Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 5.0 years
1 - 5 Lacs
gurugram
Work from Office
L2 (4 to 7 yrs experience) : Working knowledge in IT / IT Security & Compliance role In depth & Hands on Knowledge of Latest Vulnerability Assessment & Risk Prioritization process and tools like Qualys, Nessus, Skybox, Kenna, Rapid7 & Metasploit Ability to respond appropriately in case of Cyber Security Incidents as per Response & Remediation SLAsKnowledge of identifying IT Threats proactively Understanding of Network Devices like Firewall, Switches, routers, Micro-segmentation etc Understanding of Servers, Databases & Application Security basics & hardening procedures Knowledge of Windows as well as Non-Windows OS Platforms Vulnerability gaps assessments, patch recommendations to close gapsKnowledge of CIS, NIST, DoT regulatory understanding etc based hardening of infrastructure (both on premise and cloud)Knowledge of latest technologies and Cloud Security, CSPM, Micro-segmentation Identify, assess, track and report on security risks and issues identified in due diligence processes, self-assessments, architectural reviews, change management, cyber exercises, reviews, and audits Ideate and leverage Gen AI to identify and visualize cybersecurity risk at scaleCloud Risk and Compliance ManagementUnderstanding of security design principles, controls, guardrails, across multi cloud platformsWell versed with the Zero Trust Architecture Framework and implementation and maturityPartner with Technology, Cloud, Infrasec, Info-Sec and Gen AI engineering teams, in both leading and supporting capacities L3 (7 Years+ experience) : Tools and Technology : Certification: IT / IT Security & Compliance role Tools like Qualys, Nessus, Skybox, Kenna, Rapid7 & Metasploit Aware of Cyber Security process
Posted -1 days ago
3.0 - 5.0 years
1 - 5 Lacs
bengaluru
Work from Office
L2 (4 to 7 yrs experience) : Working knowledge in IT / IT Security & Compliance role In depth & Hands on Knowledge of Latest Vulnerability Assessment & Risk Prioritization process and tools like Qualys, Nessus, Skybox, Kenna, Rapid7 & Metasploit Ability to respond appropriately in case of Cyber Security Incidents as per Response & Remediation SLAsKnowledge of identifying IT Threats proactively Understanding of Network Devices like Firewall, Switches, routers, Micro-segmentation etc Understanding of Servers, Databases & Application Security basics & hardening procedures Knowledge of Windows as well as Non-Windows OS Platforms Vulnerability gaps assessments, patch recommendations to close gapsKnowledge of CIS, NIST, DoT regulatory understanding etc based hardening of infrastructure (both on premise and cloud)Knowledge of latest technologies and Cloud Security, CSPM, Micro-segmentation Identify, assess, track and report on security risks and issues identified in due diligence processes, self-assessments, architectural reviews, change management, cyber exercises, reviews, and audits Ideate and leverage Gen AI to identify and visualize cybersecurity risk at scaleCloud Risk and Compliance ManagementUnderstanding of security design principles, controls, guardrails, across multi cloud platformsWell versed with the Zero Trust Architecture Framework and implementation and maturityPartner with Technology, Cloud, Infrasec, Info-Sec and Gen AI engineering teams, in both leading and supporting capacities L3 (7 Years+ experience) : Tools and Technology : Certification: IT / IT Security & Compliance role Tools like Qualys, Nessus, Skybox, Kenna, Rapid7 & Metasploit Aware of Cyber Security process
Posted -1 days ago
3.0 - 5.0 years
1 - 5 Lacs
noida
Work from Office
L2 (4 to 7 yrs experience) : Working knowledge in IT / IT Security & Compliance role In depth & Hands on Knowledge of Latest Vulnerability Assessment & Risk Prioritization process and tools like Qualys, Nessus, Skybox, Kenna, Rapid7 & Metasploit Ability to respond appropriately in case of Cyber Security Incidents as per Response & Remediation SLAsKnowledge of identifying IT Threats proactively Understanding of Network Devices like Firewall, Switches, routers, Micro-segmentation etc Understanding of Servers, Databases & Application Security basics & hardening procedures Knowledge of Windows as well as Non-Windows OS Platforms Vulnerability gaps assessments, patch recommendations to close gapsKnowledge of CIS, NIST, DoT regulatory understanding etc based hardening of infrastructure (both on premise and cloud)Knowledge of latest technologies and Cloud Security, CSPM, Micro-segmentation Identify, assess, track and report on security risks and issues identified in due diligence processes, self-assessments, architectural reviews, change management, cyber exercises, reviews, and audits Ideate and leverage Gen AI to identify and visualize cybersecurity risk at scaleCloud Risk and Compliance ManagementUnderstanding of security design principles, controls, guardrails, across multi cloud platformsWell versed with the Zero Trust Architecture Framework and implementation and maturityPartner with Technology, Cloud, Infrasec, Info-Sec and Gen AI engineering teams, in both leading and supporting capacities L3 (7 Years+ experience) : Tools and Technology : Certification: IT / IT Security & Compliance role Tools like Qualys, Nessus, Skybox, Kenna, Rapid7 & Metasploit Aware of Cyber Security process
Posted -1 days ago
3.0 - 5.0 years
1 - 5 Lacs
mumbai
Work from Office
L2 (4 to 7 yrs experience) : Working knowledge in IT / IT Security & Compliance role In depth & Hands on Knowledge of Latest Vulnerability Assessment & Risk Prioritization process and tools like Qualys, Nessus, Skybox, Kenna, Rapid7 & Metasploit Ability to respond appropriately in case of Cyber Security Incidents as per Response & Remediation SLAsKnowledge of identifying IT Threats proactively Understanding of Network Devices like Firewall, Switches, routers, Micro-segmentation etc Understanding of Servers, Databases & Application Security basics & hardening procedures Knowledge of Windows as well as Non-Windows OS Platforms Vulnerability gaps assessments, patch recommendations to close gapsKnowledge of CIS, NIST, DoT regulatory understanding etc based hardening of infrastructure (both on premise and cloud)Knowledge of latest technologies and Cloud Security, CSPM, Micro-segmentation Identify, assess, track and report on security risks and issues identified in due diligence processes, self-assessments, architectural reviews, change management, cyber exercises, reviews, and audits Ideate and leverage Gen AI to identify and visualize cybersecurity risk at scaleCloud Risk and Compliance ManagementUnderstanding of security design principles, controls, guardrails, across multi cloud platformsWell versed with the Zero Trust Architecture Framework and implementation and maturityPartner with Technology, Cloud, Infrasec, Info-Sec and Gen AI engineering teams, in both leading and supporting capacities L3 (7 Years+ experience) : Tools and Technology : Certification: IT / IT Security & Compliance role Tools like Qualys, Nessus, Skybox, Kenna, Rapid7 & Metasploit Aware of Cyber Security process
Posted -1 days ago
3.0 - 5.0 years
1 - 5 Lacs
pune
Work from Office
L2 (4 to 7 yrs experience) : Working knowledge in IT / IT Security & Compliance role In depth & Hands on Knowledge of Latest Vulnerability Assessment & Risk Prioritization process and tools like Qualys, Nessus, Skybox, Kenna, Rapid7 & Metasploit Ability to respond appropriately in case of Cyber Security Incidents as per Response & Remediation SLAsKnowledge of identifying IT Threats proactively Understanding of Network Devices like Firewall, Switches, routers, Micro-segmentation etc Understanding of Servers, Databases & Application Security basics & hardening procedures Knowledge of Windows as well as Non-Windows OS Platforms Vulnerability gaps assessments, patch recommendations to close gapsKnowledge of CIS, NIST, DoT regulatory understanding etc based hardening of infrastructure (both on premise and cloud)Knowledge of latest technologies and Cloud Security, CSPM, Micro-segmentation Identify, assess, track and report on security risks and issues identified in due diligence processes, self-assessments, architectural reviews, change management, cyber exercises, reviews, and audits Ideate and leverage Gen AI to identify and visualize cybersecurity risk at scaleCloud Risk and Compliance ManagementUnderstanding of security design principles, controls, guardrails, across multi cloud platformsWell versed with the Zero Trust Architecture Framework and implementation and maturityPartner with Technology, Cloud, Infrasec, Info-Sec and Gen AI engineering teams, in both leading and supporting capacities L3 (7 Years+ experience) : Tools and Technology : Certification: IT / IT Security & Compliance role Tools like Qualys, Nessus, Skybox, Kenna, Rapid7 & Metasploit Aware of Cyber Security process
Posted -1 days ago
2.0 years
1 - 3 Lacs
delhi
On-site
Job Summary: We are looking for an experienced and passionate Cybersecurity & Ethical Hacking Trainer/Faculty to join our academic team. The ideal candidate should possess strong technical expertise in cybersecurity, penetration testing, and ethical hacking, along with proven experience in training and mentoring learners. Prior experience in the EdTech industry or professional training environment is highly desirable. The trainer will play a key role in curriculum delivery, student success, and driving industry-relevant skill development. Key Responsibilities: Training & Delivery Conduct in-person and/or virtual training sessions on Cybersecurity, Network Security, Ethical Hacking, and related domains. Deliver engaging, practical, and industry-oriented sessions using hands-on labs, simulations, and case studies. Curriculum Development & Enhancement Design, develop, and update course content, lab exercises, and assessment material aligned with global standards (CEH, OSCP, CompTIA Security+, CISSP, etc.). Integrate latest tools, trends, and technologies into the training modules. Learner Mentorship & Support Mentor students throughout their learning journey, including projects, labs, and certification preparation. Provide personalized guidance to help students achieve placement readiness and professional growth. Collaboration & Industry Engagement Collaborate with academic and placement teams to ensure high-quality outcomes. Share real-world cybersecurity scenarios and conduct Red Team/Blue Team exercises to provide applied knowledge. Assessment & Reporting Evaluate student progress through quizzes, practical exams, and project work. Maintain training records, performance metrics, and provide feedback to academic management. Required Skills & Qualifications: Education: Bachelor’s/Master’s Degree in Computer Science, Information Technology, Cybersecurity, or related field. Certifications (Mandatory/Preferred): CEH (Certified Ethical Hacker), OSCP, CompTIA Security+, CISSP, CCNA Security, or equivalent. Technical Expertise: Networking, system security, Linux/Windows administration. Penetration testing tools (Kali Linux, Metasploit, Burp Suite, Nmap, Wireshark, etc.). Cloud security and emerging cybersecurity trends. Experience: Minimum 2–5 years of professional/academic experience in cybersecurity & ethical hacking training. Preferred Experience: Prior teaching/training experience in the EdTech industry or corporate training domain. Strong communication, presentation, and mentoring skills. Key Competencies: Passion for knowledge-sharing and teaching. Ability to simplify complex technical concepts for learners at all levels. Strong analytical and problem-solving abilities. Commitment to continuous professional development. Job Types: Part-time, Contractual / Temporary Pay: ₹12,113.32 - ₹30,000.00 per month Language: English (Preferred) Work Location: In person
Posted 1 hour ago
1.0 years
1 - 5 Lacs
india
On-site
Job Title: Ethical Hacking Trainer (Full-Time/Part-Time) Location: Greater Kailash 2, South Delhi Company: DizitalAdda – A Leading Digital & Professional Education Institute About Us: DizitalAdda is a premier digital marketing and professional skills training institute located in the heart of South Delhi. With an established presence in digital education, we are now expanding into the Cyber Security and Ethical Hacking domain. We are currently seeking a skilled and passionate Cyber Security Trainer to join our team and deliver hands-on, industry-relevant training to aspiring cybersecurity professionals. Roles & Responsibilities: Deliver engaging, practical, and real-world-based training in Cyber Security . Teach topics like: Vulnerability Assessment Penetration Testing Network & Web Application Security Social Engineering Wi-Fi Hacking Digital Forensics & Cyber Forensics Cryptography Cloud security Tools like Kali Linux, Wireshark, Nmap, SQLMap, Metasploit, etc. Create training content, assignments, and live labs for learners. Prepare students for certifications like CEH, OSCP, or CompTIA Security+ . Maintain course quality and student satisfaction. Conduct doubt sessions and assessments regularly. Required Skills: Strong knowledge of Ethical Hacking, Cybersecurity, and Penetration Testing . Hands-on experience with real-world attack & defense scenarios. Good communication and presentation skills. Familiarity with Linux OS, Networking basics, and scripting (Python preferred). Previous training experience (offline/online) preferred. Qualifications: Bachelor's in Computer Science/IT/Cyber Security or equivalent. Certifications like CEH / OSCP / Security+ (preferred but not mandatory). 1–3 years of experience in cybersecurity training or real-world cybersecurity projects. Employment Type: Full-Time / Part-Time / Weekend Batch Trainer (Flexible Options Available) Salary: ₹20,000 – ₹50,000 per month (Based on experience & expertise) Why Join Us? Prime Location: South Delhi (Greater Kailash 2) Modern classrooms & lab setup Freedom to design practical sessions Exposure to corporate clients and real projects Growth opportunities in a fast-growing education brand How to Apply: Send your resume and any certification proof to: ✅ manshi @dizitaladda.com ✅ +91-9266419614 ✅ www.dizitaladda.com Job Types: Full-time, Permanent Pay: ₹11,340.58 - ₹45,000.00 per month Benefits: Health insurance Paid sick time Provident Fund Language: English (Preferred) Work Location: In person
Posted 1 hour ago
0.0 - 3.0 years
0 - 0 Lacs
greater kailash ii, delhi, delhi
On-site
Job Title: Ethical Hacking Trainer (Full-Time/Part-Time) Location: Greater Kailash 2, South Delhi Company: DizitalAdda – A Leading Digital & Professional Education Institute About Us: DizitalAdda is a premier digital marketing and professional skills training institute located in the heart of South Delhi. With an established presence in digital education, we are now expanding into the Cyber Security and Ethical Hacking domain. We are currently seeking a skilled and passionate Cyber Security Trainer to join our team and deliver hands-on, industry-relevant training to aspiring cybersecurity professionals. Roles & Responsibilities: Deliver engaging, practical, and real-world-based training in Cyber Security . Teach topics like: Vulnerability Assessment Penetration Testing Network & Web Application Security Social Engineering Wi-Fi Hacking Digital Forensics & Cyber Forensics Cryptography Cloud security Tools like Kali Linux, Wireshark, Nmap, SQLMap, Metasploit, etc. Create training content, assignments, and live labs for learners. Prepare students for certifications like CEH, OSCP, or CompTIA Security+ . Maintain course quality and student satisfaction. Conduct doubt sessions and assessments regularly. Required Skills: Strong knowledge of Ethical Hacking, Cybersecurity, and Penetration Testing . Hands-on experience with real-world attack & defense scenarios. Good communication and presentation skills. Familiarity with Linux OS, Networking basics, and scripting (Python preferred). Previous training experience (offline/online) preferred. Qualifications: Bachelor's in Computer Science/IT/Cyber Security or equivalent. Certifications like CEH / OSCP / Security+ (preferred but not mandatory). 1–3 years of experience in cybersecurity training or real-world cybersecurity projects. Employment Type: Full-Time / Part-Time / Weekend Batch Trainer (Flexible Options Available) Salary: ₹20,000 – ₹50,000 per month (Based on experience & expertise) Why Join Us? Prime Location: South Delhi (Greater Kailash 2) Modern classrooms & lab setup Freedom to design practical sessions Exposure to corporate clients and real projects Growth opportunities in a fast-growing education brand How to Apply: Send your resume and any certification proof to: ✅ manshi @dizitaladda.com ✅ +91-9266419614 ✅ www.dizitaladda.com Job Types: Full-time, Permanent Pay: ₹11,340.58 - ₹45,000.00 per month Benefits: Health insurance Paid sick time Provident Fund Language: English (Preferred) Work Location: In person
Posted 7 hours ago
2.0 years
0 Lacs
pune
On-site
Country India State Maharashtra City Pune Date Published 18-Jul-2025 Job ID 45325 Travel You may occasionally be required to travel for business Looking for details about our benefits? Description and Requirements "At BMC trust is not just a word - it's a way of life!" We are an award-winning, equal opportunity, culturally diverse, fun place to be. Giving back to the community drives us to be better every single day. Our work environment allows you to balance your priorities, because we know you will bring your best every day. We will champion your wins and shout them from the rooftops. Your peers will inspire, drive, support you, and make you laugh out loud! We help our customers free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead - and are relentless in the pursuit of innovation! BMC Software is looking for a motivated and skilled individual to join the Product Security Group. This is a senior technical position in the team. The candidate will be responsible for engaging with various product teams on security architecture reviews, SaaS security, penetration testing. A penetration tester plays a crucial role in safeguarding an organization's digital assets and information by proactively identifying and addressing security weaknesses. This role requires a high level of technical expertise, ethical conduct, and a commitment to continuous improvement in the field of cybersecurity. Roles and Responsibilities: Conduct thorough vulnerability assessments of applications and systems using various tools and techniques. Execute penetration tests to simulate real-world cyberattacks, identifying weaknesses and vulnerabilities. Provide expert guidance on application security best practices. Research and develop new penetration testing methodologies, tools, and techniques. Qualifications & Skills: 2+ years of experience in product security (web, mobile, API, cloud, infrastructure, and container security) or equivalent skillset. Penetration testing experience is essential; prior participation in bug bounty programs is a plus. Proficiency with hacking tools and penetration testing frameworks (e.g., Metasploit, Burp Suite, Nmap, Wireshark). Expertise in web application security testing, including knowledge of OWASP Top Ten vulnerabilities. Experience identifying and assessing vulnerabilities such as SQL injection, XSS, CSRF, and more. Proficiency in exploiting vulnerabilities to gain unauthorized access and assess attack impact. Understanding of vulnerability scoring systems (e.g., CVSS) for prioritizing findings. Ability to think creatively and analytically to identify and exploit vulnerabilities. Strong problem-solving skills when encountering unexpected challenges during testing. Excellent verbal and written communication skills for conveying technical details to both technical and non-technical stakeholders. Meticulous attention to detail in documenting findings and creating reports. Effective time management skills to meet project deadlines and testing schedules. High level of integrity and professionalism, with the ability to work under pressure while maintaining confidentiality. Optional: Hands-on technical experience with cloud security solutions for leading cloud service providers (e.g., AWS). Experience with secure code review (SAST) tools for languages such as C/C++, Java, and Python, and relevant frameworks. Our commitment to you! BMC’s culture is built around its people. We have 6000+ brilliant minds working together across the globe. You won’t be known just by your employee number, but for your true authentic self. BMC lets you be YOU! If after reading the above, You’re unsure if you meet the qualifications of this role but are deeply excited about BMC and this team, we still encourage you to apply! We want to attract talents from diverse backgrounds and experience to ensure we face the world together with the best ideas! BMC is committed to equal opportunity employment regardless of race, age, sex, creed, color, religion, citizenship status, sexual orientation, gender, gender expression, gender identity, national origin, disability, marital status, pregnancy, disabled veteran or status as a protected veteran. If you need a reasonable accommodation for any part of the application and hiring process, visit the accommodation request page. BMC Software maintains a strict policy of not requesting any form of payment in exchange for employment opportunities, upholding a fair and ethical hiring process. At BMC we believe in pay transparency and have set the midpoint of the salary band for this role at 1,180,000 INR. Actual salaries depend on a wide range of factors that are considered in making compensation decisions, including but not limited to skill sets; experience and training, licensure, and certifications; and other business and organizational needs. The salary listed is just one component of BMC's employee compensation package. Other rewards may include a variable plan and country specific benefits. We are committed to ensuring that our employees are paid fairly and equitably, and that we are transparent about our compensation practices. (Returnship@BMC) Had a break in your career? No worries. This role is eligible for candidates who have taken a break in their career and want to re-enter the workforce. If your expertise matches the above job, visit to https://bmcrecruit.avature.net/returnship know more and how to apply.
Posted 1 day ago
0.0 - 3.0 years
1 - 4 Lacs
kozhikode
Work from Office
* Mentor and guide training resources across Kerala, ensuring effective knowledge transfer. * Deliver comprehensive training on RedTeam courses, including but not limited to ADCD, CPT, CICSA, CSA, CCSA, CRTA, CEH, P+, S+, CYSA+, CHFI, etc.
Posted 1 day ago
12.0 years
0 Lacs
bengaluru, karnataka, india
On-site
About the role Systems Engineer III - Performance Engineer You will be responsible for Collaborate with product managers and developers to understand product requirements and contribute to performance-focused design discussions. Create and maintain comprehensive non-functional test cases and use cases tailored to performance testing needs. Translate NFRs into detailed performance and security test plans, including SLAs, SLOs, and capacity benchmarks. Develop detailed performance test plans, including test cases and test data, and ensure alignment with business expectations. Execute various types of performance testing such as load, stress, scalability, and endurance tests to assess system behaviour under different conditions. Analyse performance test results to identify bottlenecks and inefficiencies and provide actionable insights for resolution. Monitor system performance using diagnostic tools and provide real-time feedback during testing cycles. Automate performance tests using modern, open-source tools and scripting languages to streamline testing processes. Collaborate with DevSecOps to integrate security testing into CI/CD workflows and enforce shift-left security practices. Document and report security vulnerabilities with risk ratings, reproduction steps, and remediation guidance. Work closely with QE, DevOps, and Development teams to ensure performance and security best practices are embedded throughout the SDLC. Provide detailed test reports, dashboards, and technical documentation for stakeholders. You will need Bachelor’s degree in computer science or a related engineering discipline. 12+ years of experience in Quality Engineering preferably in retail orgs or product organisations Application Testing: Hands-on experience in performance testing of APIs, microservices, web applications, and native mobile apps. Performance Testing Tools: Proficient in industry-standard tools such as JMeter, K6, Locust, Gatling, etc for load and stress testing. Scripting & Automation: Strong programming skills in Java, Python, and Shell scripting for developing and automating performance test scripts. Monitoring & Diagnostics: Expertise in using APM and logging tools - AppDynamics, Dynatrace, Splunk, New Relic, RunScope, Grafana to monitor & analyze system performance. Cloud & Containerization: Solid understanding of cloud platforms (Azure), container orchestration (Kubernetes), and containerization (Docker) for scalable performance testing. Database Performance: Ability to analyze and optimize SQL queries and database performance; familiarity with SQL, NoSQL databases, and pub-sub messaging systems. Infrastructure Knowledge: Understanding of load balancers, infrastructure design, and application architecture in both Azure cloud and on-premises environments. Security Tools: Experience with security and vulnerability assessment tools such as Burp Suite, OWASP ZAP, Metasploit, Nessus, and Nmap. Security Best Practices: Strong grasp of OWASP Top 10, CWE/SANS Top 25, and secure coding principles. Operating Systems: Comfortable working in Linux/Unix environments. Analytical Skills: Excellent problem-solving, debugging, and troubleshooting abilities. Communication: Strong verbal and written communication skills, with the ability to convey complex technical concepts clearly. Whats in it for you? At Tesco, we are committed to providing the best for you. As a result, our colleagues enjoy a unique, differentiated, market- competitive reward package, based on the current industry practices, for all the work they put into serving our customers, communities and planet a little better every day. Our Tesco Rewards framework consists of pillars - Fixed Pay, Incentives, and Benefits. Total Rewards offered at Tesco is determined by four principles -simple, fair, competitive, and sustainable. Salary - Your fixed pay is the guaranteed pay as per your contract of employment. Leave & Time-off - Colleagues are entitled to 30 days of leave (18 days of Earned Leave, 12 days of Casual/Sick Leave) and 10 national and festival holidays, as per the company’s policy. Making Retirement Tension-FreeSalary - In addition to Statutory retirement beneets, Tesco enables colleagues to participate in voluntary programmes like NPS and VPF. Health is Wealth - Tesco promotes programmes that support a culture of health and wellness including insurance for colleagues and their family. Our medical insurance provides coverage for dependents including parents or in-laws. Mental Wellbeing - We offer mental health support through self-help tools, community groups, ally networks, face-to-face counselling, and more for both colleagues and dependents. Financial Wellbeing - Through our financial literacy partner, we offer one-to-one financial coaching at discounted rates, as well as salary advances on earned wages upon request. Save As You Earn (SAYE) - Our SAYE programme allows colleagues to transition from being employees to Tesco shareholders through a structured 3-year savings plan. Physical Wellbeing - Our green campus promotes physical wellbeing with facilities that include a cricket pitch, football field, badminton and volleyball courts, along with indoor games, encouraging a healthier lifestyle. About Us Tesco in Bengaluru is a multi-disciplinary team serving our customers, communities, and planet a little better every day across markets. Our goal is to create a sustainable competitive advantage for Tesco by standardising processes, delivering cost savings, enabling agility through technological solutions, and empowering our colleagues to do even more for our customers. With cross-functional expertise, a wide network of teams, and strong governance, we reduce complexity, thereby offering high-quality services for our customers. Tesco in Bengaluru, established in 2004 to enable standardisation and build centralised capabilities and competencies, makes the experience better for our millions of customers worldwide and simpler for over 3,30,000 colleagues Tesco Technology Today, our Technology team consists of over 5,000 experts spread across the UK, Poland, Hungary, the Czech Republic, and India. In India, our Technology division includes teams dedicated to Engineering, Product, Programme, Service Desk and Operations, Systems Engineering, Security & Capability, Data Science, and other roles. At Tesco, our retail platform comprises a wide array of capabilities, value propositions, and products, essential for crafting exceptional retail experiences for our customers and colleagues across all channels and markets. This platform encompasses all aspects of our operations - from identifying and authenticating customers, managing products, pricing, promoting, enabling customers to discover products, facilitating payment, and ensuring delivery. By developing a comprehensive Retail Platform, we ensure that as customer touchpoints and devices evolve, we can consistently deliver seamless experiences. This adaptability allows us to respond flexibly without the need to overhaul our technology, thanks to the creation of capabilities we have built.
Posted 1 day ago
4.0 years
0 Lacs
bengaluru, karnataka, india
Remote
At Optiv, we’re on a mission to help our clients make their businesses more secure. We’re one of the fastest growing companies in a truly essential industry. In your role at Optiv, you’ll be inspired by a team of the brightest business and technical minds in cybersecurity. We are passionate champions for our clients and know from experience that the best solution for our clients’ needs come from working hard together. As part of our team, your voice matters, and you will do important work that has impact, on people, businesses, and nations. Our industry and our company move fast, and you can be sure that you will always have room to learn and grow. We’re proud of our team and the important work we do to build confidence for a more connected world. As a Threat Management Platform Developer, you’ll play a key role in supporting and enhancing our cybersecurity reporting ecosystem by managing and customizing the PlexTrac platform. You’ll work closely with security teams to streamline assessment workflows, develop actionable reporting templates, and drive platform integrations that align with internal processes. This role is ideal for someone with 1–4 years of experience in cybersecurity or platform development, who’s passionate about operational efficiency, automation, and offensive security tooling. Who We Are Looking For You’ll serve as a platform technical enabler, responsible for managing, enhancing, and evolving platform to support efficient cybersecurity reporting and threat exposure workflows. This includes: Optimizing platform usage by identifying repetitive reporting and workflow processes within security teams that can be centralized or automated using PlexTrac. Collaborating with Penetration Testers to translate technical assessment data into standardized, actionable reports and dashboards. Enhancing platform capabilities by developing and customizing templates, integrations, and automations using PlexTrac APIs and scripting frameworks. Conducting research to identify innovative features and integrations that support continuous threat exposure management. Supporting offensive security teams by integrating outputs from tools such as Burp Suite, Nessus, Nmap, Metasploit, and custom scripts into PlexTrac workflows. Building parsers and automation scripts to ingest and normalize data from red team engagements, vulnerability scans, and threat simulations. How You’ll Make An Impact 1 - 4 years’ experience of implementation and development of cybersecurity reporting or threat exposure management platform etc. Proficiency in Python and relevant libraries (e.g., gingerit, Pandas, Requests). Experience with RESTful APIs, data parsing, and JSON/XML. Familiarity with security tools, scanners (like Nessus or Burp Suite), and threat intelligence feeds is a plus. Strong communication skills to work across technical and non-technical teams. A passion for improving security workflows and a curiosity for automation and tooling. Ability to create efficient, well-documented, and reusable scripts and tools. Strong problem-solving skills and the ability to translate requirements into scalable solutions. What You Can Expect From Optiv A company committed to championing Diversity, Equality, and Inclusion through our Employee Resource Groups. Work/life balance Professional training resources Creative problem-solving and the ability to tackle unique, complex projects Volunteer Opportunities. “Optiv Chips In” encourages employees to volunteer and engage with their teams and communities. The ability and technology necessary to productively work remotely/from home (where applicable) EEO Statement Optiv is an equal opportunity employer. All qualified applicants for employment will be considered without regard to race, color, religion, sex, gender identity or expression, sexual orientation, pregnancy, age 40 and over, marital status, genetic information, national origin, status as an individual with a disability, military or veteran status, or any other basis protected by federal, state, or local law. Optiv respects your privacy. By providing your information through this page or applying for a job at Optiv, you acknowledge that Optiv will collect, use, and process your information, which may include personal information and sensitive personal information, in connection with Optiv’s selection and recruitment activities. For additional details on how Optiv uses and protects your personal information in the application process, click here to view our Applicant Privacy Notice. If you sign up to receive notifications of job postings, you may unsubscribe at any time.
Posted 1 day ago
0.0 - 1.0 years
2 - 3 Lacs
noida, gurugram, delhi / ncr
Work from Office
Understand common cyber attacks, e. g. , social engineering, phishing, identity theft. Obfuscation, trojans, dumpster diving, insider attacks, etc. Strong Knowledge of Information Security & Ethical Hacking Concepts. Required Candidate profile Freshers B.Tech | BCA | MCA | Must have Knowledge about Ethical Hacking , Cyber Security Proficiency in testing tools (Kali Linux, Metasploit, Burp Suite, Wireshark) Whatsapp Resume: 7042302345
Posted 2 days ago
4.0 - 9.0 years
0 Lacs
bengaluru, karnataka, india
On-site
At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. Those in security architecture at PwC will focus on designing and implementing robust security frameworks to protect organisations from cyber threats. You will develop strategies and solutions to safeguard sensitive data and enable the integrity of systems and networks. Enhancing your leadership style, you motivate, develop and inspire others to deliver quality. You are responsible for coaching, leveraging team member’s unique strengths, and managing performance to deliver on client expectations. With your growing knowledge of how business works, you play an important role in identifying opportunities that contribute to the success of our Firm. You are expected to lead with integrity and authenticity, articulating our purpose and values in a meaningful way. You embrace technology and innovation to enhance your delivery and encourage others to do the same. Skills Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to: Analyse and identify the linkages and interactions between the component parts of an entire system. Take ownership of projects, ensuring their successful planning, budgeting, execution, and completion. Partner with team leadership to ensure collective ownership of quality, timelines, and deliverables. Develop skills outside your comfort zone, and encourage others to do the same. Effectively mentor others. Use the review of work as an opportunity to deepen the expertise of team members. Address conflicts or issues, engaging in difficult conversations with clients, team members and other stakeholders, escalating where appropriate. Uphold and reinforce professional and technical standards (e.g. refer to specific PwC tax and audit guidance), the Firm's code of conduct, and independence requirements. Basic Qualifications Job Requirements and Preferences : Minimum Degree Required Bachelor Degree Minimum Years Of Experience 4-9 year(s) Preferred Qualifications Preferred Fields of Study : Computer and Information Science, Information CyberSecurity, Information Technology, Management Information Systems, Computer Applications, Computer Engineering Certification(s) Preferred Offensive Security Certified Professional (OSCP), GIAC Penetration Tester (GPEN), Certified as GIAC Web Application Penetration Tester (GWAPT) Preferred Knowledge/Skills Demonstrates extensive abilities and/or a proven record of success in the following areas: Technical concepts such as application security, network segregation, access controls, IDS/IPS devices, physical security, and information security risk management; Security testing tools, such as BurpSuite, Mimikatz, Cobalt Strike, PowerSploit, Metasploit, Nessus, HP Web Inspect, or other tools included within the Kali Linux distribution; Networking protocols, TCP/IP stack, systems architecture, and operating systems; Common programming and scripting languages, such as Python, PowerShell, Ruby, Perl, Bash, JavaScript, or VBScript; Well-known Cybersecurity frameworks and industry-leading practices such as OWASP, NIST CSF, PCI DSS, and NY-DFS; and, Traditional security operations, event monitoring, and Security Information and Event Management (SIEM) tools. Demonstrates extensive abilities and/or a proven record of success in the following areas: Performing penetration testing activities within a client’s environment, emphasizing manual stealthy testing techniques; Presenting technical topics at conferences highlighting aspects of adversary attack simulations, technical attack techniques, risk management, custom malware design, or zero day attacks; Leading and executing stealthy penetration testing, advanced red team, or adversary simulation engagements using commercially / freely available offensive security tools and utilities built into operating systems; Understanding Windows and Linux operating system setup, management, and power usage, e.g., cmd, bash, network troubleshooting, virtual machines; Identifying security critical vulnerabilities without utilizing a vulnerability scanning tool, i.e., knowledge of exploitable vulnerabilities and ability to execute stealthy penetration testing engagements; Compromising Active Directory environments and demonstrating business impact by identifying and obtaining access to business critical assets/information; Performing social engineering / phishing activities such as reconnaissance of targets, developing phishing campaigns (e.g., emails and websites), web hosting administrator, developing malicious phishing payloads, or pivoting through phished systems; Performing and supervising various workstreams of client engagements that emphasize identifying and addressing client needs; Participating actively in client discussions and meetings and communicating a broad range of potential add-on services based on identified weaknesses; Managing engagements with junior staff; Preparing concise and accurate documents, leveraging and utilizing MS Office and Google Docs to complete related project deliverables, as necessary; Balancing project economics management with the occurrence of unanticipated issues. Creating a positive environment by monitoring workloads of the team while meeting client expectations and respecting the work-life quality of team members; Proactively seeking guidance, clarification, and feedback; and, Keeping leadership informed of progress and issues. Year Of Experience 9-12 years
Posted 2 days ago
2.0 years
0 Lacs
india
On-site
