Jobs
Interviews

1 Identifying Vulnerabilities Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 12.0 years

0 Lacs

haryana

On-site

The primary responsibility in the role of L3-Information Security involves managing organizational practices related to Vulnerability Assessment, Infrastructure Penetration Testing (Cloud/Traditional DC), Configuration Review, and Red Teaming. As a part of the role, you will be expected to lead the team in delivering Vulnerability Management operations efficiently. Your duties will include conducting penetration testing based on scheduled activities and responding to on-demand requests for Infrastructure Vulnerability Assessment. You will also be responsible for performing Vulnerability Assessment and Penetration Testing on Cloud Environments such as AWS, GCP, and Azure. Additionally, conducting configuration reviews based on the calendar activities and responding to on-demand requests for server, database, and network components will be a part of your responsibilities. As part of this role, you will need to identify critical vulnerabilities and propose workarounds. You will be required to explain vulnerabilities to system owners, provide recommendations for mitigation, monitor the progress of vulnerability mitigations, and keep track of remediation efforts. Providing advisory support to the internal IT team for closing identified vulnerabilities during security testing will also be expected. To excel in this position, you should stay updated on the latest trends in tools and technologies used for application security. Developing Proof of Concepts (POCs) to demonstrate security issues will also be a key aspect of this role. In terms of qualifications, a B.Tech, B.E, MCA, or equivalent degree from a recognized university is required. Candidates should have a minimum of 8 years of experience in a similar role. Preferred certifications include OSCP and EC-Council LPT, while hands-on experience with popular security tools like Nessus, Metasploit, and KALI Linux is essential. Additionally, working knowledge of CIS Security benchmarks and practical experience in auditing various operating systems, databases, networks, and security technologies will be beneficial for this position.,

Posted 1 day ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies