S

Officer, Vulnerability Assessment & Penetration Testing

Stanbic Bank Tanzania

Management & Business Development

Yesterday
New
Experience Level: Mid level Experience Length: 3 years

Job descriptions & requirements


Job Description
Responsible for simulating cyber-attacks to identify and exploit vulnerabilities within the organization's IT infrastructure, applications, and networks. This role focuses on offensive security techniques to test the effectiveness of security controls and improve the organization's overall security posture.

  • Conduct thorough penetration tests on systems, networks, and applications to identify security weaknesses.
  • Use a combination of automated tools and manual testing techniques to exploit vulnerabilities.
  • Plan and execute red team exercises to test the organization's detection and response mechanisms.
  • Use advanced attack techniques to emulate adversaries and assess the organization's security readiness.
  • Perform vulnerability assessments to identify and prioritize security risks.
  • Analyze assessment results and provide actionable remediation recommendations.
  • Prepare detailed reports of findings from penetration tests and red team exercises, including technical details and potential business impacts.
  • Present findings to technical and non-technical stakeholders, providing clear explanations and recommendations for remediation.

Qualifications

  • Bachelor’s degree in computer science, Information Technology, Cybersecurity, or a related field.
  • Relevant certifications such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), GIAC Certified Incident Handler (GCIH), or equivalent can be an added advantage.

Experience

  • 3years experience in cybersecurity, with a focus on red team activities, vulnerability assessment, and penetration testing. Hands-on experience with VAPT tools such as Nessus, Burp Suite, Metasploit, and OWASP ZAP.
  • 3years extensive knowledge of Security Operation, Endpoint management, Network Security and Vulnerability management. Extensive knowledge of TCP/IP protocol stacks, firewalls (Checkpoint and ASA), switches and routers. Extensive knowledge of Windows and Linux Operating Systems and cloud computing / cloud security.

Additional Information
Behavioural Competencies

  • Adopting Practical Approaches
  • Articulating Information
  • Developing Strategies
  • Embracing Change
  • Exploring Possibilities
  • Providing Insights
  • Team Working

Technical Competencies

  • Data Analysis
  • Debugging and Fixing Software
  • Design Patterns
  • Software Development Life Cycle (SDLC) methodologies & Tools
  • Systems Patterns Integration
  • Technical Analysis
  • Use of Build and Test Automation
  • Write Code


<

Important safety tips

  • Do not make any payment without confirming with the Jobberman Customer Support Team.
  • If you think this advert is not genuine, please report it via the Report Job link below.

This action will pause all job alerts. Are you sure?

Cancel Proceed

Similar jobs

Lorem ipsum

Lorem ipsum dolor (Location) Lorem ipsum Confidential
3 years ago

Stay Updated

Join our newsletter and get the latest job listings and career insights delivered straight to your inbox.

v2.homepage.newsletter_signup.choose_type

We care about the protection of your data. Read our

We care about the protection of your data. Read our  privacy policy .

Follow us On:
Get it on Google Play
2026 Jobberman

Or your alerts