Job Title: - Presales Engineer Job Description :- Qualysec is seeking a Pre-Sales Engineer to join our growing team. The ideal candidate will act as a key technical advisor during the sales process, helping clients understand and choose the right cybersecurity solutions. You will work closely with the sales and technical teams to deliver customized proposals and ensure a seamless transition from pre-sales to project execution. This role is perfect for someone with a passion for cybersecurity, strong communication skills, and the ability to translate technical concepts into business value. Qualification : - Bachelor's Degree in a related Cybersecurity/IT/Computer Science field. Experience : - 2+ Years in Cybersecurity Pre-Sales Location : - Bhubaneswar Job Type : - Full Time Responsibilities:- · Collaborate with the sales team to understand customer requirements and create technical solutions · Conduct technical presentations. · Assist in preparing proposals, RFP/RFI responses, and project estimations · Explain VAPT methodology, tools, and report deliverables to both technical and non-technical stakeholders · Liaise with technical teams (e.g., Penetration Testers to ensure smooth knowledge transfer post-sales · Conduct gap analysis and suggest appropriate services (Web, Mobile, API, Network, Cloud VAPT etc.) · Support proof-of-concept (PoC) setups for clients as required · Stay updated with the latest cybersecurity trends and tools Skills Required:- Strong understanding of cybersecurity concepts, especially VAPT Familiarity with tools like Burp Suite, Nessus, Nmap, Metasploit, OWASP Top 10 Excellent communication and presentation skills Ability to simplify technical information for non-technical stakeholders Good documentation and proposal writing skills Self-driven and client-oriented attitude Excellent written and verbal communication skills, with the ability to clearly document and communicate findings and recommendations. Prior experience in a Pre-Sales / Technical Consultant role in a cybersecurity firm is highly desirable. Benefits:- · Competitive salary, great perks, and a work culture that’s as fun as it is rewarding. · On-time Salary · Paid time off and holidays. · Leave encashment · Provident Fund · Plenty of room to experiment, innovate, and grow. About Us:- Qualysec is a leading cybersecurity firm specializing in comprehensive penetration testing and risk assessment services. Our tailored solutions help businesses proactively defend against evolving cyber threats. With over four years of experience, we take pride in having served more than 150 clients across 21 countries—a testament to our commitment to quality and resilience. Our dynamic work environment and employee-focused culture drive our continuous growth and success. Job Type: Full-time Benefits: Food provided Leave encashment Paid sick time Paid time off Provident Fund Work Location: In person
Posted 2 days ago
2.0 years
0 Lacs
pune, maharashtra, india
On-site
Description and Requirements "At BMC trust is not just a word - it's a way of life!" Description And Requirements CareerArc Code CA-DN Hybrid "At BMC trust is not just a word - it's a way of life!" We are an award-winning, equal opportunity, culturally diverse, fun place to be. Giving back to the community drives us to be better every single day. Our work environment allows you to balance your priorities, because we know you will bring your best every day. We will champion your wins and shout them from the rooftops. Your peers will inspire, drive, support you, and make you laugh out loud! We help our customers free up time and space to become an Autonomous Digital Enterprise that conquers the opportunities ahead - and are relentless in the pursuit of innovation! BMC Software is looking for a motivated and skilled individual to join the Product Security Group. This is a senior technical position in the team. The candidate will be responsible for engaging with various product teams on security architecture reviews, SaaS security, penetration testing. A penetration tester plays a crucial role in safeguarding an organization's digital assets and information by proactively identifying and addressing security weaknesses. This role requires a high level of technical expertise, ethical conduct, and a commitment to continuous improvement in the field of cybersecurity. Roles And Responsibilities Conduct thorough vulnerability assessments of applications and systems using various tools and techniques. Execute penetration tests to simulate real-world cyberattacks, identifying weaknesses and vulnerabilities. Provide expert guidance on application security best practices. Research and develop new penetration testing methodologies, tools, and techniques. Qualifications & Skills 2+ years of experience in product security (web, mobile, API, cloud, infrastructure, and container security) or equivalent skillset. Penetration testing experience is essential; prior participation in bug bounty programs is a plus. Proficiency with hacking tools and penetration testing frameworks (e.g., Metasploit, Burp Suite, Nmap, Wireshark). Expertise in web application security testing, including knowledge of OWASP Top Ten vulnerabilities. Experience identifying and assessing vulnerabilities such as SQL injection, XSS, CSRF, and more. Proficiency in exploiting vulnerabilities to gain unauthorized access and assess attack impact. Understanding of vulnerability scoring systems (e.g., CVSS) for prioritizing findings. Ability to think creatively and analytically to identify and exploit vulnerabilities. Strong problem-solving skills when encountering unexpected challenges during testing. Excellent verbal and written communication skills for conveying technical details to both technical and non-technical stakeholders. Meticulous attention to detail in documenting findings and creating reports. Effective time management skills to meet project deadlines and testing schedules. High level of integrity and professionalism, with the ability to work under pressure while maintaining confidentiality. Optional: Hands-on technical experience with cloud security solutions for leading cloud service providers (e.g., AWS). Experience with secure code review (SAST) tools for languages such as C/C++, Java, and Python, and relevant frameworks. Our commitment to you! BMC’s culture is built around its people. We have 6000+ brilliant minds working together across the globe. You won’t be known just by your employee number, but for your true authentic self. BMC lets you be YOU! If after reading the above, You’re unsure if you meet the qualifications of this role but are deeply excited about BMC and this team, we still encourage you to apply! We want to attract talents from diverse backgrounds and experience to ensure we face the world together with the best ideas! BMC is committed to equal opportunity employment regardless of race, age, sex, creed, color, religion, citizenship status, sexual orientation, gender, gender expression, gender identity, national origin, disability, marital status, pregnancy, disabled veteran or status as a protected veteran. If you need a reasonable accommodation for any part of the application and hiring process, visit the accommodation request page. BMC Software maintains a strict policy of not requesting any form of payment in exchange for employment opportunities, upholding a fair and ethical hiring process. At BMC we believe in pay transparency and have set the midpoint of the salary band for this role at 1,180,000 INR. Actual salaries depend on a wide range of factors that are considered in making compensation decisions, including but not limited to skill sets; experience and training, licensure, and certifications; and other business and organizational needs. The salary listed is just one component of BMC's employee compensation package. Other rewards may include a variable plan and country specific benefits. We are committed to ensuring that our employees are paid fairly and equitably, and that we are transparent about our compensation practices. ( Returnship@BMC ) Had a break in your career? No worries. This role is eligible for candidates who have taken a break in their career and want to re-enter the workforce. If your expertise matches the above job, visit to https://bmcrecruit.avature.net/returnship know more and how to apply.
Posted 2 days ago
0 years
0 Lacs
hyderabad, telangana, india
Remote
Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Penetration Tester is a seasoned subject matter expert, responsible for assessing and evaluating the security posture of the company's information systems, networks, applications and infrastructure. This role involves conducting rigorous penetration testing and ethical hacking activities to identify vulnerabilities and potential weaknesses for exploitation. The Penetration Tester collaborates with cross functional teams and provides strategic security recommendations and assists in strengthening the company's overall cybersecurity defenses. Key responsibilities: Plans, executes and manages complex penetration testing engagements on various IT assets, including networks, applications and databases. Conducts simulated cyber-attacks, including social engineering, to identify vulnerabilities and assesses the organization's resilience to cyber threats. Performs penetration tests against internal and external facing systems. Analyses and interprets penetration test results and provides detailed reports to relevant stakeholders. Provides input to improve the quality and effectiveness of tests in a highly scaled and global environment. Articulates complex technical risks through creation of reports and delivering presentations to key stakeholders. Works with Security DevOps teams to test the orchestration and automation processes and platforms, feed results into a testing program. Supports the assessment risk and the development and/or recommends appropriate mitigation countermeasures based on empirical testing. Provides comprehensive technical expertise with web, application and database vulnerability testing. Supports the development of the security automation framework and the implementation roadmap. Provides actionable security recommendations and mitigation strategies to address identified vulnerabilities. Ensures that penetration testing activities align with relevant industry standards, compliance regulations, and best practices. Contributes to any security awareness training and education programs to promote a culture of cybersecurity within the organization. Stays up to date with the latest cybersecurity threats, attack vectors, and defensive technologies to continuously improve testing methodologies. To thrive in this role, you need to have: Ability to work independently and manage multiple projects within remote environment. Demonstrates a strong ability to engage with various stakeholders, have a team-based approach and work towards share goals and outcomes. Ability to think outside the box and a passion to improve your skills and drive innovation. Ability to compromise systems and demonstrate ways to laterally move post compromise. In-depth knowledge of common security assessment methodologies, such as OWASP, PTES, or NIST SP 800-115. Strong understanding of various operating systems, network protocols, and application security. Proficiency in using penetration testing tools and frameworks, such as Metasploit, Burp Suite, Nmap, and Wireshark. Knowledge of security assessment tools and technologies used to evaluate web applications, databases, and network infrastructure. Excellent analytical and problem-solving skills to identify and exploit vulnerabilities effectively. Strong written and verbal communication skills to deliver clear and concise reports and recommendations to stakeholders. Ethical and professional conduct with a commitment to confidentiality and data privacy. Academic qualifications and certifications: Bachelor's degree or equivalent in Information Technology or Computer Science or related field. Security related certifications such as OSWE, OSEP, OSCP, OSCE, CRTP, GPEN, or CREST is desirable. Required experience: Seasoned demonstrated penetration testing experience and ethical hacking gained within a similar global environment. Seasoned demonstrated experience with both commercial and open-source security tools and scripting languages. Seasoned demonstrated exposure to security testing scenarios e.g. Capture the Flag / Red Team / Blue Team is desirable. Seasoned demonstrated experience with various testing platforms e.g. Hack the Box / Vulnhub / PentesterLab is desirable. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today. Third parties fraudulently posing as NTT DATA recruiters NTT DATA recruiters will never ask job seekers or candidates for payment or banking information during the recruitment process, for any reason. Please remain vigilant of third parties who may attempt to impersonate NTT DATA recruiters—whether in writing or by phone—in order to deceptively obtain personal data or money from you. All email communications from an NTT DATA recruiter will come from an @nttdata.com email address. If you suspect any fraudulent activity, please contact us .
