*Title                 : Application Security*

*Location           : Pittsfield, MA*

*Duration           : 6+ Months*



This service will provide following functions for Application security and
information protection globally:

·         Conduct application security assessment for all types of
applications, internet, extranet, Intranet, mobile, etc.

·         Thorough review of various application architectures and attack
vectors on application tier and database tier components.

·         Conduct application vulnerability assessments, penetration
testing with usage of applications security tools and source code analyzers.

·         Manage and administer IBM AppScan Enterprise tool for Application
assessment and Qualys Dell SecureWorks tool for Database vulnerability
management.

·         Web Application Dynamic Scanning using IBM AppScan Dynamic
Scanner.

·         Web Application Static Scanning using IBM AppScan Source for
Analysis.

·         Manage IBM AppScan GSC component for Web Services vulnerability
assessment.

·         Manage IBM AppScan Web Explorer tool for manual exploration of
web applications.

·         Manage Virtual Forge Code Profiler tool for scanning SAP ABAP
code.

·         Provide secure development standards and practices for the
following application languages/platforms: Microsoft .NET, J2EE, SAP ABAP,
IOS, Android and Oracle DB/MS SQL Server.

·         Review Web-based solutions developed in HTML5, DHTML, CSS, and
JavaScript.

·         Providing fix recommendations for vulnerabilities to software
development teams.

·         Adopt one of leading methodologies used in industry like OWASP,
CVSS, CWE, OSSTMM and/or SANS-25.

·         Design and develop security controls for applications.

·         Use of Secure Software Development Life Cycle (SSDLC) and IT
Processes.

·         Vulnerability Assessment and Penetration Testing.

·         Applications Security Assurance including web and mobile apps.

·         Identify & Remediate Software Vulnerabilities Earlier in the
Development Lifecycle.

·         Building Secure Code Policies, Guidelines, & Standards

·         Empower Developers and Architects to Identify & Eliminate
Software Vulnerabilities.

·         Detailed and In-depth Application Security Analysis.

·         Threat modeling and Application Design review

·         Reporting Vulnerability assessment and fix recommendations.

·         Securing applications before going into production.

-- 

Thanks & Regards

*Divyansh Kumar Singh*

VBeyond Corporation

divyan...@vbeyond.com <divyan...@vbeyond.com>

*Phone*: 908-988-0328 *Ext*: 303

-- 
You received this message because you are subscribed to the Google Groups "SAP 
BASIS" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to sap-basis+unsubscr...@googlegroups.com.
To post to this group, send email to sap-basis@googlegroups.com.
Visit this group at http://groups.google.com/group/sap-basis.
For more options, visit https://groups.google.com/d/optout.

Reply via email to