and presentation.
    • Customer engagement and troubleshoot sessions.
    • Platform upgrade and migration.
    • Research and development.
    • Business tasks reporting.

    Responsibilities

    • Lead and support the migration from Oracle Enterprise Linux (OEL) to Red Hat Enterprise Linux (RHEL).
    • Integrate Linux hosts with RedHat Satellite for centralized management.
    • Perform advanced troubleshooting of Linux operating systems and applications.
    • Automate routine tasks using tools like Ansible.
    • Apply ITIL processes (change, incident, problem management) in daily operations.
    • Collaborate with cross-functional teams to ensure seamless infrastructure upgrades and transparent system migrations.

    Requirements

    • Strong proficiency in Linux system administration (RHEL preferred).
    • Experience with RedHat Satellite, Ansible, and shell scripting (Bash, Python).
    • Familiarity with network services: DNS, NFS, LDAP/Kerberos, Apache, NTP.
    • Analytical mindset with strong problem-solving capabilities.
    • Excellent communication and teamwork skills.
    • Certifications such as RHCE, RHCSA, or ITIL are advantageous.

    Scope:

    • Patching: This activity is to address swiftly vulnerable hosts in the Unix ecosystem. It also includes vulnerability remediation to mitigate security attack surfaces identified and improve system performance by addressing known system bugs.
    • Operating system conversion: This activity is for the conversion of Oracle Enterprise Linux to Red Hat Enterprise Linux systems respectively for operating system consolidation and to get Red Hat subscription coverage.
    • Red Hat Satellite registration: This is consolidation of all Red Hat Enterprise Linux footprints on a centralised management system – Red Hat Satellite. This centralizes package, patch, job execution, and management.
    • Operating system upgrade: This activity aims at the upgrade of Red Hat Enterprise Linux 7.9 to 8.10 respectively. This assures the environment is security compliant and within support.

    Method of Application

    Interested and qualified candidates should send their CV and Cover Letter to: contact@gvapartners.com and copy: tisea@gvapartners.com using the Job Title as the subject of the email.

    Build your CV for free. Download in different templates.

  • Send your application

    View All Vacancies at GVA Partners Back To Home

Subscribe to Job Alert

 

Join our happy subscribers

 
 
Send your application through

GmailGmail YahoomailYahoomail