Posted 2 days ago
4.0 years
0 Lacs
bengaluru, karnataka, india
On-site
Associate Consultant 2 – 4 Years Roles And Responsibilities Conduct penetration testing on web, mobile(android +ios), API, and thick-client applications to identify security weaknesses Conduct automated and manual Secure code review Identify and exploit vulnerabilities such as OWASP Top 10, SANS Top 25, and business logic flaws. Client interaction on project updation/status Collaborate with developers, product teams for Remediation support Perform retest post confirmation on the fixes Follow-up with the relevant stakeholders on the remediation of open vulnerabilities Mandatory Skills Required For The Role Web, API and Mobile Penetration Testing Proficiency With Penetration Testing Tools Such As Burp Suite, OWASP ZAP, Postman, Nmap, SQLMap, Metasploit, Echo mirage Mobile testing tools (e.g., MobSF, Frida ) is a plus. Good understanding on OWASP Top 10, SANS CWE Top 25, NIST standards . Good written and spoken communication skills Ability to do report walkthrough with relevant stakeholder Understanding of programming languages such as PHP, HTML, javascript, etc Education Requirements BE/B.Tech in Computer Science or Information Science Or M.Tech in Computer Science or Information Science Certifications: CEH, CompTIA, PenTest+, GPEN, OSCP, CREST CRT preferable
Posted 2 days ago
3.0 - 6.0 years
5 - 9 Lacs
pune
Work from Office
Our world is transforming, and PTC is leading the way ?Our software brings the physical and digital worlds together, enabling companies to improve operations, create better products, and empower people in all aspects of their business, Our people make all the difference in our success Today, we are a global team of nearly 7,000 and our main objective is to create opportunities for our team members to explore, learn, and grow all while seeing their ideas come to life and celebrating the differences that make us who we are and the work we do possible, The Cyber Security Consultant (Offensive Security) should have a strong passion for offensive security, with skills in red teaming and penetration testing The role involves working with a team focused on security monitoring, cloud defense implementation, architecture reviews, pentesting, social engineering campaigns, automation, and tool development The candidate should have a solid understanding of TTPs (Tactics, Techniques, and Procedures) and an innovative, offensive mindset The candidate will be part of the Global Information/ Cyber Security Group and will be operating from Pune This is a critical position where the candidate must provide operational readiness in a high availability environment to tackle any sort of security incidents and ensure business continuity, Job Description Execute long term offensive security engagements and identify security gaps within the infrastructure and services, Perform Recon, Weaponization, Payload Delivery and C&C techniques, Integration, Modification and Automation of Security tools by means of scripting and use of AI, Research the TTPs of various threat actors and create payloads that can emulate those threat actors, Utilizing Threat intelligence to aid red team campaigns, Execute Windows and Unix lateral movement and foothold techniques, Windows AD environment and exploitation techniques, Exploiting Web, Mobile applications, Performing security code reviews, Performing software reverse engineering and malware analysis Train employees on how to avoid falling prey to social engineering tactics and execute social engineering engagements Analyse digital forensics and be a part of incident response during a security incident Review security groups, VPC configurations, etc to strengthen the cloud infrastructure setup Participate in tabletop exercises as a part of purple teaming initiative Presenting the findings to senior management and executives, Remediate the identified security gaps by writing code, writing rules for IDS system, etc KEY COMPETENCIES: Sound Technical skills Leadership Quick decision-making capabilities, Good to assist with remediation strategies for the security findings, Persistence and follow through on tasks Demonstrates ability to follow through on multiple tasks or issues, Assumes responsibility and accountability for successfully completing assignments, Identify obstacles and overcome barriers under guidance, Flexible and adaptable to taking on new responsibilities and learning new technology, Team player who possesses excellent interpersonal skills and communication abilities, with a high degree of self-confidence, REQUIRED EXPERIENCE: 3+ yearsexperience in offensive security testing, Understanding of OWASP Top 10, MITRE attack Frameworks and Cyber Kill Chain, AV /EDR bypass is a desirable skill, Vulnerability Management, Understanding of coding skills in dot net, C, C++, Java, Web technologies and UI scripts (JS, typescript, web assembly, etc ) 2+ years of scripting skills using Go, Python, Perl, etc Understanding of AI in offensive security, 1-2 yearsexperience of writing / modifying exploit codes, 2-3 yearsexperience with commercial and open-source network/web vulnerability scanners, Extensive experience on Red Team Campaigns and Red Team Tools, Extensive experience using tools such Metasploit, C2, DNSCAT2, Caldera, Clockify etc Familiarity with various network architectures, network services, system types, network devices, development platforms, software suites & tools like Wireshark, Experience in Code review, Malware Analysis, Reverse Engineering, Fundamental understanding of computer networks and WiFi technology, Solid understanding of cloud computing, QUALIFICATIONS: - Masters/Bachelors degree in Computer Science or years of related experience+, OSCP, CRTO, CRTP, PenTest+, PNPT, Red Teams Ops, etc Life at PTC is about more than working with todays most cutting-edge technologies to transform the physical world Its about showing up as you are and working alongside some of todays most talented industry leaders to transform the world around you, If you share our passion for problem-solving through innovation, youll likely become just as passionate about the PTC experience as we are Are you ready to explore your next career move with us We respect the privacy rights of individuals and are committed to handling Personal Information responsibly and in accordance with all applicable privacy and data protection laws Review our Privacy Policy here " Show more Show less
Posted 3 days ago
2.0 years
0 Lacs
noida, uttar pradesh, india
On-site
Responsibilities Application Security Testing/Penetration Testing (Web-based, Thick client, web services, Mobile Android & IOS, Network PT) Static Code Analysis/ Secure Code Review Security defect Tracking and working closely with Developers to fix the issue Strong experience with the following tools – Burp Suite, Wireshark, Nmap, Metasploit, Checkmarx/Fortify, and Nessus. Excellent English communication skills (verbal and written) Requirements 2+ years of work experience in VAPT CEH/ OSCP/ OSCE and ISCP certification Why You'll Enjoy Working at Kratikal: Get the fast learning and exciting environment of a startup, combined with the stable work and strong performance of a bigger company. There's lots of room to learn, grow, and share your ideas. We also provide good benefits like health insurance, a gratuity payment, and Employees' Provident Fund (a savings plan for your future). We are an equal opportunity employer, where everyone has a fair chance. About Us: Kratikal Tech Private Limited is a leading B2B cybersecurity firm offering cutting-edge cybersecurity solutions and services such as Network Security Audits, Compliance Implementation, IoT Security, and VAPT. Serving over 150+ enterprise customers and 1825+ SMEs across industries, including E-commerce, Fintech, BFSI, NBFC, Telecom, Consumer Internet, Cloud Service Platforms, Manufacturing, and Healthcare, Kratikal is dedicated to helping organizations combat cybercriminals using advanced, technology-driven cybersecurity solutions. The company also develops in-house cybersecurity products, including AutoSecT , competing with industry giants, alongside TSAT (Threatcop Security Awareness Training), TDMARC (Threatcop DMARC), TLMS (Threatcop Learning Management System), and TPIR (Threatcop Phishing Incident Response). These products have received numerous awards and recognitions for their innovation and effectiveness. Kratikal has been honored as the Top Cyber Security Startup at the 12th Top 100 CISO Awards. With a global reach, Kratikal collaborates with renowned organizations to secure their digital landscapes. For more information, visit our websites at www.kratikal.com and www.threatcop.com.
Posted 3 days ago
5.0 years
0 Lacs
pune, maharashtra, india
Remote
Experience: 5+ years Qualification: MCA/ BE/ BTech / ME/MTech (Preferably in Comp Sc/IT/ Cybersecurity) Technical Skills Required Mandatory: Expertise in web, mobile, and API security with a strong understanding of security-by-design principles. Proficiency in Python, Ruby, PowerShell, Bash, and Perl for security scripting. Solid foundation in network security and secure coding practices. 3+ years of experience in source code review and using static & dynamic analysis tools. Hands-on experience with security tools like Burp Suite, OWASP ZAP, SonarQube, Snyk, Checkmarx, and vulnerability scanners like Nessus, OpenVAS. Familiarity with Metasploit for penetration testing. Experience in security architecture reviews and enforcing secure coding guidelines. Skilled in incident analysis, root cause analysis, and risk assessment. Working knowledge of the STRIDE model and MITRE ATT&CK framework. Good to have: Experience in secure software development in .Net, Node.js, C, C++, and JavaScript. Knowledge of mobile security testing (MobSF) and cloud security. Familiarity with ISO 27001, industry standards, and product security certifications. Experience with threat modeling for VPN, VDI, MFA, and SSO products. Desirable Certifications: Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) Certified information systems security professional (CISSP) GIAC/GWAPT/GWEB Soft Skills Required Analytical thinking Problem solving Strong communication skills (written and verbal) Attention to detail Proactive, self-motivated Flexible/adaptable Role and Responsibilities: Lead and manage the application security program, including tools, assessments, and issue resolution. Integrate security into CI/CD pipelines and collaborate with development teams. Provide security training for developers, project managers, and product managers. Work with cross-functional teams to assess and resolve security issues within release cycles. Support security certifications like ISO27001, SOC2, CC, FIPS for Accops products. Conduct risk assessments, vulnerability analysis, and threat modeling. Review application design and architecture for security and compliance. Founded in 2012, Accops is a leading provider of secure remote access and digital workspace solutions, enabling organizations to maintain control and governance while offering flexibility to work from any device. Accops offers a comprehensive Digital Workspace suite that includes Zero Trust-based Application Access Gateway, End-User Computing (EUC) Virtualization via VDI, robust Identity & Access Management (IAM) solutions such as Multi-Factor Authentication (MFA) and Single Sign-On (SSO), and thin client hardware and software solutions. Accops addresses modern remote work challenges by delivering secure, instant access to business applications. Its solutions protect against network threats and unauthorized access, critical in today’s work-from-anywhere environment. Unlike traditional, multi-product approaches, Accops' pre-integrated suite reduces complexity and deployment time, ensuring faster and more agile implementation. Headquartered in Pune, Accops has become a significant player in the End-User Computing (EUC) virtualization domain, offering a one-stop solution for organizations seeking to deploy secure remote work infrastructures. Its products, including the Nano OS for secure containerization on BYOD devices, and extensive MFA and SSO capabilities, ensure robust data protection and strong identity management. Part of Jio Platforms Ltd, Accops continues to innovate and enhance digital workspace solutions with a focus on security, user experience, and operational efficiency. 𝘈𝘤𝘤𝘰𝘱𝘴 𝘪𝘴 𝘢𝘯 𝘦𝘲𝘶𝘢𝘭 𝘰𝘱𝘱𝘰𝘳𝘵𝘶𝘯𝘪𝘵𝘺 𝘦𝘮𝘱𝘭𝘰𝘺𝘦𝘳 𝘤𝘰𝘮𝘮𝘪𝘵𝘵𝘦𝘥 𝘵𝘰 𝘣𝘶𝘪𝘭𝘥𝘪𝘯𝘨 𝘢 𝘤𝘶𝘭𝘵𝘶𝘳𝘦 𝘸𝘩𝘦𝘳𝘦 𝘢𝘭𝘭 𝘦𝘮𝘱𝘭𝘰𝘺𝘦𝘦𝘴 𝘢𝘳𝘦 𝘷𝘢𝘭𝘶𝘦𝘥, 𝘳𝘦𝘴𝘱𝘦𝘤𝘵𝘦𝘥 𝘢𝘯𝘥 𝘰𝘱𝘪𝘯𝘪𝘰𝘯𝘴 𝘤𝘰𝘶𝘯𝘵. 𝘞𝘦 𝘦𝘯𝘤𝘰𝘶𝘳𝘢𝘨𝘦 𝘢𝘱𝘱𝘭𝘪𝘤𝘢𝘵𝘪𝘰𝘯𝘴 𝘧𝘳𝘰𝘮 𝘢𝘭𝘭 𝘴𝘶𝘪𝘵𝘢𝘣𝘭𝘺 𝘲𝘶𝘢𝘭𝘪𝘧𝘪𝘦𝘥𝘱𝘦𝘳𝘴𝘰𝘯𝘴 𝘪𝘳𝘳𝘦𝘴𝘱𝘦𝘤𝘵𝘪𝘷𝘦 𝘰𝘧, 𝘣𝘶𝘵 𝘯𝘰𝘵 𝘭𝘪𝘮𝘪𝘵𝘦𝘥 𝘵𝘰, 𝘵𝘩𝘦𝘪𝘳 𝘨𝘦𝘯𝘥𝘦𝘳 𝘰𝘳 𝘨𝘦𝘯𝘦𝘵𝘪𝘤 𝘪𝘯𝘧𝘰𝘳𝘮𝘢𝘵𝘪𝘰𝘯, 𝘴𝘦𝘹𝘶𝘢𝘭 𝘰𝘳𝘪𝘦𝘯𝘵𝘢𝘵𝘪𝘰𝘯, 𝘦𝘵𝘩𝘯𝘪𝘤𝘪𝘵, 𝘳𝘦𝘭𝘪𝘨𝘪𝘰𝘯, 𝘴𝘰𝘤𝘪𝘢𝘭 𝘴𝘵𝘢𝘵𝘶𝘴, 𝘮𝘦𝘥𝘪𝘤𝘢𝘭 𝘤𝘢𝘳𝘦 𝘭𝘦𝘢𝘷𝘦 𝘳𝘦𝘲𝘶𝘪𝘳𝘦𝘮𝘦𝘯𝘵𝘴, 𝘱𝘰𝘭𝘪𝘵𝘪𝘤𝘢𝘭 𝘢𝘧𝘧𝘪𝘭𝘪𝘢𝘵𝘪𝘰𝘯, 𝘱𝘦𝘰𝘱𝘭𝘦 𝘸𝘪𝘵𝘩 𝘥𝘪𝘴𝘢𝘣𝘪𝘭𝘪𝘵𝘪𝘦𝘴, 𝘤𝘰𝘭𝘰𝘳, 𝘯𝘢𝘵𝘪𝘰𝘯𝘢𝘭 𝘰𝘳𝘪𝘨𝘪𝘯, 𝘷𝘦𝘵𝘦𝘳𝘢𝘯 𝘴𝘵𝘢𝘵𝘶𝘴, 𝘦𝘵𝘤. 𝘞𝘦 𝘤𝘰𝘯𝘴𝘪𝘥𝘦𝘳 𝘢𝘭𝘭 𝘢𝘱𝘱𝘭𝘪𝘤𝘢𝘵𝘪𝘰𝘯𝘴 𝘣𝘢𝘴𝘦𝘥 𝘰𝘯 𝘮𝘦𝘳𝘪𝘵 𝘢𝘯𝘥 𝘴𝘶𝘪𝘵𝘢𝘣𝘪𝘭𝘪𝘵𝘺 𝘵𝘰 𝘵𝘩𝘦 𝘳𝘰𝘭𝘦.
Posted 3 days ago
0.0 - 7.0 years
0 Lacs
bengaluru, karnataka
On-site
Bengaluru, Karnataka, India Department Engineering Job posted on Sep 12, 2025 Employee Type Full Time Experience range (Years) 5 years - 7 years About Us: MatchMove is a leading embedded finance platform that empowers businesses to embed financial services into their applications. We provide innovative solutions across payments, banking-as-a-service, and spend/send management, enabling our clients to drive growth and enhance customer experiences. Are You The One? As a Security Engineer , you will be the guardian and enabler of secure engineering practices across our entire technology footprint. You'll drive the "shift-left" security philosophy, embedding security early in the development lifecycle while ensuring our payment platform remains resilient against evolving threats. You'll work closely with our Go and PHP engineering teams to build security into our DNA, not bolt it on as an afterthought. You Will Contribute To Establishing and driving a comprehensive shift-left security charter across all engineering teams and cloud infrastructure Maintain , upgrade and enhance automated security testing pipelines that integrate seamlessly with our CI/CD workflows Conducting thorough network security assessments for our cloud-native payment infrastructure Shift left SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) practices for our Go microservices and legacy PHP systems Creating security guardrails that empower developers to build secure-by-default services Protecting billions in financial flows through proactive threat modeling and security architecture reviews Enabling compliance with PCI-DSS, ISO 27001 , and regional financial regulations through security controls Responsibilities Network Security Testing & Assessment Conduct regular penetration testing and vulnerability assessments across our cloud infrastructure Perform network segmentation reviews and validate zero-trust architecture implementations Assess API gateway configurations, WAF rules, and DDoS protection mechanisms Validate mTLS implementations and certificate management across microservices Code Security & Review Practices Implement and maintain SAST tools integrated with our Go and PHP development pipelines Conduct dynamic security testing (DAST) on running services and APIs Perform manual security code reviews for critical payment processing components Develop custom security linters and static analysis rules specific to our tech stack Champion secure coding practices through documentation, training, and tooling Shift-Left Security Leadership Drive security requirements gathering during design phase of new features Implement security gates in CI/CD pipelines without impacting developer velocity Create developer-friendly security tools and libraries (e.g., encryption helpers, secure defaults) Build threat modeling into sprint planning and architecture reviews Establish security champions program across engineering teams Infrastructure & Cloud Security Secure our Kubernetes clusters, container registries, and service mesh configurations Implement cloud security posture management (CSPM) across AWS/GCP/Azure Design and validate secrets management, key rotation, and HSM integration Monitor and respond to security events through SIEM and automated alerting Compliance & Governance Ensure security controls meet PCI-DSS Level 1 requirements for payment processing Support security audits and certification processes Maintain security runbooks and incident response procedures Document security architecture decisions and risk assessments Requirements 5+ years of hands-on security engineering experience in production environments Deep expertise in application security testing (SAST, DAST, IAST) with tools like: SonarQube, Checkmarx, Veracode, or Semgrep for static analysis OWASP ZAP, Burp Suite, or similar for dynamic testing Go-specific tools like gosec, nancy, and staticcheck Proven experience in network security assessment including: Network penetration testing and vulnerability scanning TCP/IP, TLS/SSL, and cryptographic protocol analysis Cloud networking security (VPC, security groups, NACLs) Strong understanding of secure SDLC and DevSecOps practices Hands-on experience with container security (Docker, Kubernetes security policies, admission controllers) Proficiency in at least one programming language (Go, Python, or PHP preferred) Experience with cloud security in AWS, GCP, or Azure environments Knowledge of OWASP Top 10 , CWE, and secure coding standards Understanding of financial services security requirements and compliance frameworks Technical Skills Security Testing Tools : Burp Suite, OWASP ZAP, Metasploit, Nmap, Wireshark SAST/DAST Platforms : SonarQube, Checkmarx, Veracode, Snyk, GitLab Security Cloud Security : AWS Security Hub, GuardDuty, Cloud Trail, IAM, KMS Container Security : Falco, Twistlock, Aqua Security, OPA (Open Policy Agent) Scripting : Python, Go, Bash for security automation Monitoring : ELK Stack, New relic, Wazuh, Prometheus/Grafana for security metrics IaC Security : Terraform security scanning, CloudFormation validation Brownie Points Security certifications (OSCP, CISSP, CEH, AWS Security Specialty) Experience with payment card industry security and PCI-DSS implementation Contributions to security tools or vulnerability research Experience with Go security tooling and secure Go development practices Background in financial services or payment processing security Experience implementing zero-trust architectures Knowledge of GenAI security implications and LLM attack vectors Track record of building security culture in fast-moving engineering organizations MatchMove Culture: We cultivate a dynamic and innovative culture that fuels growth, creativity, and collaboration. Our fast-paced fintech environment thrives on adaptability, agility, and open communication. We focus on employee development, supporting continuous learning and growth through training programs, learning on the job and mentorship. We encourage speaking up, sharing ideas, and taking ownership. Embracing diversity, our team spans across Asia, fostering a rich exchange of perspectives and experiences. Personal Data Protection Act: By submitting your application for this job, you are authorizing MatchMove to: collect and use your personal data, and to disclose such data to any third party with whom MatchMove or any of its related corporation has service arrangements, in each case for all purposes in connection with your job application, and employment with MatchMove; and retain your personal data for one year for consideration of future job opportunities (where applicable).
Posted 3 days ago
0 years
1 - 6 Lacs
ānand
On-site
We are a security-focused organization committed to strengthening digital safety through advanced cybersecurity practices. To enhance our capabilities, we are looking for a VAPT (Vulnerability Assessment & Penetration Testing) Specialist who can identify, exploit and remediate security risks across applications, networks and systems. Key Responsibilities Conduct Vulnerability Assessments on web applications, mobile apps, networks and cloud environments. Perform Penetration Testing (manual + automated) to uncover security loopholes. Use industry standard tools (Burp Suite, Metasploit, Nmap, Nessus, OWASP ZAP, etc.) for testing. Develop detailed reports with findings, risk ratings and remediation steps . Work closely with development and IT teams to suggest secure coding practices and fixes. Stay updated with the latest vulnerabilities, exploits and attack vectors. Ensure compliance with OWASP, ISO 27001, PCI-DSS, NIST, GDPR standards where applicable. Requirements Prove yourself in VAPT / Ethical Hacking / Cybersecurity roles. Strong knowledge of web, mobile, API and network security testing . Familiarity with OWASP Top 10, CVE, CVSS scoring. Proficiency in using VAPT tools (Nessus, Burp Suite, Kali Linux tools, etc.). Strong reporting and documentation skills. Relevant certifications are a plus ( CEH, OSCP, eJPT, CPT, GPEN ). Benefits Opportunity to work on real world penetration testing projects. Continuous learning and professional growth in cybersecurity. A collaborative and security first work culture. Job Types: Full-time, Fresher Pay: ₹12,000.00 - ₹50,000.00 per month Work Location: In person
Posted 4 days ago
2.0 years
0 - 0 Lacs
noida
Remote
Job Title: Cybersecurity Trainer (Part-Time, Remote) Company: Skillwint Location: Remote (Preference for North India-based candidates) Type: Part-Time Experience Required: 2+ Years About Skillwint Skillwint is an innovative edtech company committed to delivering high-quality, industry-relevant training. We empower learners with practical skills that prepare them for real-world challenges. Our mission is to build a future-ready workforce through expert-led instruction and hands-on learning. Role Overview We’re looking for a skilled and enthusiastic Cybersecurity Trainer to join our team on a part-time basis. This is a remote role, but we prefer candidates based in North India . You’ll be responsible for delivering engaging and practical cybersecurity training to learners across various levels. Key Responsibilities Conduct live online training sessions based on scheduled classes Develop and deliver cybersecurity modules, labs, and assessments Simplify complex technical concepts for learners of varying backgrounds Stay updated with current cybersecurity threats, tools, and best practices Provide mentorship and support to learners during and after sessions Collaborate with the curriculum team to enhance course content Requirements Minimum 2 years of hands-on experience in cybersecurity Prior experience in teaching, training, or mentoring (preferred) Strong grasp of topics like network security, ethical hacking, threat analysis, and incident response Familiarity with tools such as Kali Linux, Metasploit, Wireshark, etc. Excellent communication and presentation skills Relevant certifications (CEH, CISSP, CompTIA Security+, etc.) are a plus Availability to conduct sessions based on class schedules What We Offer Flexible remote work setup Competitive compensation for part-time engagement Opportunity to shape future cybersecurity professionals Supportive and collaborative team environment Job Type: Part-time Pay: ₹450.00 - ₹550.00 per hour Expected hours: 20 per week Work Location: Remote
Posted 4 days ago
3.0 - 8.0 years
10 - 15 Lacs
mumbai, thane
Work from Office
We are seeking an experienced and highly skilled Penetration Tester with expertise in mobile application security, specifically for both Android and iOS platforms. As a Senior Penetration Tester, you will be responsible for identifying and exploiting vulnerabilities in mobile applications, networks, APIs, and other critical systems. Your primary responsibility will be performing thorough security assessments, including reverse engineering, malware analysis, and incident forensics, to ensure the security and resilience of mobile applications and systems. The ideal candidate should have hands-on experience with penetration testing tools, mobile application testing, and advanced exploitation techniques. You will also be expected to collaborate with various teams, including Red Teams, to develop strategic security initiatives and offer expert-level recommendations for security improvements. Key Responsibilities: Mobile Application Penetration Testing: Conduct in-depth security assessments of mobile applications for both Android and iOS platforms, identifying vulnerabilities and recommending remediation strategies. Red Team Activities: Participate in Red Team exercises to simulate real-world attacks, uncover hidden threats, and assess the effectiveness of security controls. Security Assessments: Perform penetration testing on applications, networks, mobile platforms, APIs, cloud environments, and critical systems to identify advanced threats and vulnerabilities. Custom Exploit Development: Develop custom exploit code and scripts to demonstrate potential security risks to stakeholders and stakeholders, providing hands-on demonstrations of vulnerabilities. Reverse Engineering & Malware Analysis: Use reverse engineering techniques and tools to analyze complex threats, malware, and incidents, providing detailed reports on findings. Collaboration with Leadership: Collaborate with executive leadership and senior management to develop and execute strategic security initiatives and roadmaps to mitigate security risks. Security Architecture Guidance: Provide expert-level guidance on secure coding practices, cryptography, architecture design principles, and implementation to mitigate risks effectively. Tool Development & Automation: Develop custom penetration testing tools and scripts to automate testing processes and enhance capabilities for thorough assessments. Incident Forensics: Lead efforts to analyze and investigate security incidents, determining the root causes and recommending improvements for better prevention. Required Skills and Qualifications: Mobile Pen Testing Expertise: Strong experience in mobile application penetration testing for both Android and iOS platforms. Penetration Testing Tools: Expertise in tools and frameworks such as Metasploit, Burp Suite, Nessus, NMAP, and custom/open-source tools. Red Teaming & Advanced Exploitation: Advanced proficiency in red teaming, black box testing, and using advanced exploitation techniques to identify vulnerabilities. Malware Analysis & Reverse Engineering: Experience in malware analysis and reverse engineering to assess complex threats and incidents. Cryptography & Secure Coding: In-depth knowledge of cryptography, secure coding practices, and secure architecture design principles. Custom Tools & Scripting: Hands-on experience in developing custom scripts and tools to automate testing processes and enhance the effectiveness of assessments. Penetration Testing Methodologies: Expertise in applying penetration testing methodologies, including both network and application-level security assessments. Certifications (Preferred): o OSCP (Offensive Security Certified Professional) o CRTP (Certified Red Team Professional) o eLearn Security Certified Professional Penetration Tester V2.0 o Any other relevant certifications are a plus. Required Experience: Overall Experience: 12+ years in penetration testing, security assessments, and threat analysis. Relevant Experience: 10 years of hands-on experience specifically in penetration testing for mobile applications (Android & iOS), network security, cloud environments, and APIs. Experience working in Red Team environments is a plus. Mandatory Key Skills android,design principles,black box testing,cryptography,mobile application security,security assessment,mobile penetration testing,ios framework,red,secure coding,testing methodologies,burp suite*,penetration testing*,nmap*,nessus*,metasploit*
Posted 4 days ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |