Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 years
0 Lacs
pune, maharashtra, india
On-site
About the role: We are seeking a hands-on Security & Compliance Lead to own and execute end-to-end security audits and compliance initiatives across applications, infrastructure, and organizational processes. This role ensures systems, applications, and business operations are secure, compliant, and aligned with both internal policies and regulatory requirements (e.g., RBI, ISO 27001, SOC 2 Type II). Responsibilities: Conduct technical assessments (e.g., VRA, security checklists) required by new BFSI clients. Analyse and complete detailed cloud infrastructure security and compliance questionnaires. Assist in mapping customer security and regulatory requirements (e.g., ISO 27001, RBI, SOC 2 type II) to internal controls. Maintain documentation and templates for commonly requested BFSI assessment artifacts. Manage and complete security questionnaires from clients, vendors, and partners. Evaluate vendor security and compliance by reviewing their responses and supporting documentation. Identify security risks within the company’s IT infrastructure, applications and services. Ensure compliance with security standards such as ISO 27001, GDPR, SOC 2, or any other relevant frameworks. Work with internal teams to maintain compliance with legal and regulatory requirements. Collaborate with the IT security, legal, and procurement teams to address concerns identified in the security assessments. Develop and maintain internal security policies and procedures related to vendor assessments and third-party risk management. Prepare detailed reports summarizing findings from security assessments and risk analysis. Provide recommendations to improve security measures and compliance. Educate internal staff and external partners about security best practices and compliance requirements Support pre-sales and onboarding teams with timely delivery of assessment documentation. Stay updated with AWS best practices, shared responsibility model, and emerging cloud security trends. Good to Have: Bachelor’s degree in computer science, Information Security, Data Science, or a related field 5+ years of experience working with Audit/compliance, application security assessments, AWS cloud security preferably BFSI domain 2+ yrs. of experience on AWS cloud security and risk assessments. Strong exposure to AWS cloud infrastructure (Guard Duty, security hub, inspector, Firewall, IAM, EC2, VPC, S3, Security Groups, etc.). Familiarity with secure coding practices, vulnerability management, and threat modelling. Experience with VRA templates, cloud security checklists, and assessment responses for enterprise or regulated clients. Familiarity with information security standards such as ISO 27001, SOC 2, RBI cybersecurity framework. Strong understanding of data protection, encryptions methodologies Ability to interpret and explain security configurations and policies in layman's terms. Experience with security controls, vulnerability scanning tools (e.g., Nessus, wire shark), or SIEM. Exposure with security tools such as network firewall, IPS/IDS is plus
Posted 2 weeks ago
2.0 years
0 - 0 Lacs
kaithal, haryana
On-site
Assistant/Associate Professor – Computer Science (Cyber Security) Department: Computer Science & Engineering Location: NIILM University, Kaithal, Haryana Job Type: Full-time | Regular Joining Date: Immediate ________________________________________ Minimum Qualifications & Experience · Master’s Degree (M.Tech/M.S) in Computer Science, Information Security, Cyber Security, or related field from a recognized university. · Ph.D. in Computer Science/Cyber Security preferred. · Minimum 2 years of teaching, research, or relevant industry experience in cyber security or allied domains. · Strong academic record; publications in peer-reviewed journals will be an added advantage. · Candidates should meet UGC/AICTE norms as applicable. ________________________________________ Key Responsibilities · Teach undergraduate and postgraduate courses in Computer Science with specialization in Cyber Security. · Develop, update, and deliver curriculum aligned with the latest trends in Cyber Security, AI, and Cloud Security. · Guide students in academic projects, research, and internships related to Cyber Security. · Engage in independent and collaborative research; publish in reputed journals and conferences. · Conduct practical sessions in security labs, focusing on Ethical Hacking, Network Security, Cryptography, and Incident Response. · Mentor students for academic and professional growth in security careers. · Organize workshops, seminars, hackathons, and guest lectures on Cyber Security. · Participate in departmental and university-level committees and academic initiatives. ________________________________________ Desirable Qualifications & Skills · Expertise in Cyber Security domains: Network Security, Ethical Hacking, Digital Forensics, Malware Analysis, Cloud & IoT Security. · Proficiency in tools and frameworks such as Kali Linux, Wireshark, Metasploit, Burp Suite, Nessus, and SIEM tools. · Knowledge of programming languages (Python, C/C++, Java) and scripting for security automation. · Familiarity with security certifications (CEH, CISSP, OSCP, etc.) is an advantage. · Excellent communication, analytical, and problem-solving skills. · Ability to collaborate on research and consultancy projects in Cyber Security. ________________________________________ Pay Scale ₹30,000 – ₹70,000 per month (commensurate with qualifications and experience). ________________________________________ Application Process Interested candidates should submit the following to hr@niilmuniversity.ac.in with the subject line: Application – Assistant/Associate Professor (Computer Science – Cyber Security) Updated CV Cover Letter mentioning the position applied for Scanned copies of academic and experience certificates Job Type: Full-time Pay: ₹30,217.45 - ₹70,036.40 per month Benefits: Paid time off Provident Fund Work Location: In person
Posted 2 weeks ago
0 years
0 Lacs
hyderabad, telangana, india
On-site
Description What We Are Looking For: Meltwater’s collaborative Security Team needs a passionate Security Engineer to continue to advance Meltwater’s security. Working with a group of fun loving people who are genuinely excited and passionate about security, there will be more laughs than facepalms! If you believe that improving security is about constantly moving technology forward to be more secure, and shifting security tools and checks earlier in the development lifecycle, then you’ll feel at home on Meltwater’s Security Team! At Meltwater we want to ensure that we can have autonomous, empowered and highly efficient teams. Our Security Team charges head on into the challenge of ensuring our teams can maintain their autonomy without compromising the security of our systems, services and data. Through enablement and collaboration with teams, Security Engineers ensure that our development and infrastructure practices have security defined, integrated and implemented in a common-sense manner that reduces risk for our business. Security Engineers define best practices, build tools, implement security checks and controls together with the broader Engineering and IT teams to ensure that our employees and our customers' data stays safe. As part of this, we leverage AWS as a key component of our cloud infrastructure. Security Engineers play a critical role in securing and optimizing AWS environments by implementing best practices, automating security controls, and collaborating with teams to ensure scalability, resilience, and compliance with industry standards. What You’ll do: In this role, you will be designing and implementing security functions ranging from checks on IaC (Infrastructure as Code) to SAST/DAST scanners in our CI/CD pipelines. You will be collaborating closely with almost every part of the Meltwater organization and help create security impact across all teams with strong support from the business. Collaborate closely with teams to help identify and implement frictionless security controls throughout the software development lifecycle Propose and implement solutions to enhance the overall cloud infrastructure and toolset. Perform ongoing security testing, including static (SAST), dynamic (DAST), and penetration testing, along with code reviews, vulnerability assessments, and regular security audits to identify risks, improve security, and develop mitigation strategies. Educate and share knowledge around secure coding practices Identify applicable industry best practices and consult with development teams on methods to continuously improve the risk posture. Build applications that improve our security posture and monitoring/alerting capabilities Implement and manage security technologies including firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint protection, and security information and event management (SIEM) tools. Conduct vulnerability assessments, penetration testing, and regular security audits to identify risks and develop mitigation strategies. Monitor and respond to security incidents and alerts, performing root cause analysis and incident handling. Participate in incident response and disaster recovery planning, testing, and documentation. Manage identity and access management (IAM) solutions to enforce least privilege and role-based access controls (RBAC). Assist in the development of automated security workflows using scripting (Python, Bash, or similar). What You'll Bring: Strong collaboration skills with experience working cross functionally with a diverse group of stakeholders Strong communication skills with the ability to provide technical guidance to both technical and non-technical audiences Experience in implementing security controls early in the software development life cycle Knowledge of industry accepted security best practices/standards/policies such as NIST, OWASP, CIS, MITRE&ATT@CK Software developer experience in one or more of the following languages: JavaScript, Java, Kotlin or Python Experience in at least one public cloud provider, preferably AWS, with experience in security, infrastructure, and automation. Hands-on experience with SIEM platforms such as Splunk, QRadar, or similar. Proficiency in Linux operating system, network security, including firewalls, VPNs, IDS/IPS, and monitoring tools. Experience with vulnerability management tools (Snyk, Nessus, Dependabot) and penetration testing tools (Kali Linux, Metasploit). Experience in forensics and malware analysis. Self-motivated learner that continuously wants to share knowledge to improve others The ideal candidate is someone from a Software Development background with a passion for security. If you’re someone who understands the value of introducing security early in the software development lifecycle, and want to do so by enabling and empowering teams by building tools they WANT to use, we want to hear from you! What We Offer: Enjoy flexible paid time off options for enhanced work-life balance. Comprehensive health insurance tailored for you. Employee assistance programs cover mental health, legal, financial, wellness, and behaviour areas to ensure your overall well-being. Complimentary CalmApp subscription for you and your loved ones, because mental wellness matters. Energetic work environment with a hybrid work style, providing the balance you need. Benefit from our family leave program, which grows with your tenure at Meltwater. Thrive within our inclusive community and seize ongoing professional development opportunities to elevate your career. Where You'll Work: Hitec city, Hyderabad. When You'll Join: As per the offer letter Our Story At Meltwater, we believe that when you have the right people in the right environment, great things happen. Our best-in-class technology empowers our 27,000 customers around the world to make better business decisions through data. But we can’t do that without our global team of developers, innovators, problem-solvers, and high-performers who embrace challenges and find new solutions for our customers. Our award-winning global culture drives everything we do and creates an environment where our employees can make an impact, learn every day, feel a sense of belonging, and celebrate each other’s successes along the way. We are innovators at the core who see the potential in people, ideas and technologies. Together, we challenge ourselves to go big, be bold, and build best-in-class solutions for our customers. We’re proud of our diverse team of 2,200+ employees in 50 locations across 25 countries around the world. No matter where you are, you’ll work with people who care about your success and get the support you need to unlock new heights in your career. We are Meltwater. Inspired by innovation, powered by people. Equal Employment Opportunity Statement Meltwater is an Equal Opportunity Employer and Prohibits Discrimination and Harassment of Any Kind: At Meltwater, we are dedicated to fostering an inclusive and diverse workplace where every employee feels valued, respected, and empowered. We are committed to the principle of equal employment opportunity and strive to provide a work environment that is free from discrimination and harassment. All employment decisions at Meltwater are made based on business needs, job requirements, and individual qualifications, without regard to race, color, religion or belief, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, marital status, veteran status, or any other status protected by the applicable laws and regulations. Meltwater does not tolerate discrimination or harassment of any kind, and we actively promote a culture of respect, fairness, and inclusivity. We encourage applicants of all backgrounds, experiences, and abilities to apply and join us in our mission to drive innovation and make a positive impact in the world.
Posted 2 weeks ago
5.0 years
0 Lacs
noida, uttar pradesh, india
On-site
Role Overview We are seeking a skilled and driven Sr. Security Engineer with a strong background in penetration testing (web, mobile, and network) and an understanding of security compliance standards such as SOC 2, ISO 27001, and GDPR. The ideal candidate will have hands-on experience identifying and exploiting vulnerabilities, preparing technical and compliance reports, and guiding clients or internal teams on remediation and governance. Key Responsibilities Conduct penetration testing of web applications, mobile apps (iOS/Android), and internal/external networks. Perform vulnerability assessments and risk evaluations across client environments. Create detailed technical and executive reports with prioritized remediation strategies. Assist in SOC 2 readiness assessments, ISO 27001 implementation, and GDPR compliance checks. Collaborate with cross-functional teams for remedial activities to improve the security posture. Stay updated with the latest exploits, tools, and compliance updates. Required Qualifications 5+ years of experience in cybersecurity with a focus on penetration testing and compliance. Proficiency in tools like Burp Suite, Nmap, Metasploit, Nessus, MobSF, and manual testing techniques. Strong knowledge of OWASP Top 10, secure coding practices, network protocols, and common attack vectors. Understanding of SOC 2, ISO 27001, GDPR, and associated implementation or audit processes. Certifications (Preferred) CEH (Certified Ethical Hacker) ISO/IEC 27001 Lead Auditor / Lead Implementer Other relevant certs: e.g., CompTIA Security+, eWPT, eCPPT, GPEN Nice-to-Have Skills Familiarity with DevSecOps pipelines, source code reviews, or CI/CD security integration. Client-facing consulting experience or report presentation skills. Cyber Security vibe is a must. (ref:hirist.tech)
Posted 2 weeks ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
As a member of the Vulnerability Management task force, you will be responsible for ensuring the regular patching and security of Linux systems. This includes performing operating system and third-party application patching on Linux servers and end-user devices. You will collaborate with cross-functional teams to identify dependencies and schedule maintenance windows for OS and application patching. Additionally, you will be expected to generate and maintain monthly patch baseline and compliance reports. Your role will also involve participating in Root Cause Analysis (RCA) and Problem Management discussions when necessary, ensuring compliance with organizational policies, processes, and procedures, as well as supporting and executing projects related to vulnerability management and patching. You should be able to independently manage assigned tasks and projects with minimal supervision. In terms of technical experience, you should have strong administration, management, and troubleshooting expertise in Linux operating systems such as RHEL, Ubuntu, and CentOS. Hands-on experience with Linux patch management tools like Spacewalk, Red Hat Satellite, Ansible, or SUSE Manager is essential. You should also possess proven knowledge in vulnerability remediation, security hardening, and compliance enforcement, along with experience using vulnerability scanning tools like Tenable Nessus, Qualys, or OpenVAS. Proficiency in using package management tools such as YUM, DNF, APT, and Zypper is required, as well as familiarity with automation tools like Ansible, Chef, or Puppet for streamlined patch deployment. Exposure to containerized environments and best security practices for Docker and Kubernetes is desirable, along with knowledge of virtualization and cloud platforms including AWS, Azure, or Google Cloud Platform (GCP). In terms of professional attributes, you should have strong communication skills to convey technical issues clearly to business stakeholders. Effective presentation skills for delivering vulnerability and patching status updates are also important. You should have excellent multitasking ability, with experience managing large-scale and concurrent patching projects. Overall, this role requires expertise in Linux, Patching, and Vulnerability management, specifically with tools like Tenable, Nessus, Qualys, or OpenVAS.,
Posted 2 weeks ago
7.0 - 12.0 years
10 - 12 Lacs
kanpur
Work from Office
Lead Vulnerability Assessments:-Oversee and guide comprehensive vulnerability assessments on internal and external systems, networks, and applications -Review, refine, and approve testing methodologies and tool usage for consistency and accuracy Direct Penetration Testing Efforts:-Plan, coordinate, and execute complex penetration tests across IT infrastructure, applications, mobile platforms, and network components -Lead simulation of advanced cyber-attacks to validate security controls and identify exploitable weaknesses Analyze, Review & Report:-Ensure thorough analysis of findings, highlighting business risk impact alongside technical details -Deliver executive-level briefings as well as detailed technical reports with prioritized, actionable recommendations Team Leadership & Collaboration:-Mentor junior engineers, provide training, and foster a knowledge-sharing culture within the security team -Collaborate with development, operations, and compliance teams to drive remediation efforts and monitor progress Process & Documentation Management-Maintain and improve VAPT documentation, methodologies, and reporting templates -Introduce process improvements to increase efficiency, accuracy, and coverage in testing Continuous Security Advancement-Stay ahead of emerging threats, advanced exploitation techniques, and evolving security tools -Evaluate and integrate new tools and frameworks into the VAPT process for greater effectiveness Educational Background:-Bachelor s or Master s degree in Computer Science, Information Technology, Cybersecurity, or related field Technical Skills:-Strong command of network protocols, operating systems, and web/mobile technologies -Proficiency in leading security testing tools: Nessus, Nmap, Burp Suite, Metasploit, and others -Solid knowledge of IT security standards/frameworks (OWASP, NIST, SANS Top 25) and advanced exploitation techniques -Hands-on experience with manual penetration testing, complex scenario simulation, and advanced vulnerability exploitation Experience: 7+ years of relevant experience in VAPT, including at least 2 years in a leadership or senior technical role
Posted 2 weeks ago
5.0 - 9.0 years
12 - 16 Lacs
chennai
Work from Office
Hitachi Energy is looking for Senior Cybersecurity Engineer to join our dynamic team and embark on a rewarding career journey Analyzing customer needs to determine appropriate solutions for complex technical issues Creating technical diagrams, flowcharts, formulas, and other written documentation to support projects Providing guidance to junior engineers on projects within their areas of expertise Conducting research on new technologies and products in order to recommend improvements to current processes Developing designs for new products or systems based on customer specifications Researching existing technologies to determine how they could be applied in new ways to solve problems Reviewing existing products or concepts to ensure compliance with industry standards, regulations, and company policies Preparing proposals for new projects, identifying potential problems, and proposing solutions Estimating costs and scheduling requirements for projects and evaluating results
Posted 2 weeks ago
3.0 - 6.0 years
3 - 7 Lacs
gurugram
Work from Office
About The Role This role involves the development and application of engineering practice and knowledge in designing, managing and improving the processes for Industrial operations, including procurement, supply chain and facilities engineering and maintenance of the facilities. Project and change management of industrial transformations are also included in this role. About The Role - Grade Specific Focus on Industrial Operations Engineering. Develops competency in own area of expertise. Shares expertise and provides guidance and support to others. Interprets clients needs. Completes own role independently or with minimum supervision. Identifies problems and relevant issues in straight forward situations and generates solutions. Contributes in teamwork and interacts with customers.
Posted 2 weeks ago
4.0 - 5.0 years
0 Lacs
thane, maharashtra, india
On-site
Job description: Job Summary: We are looking for a highly skilled and experienced Team Lead - VAPT to spearhead offensive security engagements for our Technical Cyber Security services division. With at least 4-5 years in the industry, the ideal candidate will bring deep technical expertise, strong leadership, and a passion for proactive security testing. You will lead end-to-end VAPT projects, mentor junior analysts, engage directly with clients, and contribute to enhancing our offensive security capabilities in a dynamic threat landscape. Key Responsibilities: Lead VAPT projects across multiple domains, including network, application, cloud, mobile, API, and wireless security testing. Conduct manual and automated penetration testing, simulate real-world attacks, and identify exploitable vulnerabilities. Develop and maintain custom scripts, tools, and exploits to support advanced testing scenarios. Prepare and deliver detailed technical reports and executive summaries with risk ratings, evidence, and remediation guidance. Collaborate with blue teams and SOC for red/purple teaming and threat emulation exercises. Engage in client communication, providing technical guidance and post-assessment support. Ensure quality assurance across all deliverables and maintain compliance with cybersecurity standards and frameworks. Continuously research new vulnerabilities, attack methods, and testing tools to improve service offerings. Mentor junior team members and contribute to the development of internal methodologies and playbooks. Required Qualifications: Bachelor’s degree in Computer Science, Information Security, Cybersecurity, or a related field (or equivalent hands-on experience). Minimum 4-5 years of hands-on experience in VAPT, offensive security, or ethical hacking. In-depth knowledge of OWASP Top 10, MITRE ATT&CK, NIST, Risk Based Vulnerability Management and common vulnerability scoring systems (CVSS). Proficiency with offensive security and testing tools (e.g. Burp Suite, Nmap, Metasploit, Nessus, Nikto, Kali Linux,etc.) Strong understanding of network protocols, system internals, web/app architectures, and cloud platforms (AWS, Azure, GCP). Scripting experience in Python, Bash, or PowerShell for automation and custom exploits. Excellent communication skills for reporting, documentation, and client interaction. Preferred Certifications (One or More): CEH - Mandatory OSCP (Offensive Security Certified Professional) – Strongly preferred GPEN, CRT, eCPPT, OSCE, or other offensive security credentials Cloud security certifications (e.g., AWS Security Specialty, AZ-500) are a plus Desirable Skills: Experience in Red Team, Purple Team, or Threat Emulation engagements Exposure to DevSecOps, CI/CD pipelines, and integrating security in SDLC\ Familiarity with compliance-driven testing (e.g., PCI DSS, ISO 27001, SOC 2, HIPAA) Client-facing experience in a consulting or MSSP environment Experience: VAPT: 5 years (Preferred)
Posted 2 weeks ago
8.0 years
0 Lacs
hyderabad, telangana, india
On-site
We use cookies to offer you the best possible website experience. Your cookie preferences will be stored in your browser’s local storage. This includes cookies necessary for the website's operation. Additionally, you can freely decide and change any time whether you accept cookies or choose to opt out of cookies to improve website's performance, as well as cookies used to display content tailored to your interests. Your experience of the site and the services we are able to offer may be impacted if you do not accept all cookies. Press Tab to Move to Skip to Content Link Skip to main content Home Page Home Page Life At YASH Core Values Careers Business Consulting Jobs Digital Jobs ERP IT Infrastructure Jobs Sales & Marketing Jobs Software Development Jobs Solution Architects Jobs Join Our Talent Community Social Media LinkedIn Twitter Instagram Facebook Search by Keyword Search by Location Home Page Home Page Life At YASH Core Values Careers Business Consulting Jobs Digital Jobs ERP IT Infrastructure Jobs Sales & Marketing Jobs Software Development Jobs Solution Architects Jobs Join Our Talent Community Social Media LinkedIn Twitter Instagram Facebook View Profile Employee Login Search by Keyword Search by Location Show More Options Loading... Requisition ID All Skills All Select How Often (in Days) To Receive An Alert: Create Alert Select How Often (in Days) To Receive An Alert: Apply now » Apply Now Start apply with LinkedIn Please wait... Associate Consultant - Vulnerability Assessments Job Date: Sep 1, 2025 Job Requisition Id: 62442 Location: Hyderabad, TG, IN Pune, IN Indore, MP, IN, 452001 YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation. At YASH, we’re a cluster of the brightest stars working with cutting-edge technologies. Our purpose is anchored in a single truth – bringing real positive changes in an increasingly virtual world and it drives us beyond generational gaps and disruptions of the future. We are looking forward to hire Vulnerability Assessments Professionals in the following areas : Preferred Qualifications The team members shall prepare the assessment plans, test cases, and test scenarios to perform the penetration testing. Experience in web application, infrastructure and network Vulnerability Assessment & Penetration Testing. Experience in Vulnerability Assessment and Penetration testing using industry standard tools such as Vulnerability Scanners for e.g.: Qualys, Nessus, Nexpose, Acunetix, Metasploit, Burp Suite Pro, Netsparker etc. Experience in using security frameworks such as Metasploit, Kali Linux, OSSTM etc. Experience and knowledge of Penetration testing of servers, and any assets (OS, infra & network). Experience and knowledge of Web Application Security standards such as OWASP/SANS etc. The Security Test Engineer should have the ability to stay organized and possess excellent communication skills. Experienced in preparing and presenting detailed penetration testing report. The security test engineer will be part of the audit team that shall conduct security audits for the clients to identify the gaps in terms of web security. Skills Conducting vulnerability scans and recognizing vulnerabilities in security systems assessing the robustness of security systems and designs Network analysis tools to identify vulnerabilities. Maintain awareness of vulnerability information, complexity to exploit, and exploit availability or feasibility to create an exploit. Identify and recommend appropriate measures to manage and remediate vulnerabilities with the focus on reducing potential impacts on information resources to a level acceptable. Creation of vulnerability metric and remediation-related dashboards and reports. Understands and advises on enterprise policies and technical standards with specific regard to vulnerability assessment and penetration testing. Liaise with stakeholders to understand, prioritize, and coordinate vulnerability remediation activities. Maintain awareness of publicly disclosed vulnerabilities (CVEs) and potential vulnerabilities (rumors, blogs, partial public analysis). Ability to fully understand business requirements and work with business partners to define appropriate solutions, meeting both security mandates and business needs. Engage cross-divisional teams and oversee the implementation of security recommendations by leveraging appropriate communication methods, tracking remediation of identified risks, mitigation strategies, plan activities and dependencies. Working Knowledge Cybersecurity principles Security source code review vulnerabilities Cyber threats and vulnerabilities System and application security threats and vulnerabilities General attack stages (e.g.: foot printing and scanning, enumeration, gaining access) Escalation or privileges, maintaining access, network exploitation, covering tracks) Ethical hacking principles and techniques; penetration testing principles, tools, and techniques. Use of penetration testing tools and techniques and social engineering techniques Ability to effectively prioritize and execute tasks in a high-pressure environment. Must be adaptable to changes in the work environment, comfortable with multiple competing demands and able to deal with frequent change, delays or unexpected events in a calm and logical manner. Minimum Qualifications Bachelor's degree or equivalent practical experience. 8 years of relevant work experience within areas of penetration testing Previous experience with systems administration and/or programming. Mandatory certifications:Offensive Security Certified Professional (OSCP) At YASH, you are empowered to create a career that will take you to where you want to go while working in an inclusive team environment. We leverage career-oriented skilling models and optimize our collective intelligence aided with technology for continuous learning, unlearning, and relearning at a rapid pace and scale. Our Hyperlearning workplace is grounded upon four principles Flexible work arrangements, Free spirit, and emotional positivity Agile self-determination, trust, transparency, and open collaboration All Support needed for the realization of business goals, Stable employment with a great atmosphere and ethical corporate culture Apply now » Apply Now Start apply with LinkedIn Please wait... Find Similar Jobs: Careers Home View All Jobs Top Jobs Quick Links Blogs Events Webinars Media Contact Contact Us Copyright © 2020. YASH Technologies. All Rights Reserved.
Posted 2 weeks ago
10.0 - 12.0 years
0 Lacs
navi mumbai, maharashtra, india
On-site
About the role: We are seeking an experienced and innovative Director-IT Infra to lead our IT Infrastructure and IT Security teams. The ideal candidate will drive the management and strategic oversight of on premises datacenter assets, end user systems and on-cloud SaaS / PaaS / IaaS services with a focus on Microsoft and Open-Source technologies, while leading initiatives to transition workloads from current on-premises to hybrid cloud ecosystem. Leadership and Management: Work closely with CTO to define a strategic direction for organization IT ecosystem and align them to business objectives; digital transformation initiatives and “Right-Fit” technology. Formulate, strategize and implement IT and InfoSec policies aligning them to industry standards; best practices / guidelines and organization goals. Managing vendor / service provider relationships and run periodic cost optimization through vendor / tool consolidation and timely AMC negotiations / renewals. Develop and implement change management processes to ensure smooth transition and adoption of new technologies. Communicate changes to all stakeholders and provide necessary support during change. Lead the IT Infra team and IT InfoSec teams. Foster an innovation driven, collaborative, ever learning and high-performance team environment. IT Infrastructure Management: Lead initiatives to migrate on-premises workloads to Microsoft Azure and integrate Open Source tools like Docker and Kubernetes. Developing and executing strategies for the migration of data and applications to cloud-based infrastructure. Manage on-premises servers using Microsoft Windows Server and Linux Ubuntu running on virtualization platforms like VMware ESXi and Linux KVM. Ensure the reliability, availability. performance, security and high uptime of all IT assets, including hardware like Dell servers; HPE servers; SAN Data Storages; WAN / LAN Devices; EPABX systems etc. Develop and implement maintenance schedules using tools like Microsoft System Center. Setting up, managing and monitoring organization's datacenter operations. Oversee network architecture, connectivity uptime, and network performance using Cisco routers, switches, and other communication devices. Setup IT Infrastructure Monitoring Tools to identify and resolve IT infrastructure problems before they can adversely affect critical business processes. Report to management team insight into the status of physical, virtual, and cloud systems and help ensure availability and performance. Security and Compliance: Implement and manage security measures, including Next-Generation Firewalls; IDS / IPS; VPNs; Next-Generation Endpoint Security; DLP; IRM / EDRM; Web Proxy etc. Conduct regular security assessments at server level and network level using tools like Nessus, Nmap etc. to assess security implementation and mitigate vulnerabilities. Ensure compliance with security policies and procedures using SIEM solutions like Splunk and ensure zero data theft and data leakage. Monitor and respond to security incidents with solutions like Microsoft Defender for Cloud and Open-Source tools such as Wazuh, OSSEC etc. Ensure compliance with industry regulations and standards, maintaining certifications such as ISO 9001, ISO 27001, PCI DSS. Implement disaster recovery and business continuity plans based on best practices and industry standards using solutions such as Commvault, Borg, Veeam etc. Innovation and Improvement: Identify opportunities for technological improvements and innovation with a focus on Microsoft / Open-Source solutions and build blueprints to transition from older technology leading to reduce TCO and enhanced systems experience. Promote the adoption of emerging technologies and open-source tools to enhance business / IT operations. Setup key IT processes and capture data touchpoints to evaluate IT Teams performance and OKRs. Build a culture of continuous improvement and service excellence. Provide leadership to drive Infrastructure and Network Security maturity improvements across the organization, in line with the changing Threat Landscape, Regulatory and Compliance requirements etc. Rewire the current processes, practices and disciplines for IT Service Management using ITIL principles aligning IT services with the needs of the business Experience: At least 10-12 years of relevant experience in IT infrastructure management and information security. Must have proven experience leading and managing complex hybrid IT teams. Must have proven experience in leading initiatives to transition workloads from current on-premises to hybrid cloud ecosystem. Must have proven experience in implementing and managing IT Security, Business Continuity Plans, Disaster Recovery Frameworks and Security Audits. Must have technical proficiency and hands-on experience with Microsoft technologies (e.g., Windows Server, Azure Services, Microsoft 365, SharePoint etc.) and Open-Source technologies (e.g., Ubuntu Linux, KVM, Docker, Kubernetes etc.). Experience in managing datacenter operations, network systems and virtualization environments. Experience with IT process optimization and implementing change management processes. Any relevant industry certifications like CISSP, CISM, Azure Solutions Architect Expert, Red Hat Certified, Cisco Certified Network Professional etc. will be added advantage. Experience working in large publication company, management consulting company or Tier 1 startups will be added advantage.
Posted 2 weeks ago
8.0 years
0 Lacs
hyderabad, telangana, india
On-site
YASH Technologies is a leading technology integrator specializing in helping clients reimagine operating models, enhance competitiveness, optimize costs, foster exceptional stakeholder experiences, and drive business transformation. At YASH, we’re a cluster of the brightest stars working with cutting-edge technologies. Our purpose is anchored in a single truth – bringing real positive changes in an increasingly virtual world and it drives us beyond generational gaps and disruptions of the future. We are looking forward to hire Vulnerability Assessments Professionals in the following areas : Preferred Qualifications The team members shall prepare the assessment plans, test cases, and test scenarios to perform the penetration testing. Experience in web application, infrastructure and network Vulnerability Assessment & Penetration Testing. Experience in Vulnerability Assessment and Penetration testing using industry standard tools such as Vulnerability Scanners for e.g.: Qualys, Nessus, Nexpose, Acunetix, Metasploit, Burp Suite Pro, Netsparker etc. Experience in using security frameworks such as Metasploit, Kali Linux, OSSTM etc. Experience and knowledge of Penetration testing of servers, and any assets (OS, infra & network). Experience and knowledge of Web Application Security standards such as OWASP/SANS etc. The Security Test Engineer should have the ability to stay organized and possess excellent communication skills. Experienced in preparing and presenting detailed penetration testing report. The security test engineer will be part of the audit team that shall conduct security audits for the clients to identify the gaps in terms of web security. Skills Conducting vulnerability scans and recognizing vulnerabilities in security systems assessing the robustness of security systems and designs Network analysis tools to identify vulnerabilities. Maintain awareness of vulnerability information, complexity to exploit, and exploit availability or feasibility to create an exploit. Identify and recommend appropriate measures to manage and remediate vulnerabilities with the focus on reducing potential impacts on information resources to a level acceptable. Creation of vulnerability metric and remediation-related dashboards and reports. Understands and advises on enterprise policies and technical standards with specific regard to vulnerability assessment and penetration testing. Liaise with stakeholders to understand, prioritize, and coordinate vulnerability remediation activities. Maintain awareness of publicly disclosed vulnerabilities (CVEs) and potential vulnerabilities (rumors, blogs, partial public analysis). Ability to fully understand business requirements and work with business partners to define appropriate solutions, meeting both security mandates and business needs. Engage cross-divisional teams and oversee the implementation of security recommendations by leveraging appropriate communication methods, tracking remediation of identified risks, mitigation strategies, plan activities and dependencies. Working Knowledge Cybersecurity principles Security source code review vulnerabilities Cyber threats and vulnerabilities System and application security threats and vulnerabilities General attack stages (e.g.: foot printing and scanning, enumeration, gaining access) Escalation or privileges, maintaining access, network exploitation, covering tracks) Ethical hacking principles and techniques; penetration testing principles, tools, and techniques. Use of penetration testing tools and techniques and social engineering techniques Ability to effectively prioritize and execute tasks in a high-pressure environment. Must be adaptable to changes in the work environment, comfortable with multiple competing demands and able to deal with frequent change, delays or unexpected events in a calm and logical manner. Minimum Qualifications Bachelor's degree or equivalent practical experience. 8 years of relevant work experience within areas of penetration testing Previous experience with systems administration and/or programming. Mandatory certifications:Offensive Security Certified Professional (OSCP) At YASH, you are empowered to create a career that will take you to where you want to go while working in an inclusive team environment. We leverage career-oriented skilling models and optimize our collective intelligence aided with technology for continuous learning, unlearning, and relearning at a rapid pace and scale. Our Hyperlearning workplace is grounded upon four principles Flexible work arrangements, Free spirit, and emotional positivity Agile self-determination, trust, transparency, and open collaboration All Support needed for the realization of business goals, Stable employment with a great atmosphere and ethical corporate culture
Posted 2 weeks ago
3.0 years
0 Lacs
chennai, tamil nadu, india
On-site
Job Description This role will be focused on operating and improving Ford Motor Company Enterprise Vulnerability Management (EVM) efforts. Drive security vulnerability identification and assessment/rating, remediation requirements, secure computing practices, and application security (DAST, SAST, SCM). Daily monitoring of multiple information sources to process threat intelligence data regarding the release of security patches and mitigations of exploitable traits in software. Decision-making capability involving knowledge of software used in the Ford environment (in various active states), familiarity with exploitable traits and personal judgment in order to provide effective patch and mitigation evaluation. Provide cyber security consultation and direction to IT and business organizations. Coordinate cyber security requirements across business organizations and recognize common needs with potential for strategic solutions. Develop and keep up to date runbooks, Standard Operating Procedures, and collaboration tools. Develop and track metrics to measure and report performance. Responsibilities Required Skills The ability to collaborate with a globally located and diverse team of cybersecurity professionals working across organizational boundaries to protect Ford Motor Company. Strong written and verbal communication and organizational skills. Ability to work independently, follow a disciplined approach, and have an analytical mindset. Ability to work well in a small team and be flexible enough to work on any aspect of the team's needs. General understanding and awareness of vulnerability management processes, incident management procedures, and common exploit methods. Desired Skills General understanding of emerging technology areas a plus (cloud, social media, mobility, big data, connected vehicle) and their implications in regard to cybersecurity. Familiarity with SACM, eAssets, GRC, and EAMS and other Ford IT Asset management systems. Familiarity with analytics tools such as Qlik Sense/Dashboards is very desired. Knowledge of vulnerability scanning and penetration testing tools including QVM, Nessus, Qualys, Burp Suite and others. Programming skills including Python focused on scripting and automation. Requirement to work in shifts: 2-11:30 PM Qualifications Basic Qualifications: Bachelor’s Degree (Computer Science or related) 3+ Years of relevant experience in Cyber Vulnerability Management roles Industry Certifications: Good to have relevant certifications like CEH, CompTIA Pentest+, CISSP, GIAC GEVA, GCIH, OSCP
Posted 2 weeks ago
4.0 years
0 Lacs
hyderabad, telangana, india
On-site
Responsibilities As a member of the incident/Workorder/Change handling team , you will have the following accountabilities: Will be working as an SME for Zscaler Support in Operations for ZIA, ZPA and ZDX. Assess and orchestrate the current and planned security posture for NTT data’s Security infrastructure, providing recommendations for improvement and risk reduction. Identify and propose process improvements and identify opportunities for new processes and procedures to reduce risk. Support security incident response as required; First line responder to reported or detected incidents. Perform security research, analysis, security vulnerability assessments and penetration tests. Provide security audit and investigation support Monitor and track security systems for Vulnerability and respond to potential security Vulnerability. Provide support for the Vulnerability management program. Provide 24x7 support as operations team working in shifts. Participate in on-call system administration support including but not limited to weekends, holidays and after-business hours as required to service the needs of the business. Skills And Experience 4 to 5 years+ in Information Security space. Strong experiance in Service Now Ticketing tool, Dashboards and Integration. Strong experience with Zscaler ZIA, ZPA and ZDX. Strong experience with Vulnerability Management Program. Strong experience with Qualys Vulnerability Management Tool. Some good to have Experience with Crowdstrike EDR and SIEM. Strong experience with multiple network operating systems, including two or more of the following: Cisco iOS, Juniper ScreenOS or Junos, Fortinet FortiOS, CheckPoint GAiA, or Palo Alto Networks PAN-OS; Tanium, Rapid 7, Nessus, Nitro ESM, Symantec SEP, Symantec Message labs, Thales encryption, Allgress, Forecpoint, Blue coat, Firepower, Cisco ISE, Carbon Black, Titus, Encase Strong oral, written, and presentation abilities. Experiance with M365 Copilot. Some experience with Unix/Linux system administration. Strong experience with logging and alerting platforms, including SIEM integration. Current understanding of Industry trends and emerging threats; and Working Knowledge of incident response methodologies and technologies. Desirable Zscaler Certifications Associate and Professional for ZIA, ZPA and ZDX. Excellent Experiance in Zscaler ZIA, ZPA and ZDX. Experiance in Vulnerability Management Program. Experiance in Qualys Vulnerability Management Tool. Well-rounded background in network, host, database, and application security. Experience implementing security controls in a bi-modal IT environment. Experience driving a culture of security awareness. Experience administering network devices, databases, and/or web application servers. Professional IT Accreditations (CISM, CCSA, CCSE, JNCIA, CCNA, CISSP, CompTIA Security) Good to have. Abilities Non customer facing role but an ability to build strong relationships with internal teams, and security leadership, is essential act as Incident co-ordinator, for reviewing all security tools, ingesting incident data, tracking incident status, coordinating with internal and external assets to fulfill information requirements, and initiating escalation procedures. Document daily work and new processes. Embrace a culture of continuous service improvement and service excellence. Stay up to date on security industry trends.
Posted 2 weeks ago
4.0 years
0 Lacs
hyderabad, telangana, india
On-site
Responsibilities As a member of the incident/Workorder/Change handling team , you will have the following accountabilities: Will be working as an SME for Zscaler Support in Operations for ZIA, ZPA and ZDX. Assess and orchestrate the current and planned security posture for NTT data’s Security infrastructure, providing recommendations for improvement and risk reduction. Identify and propose process improvements and identify opportunities for new processes and procedures to reduce risk. Support security incident response as required; First line responder to reported or detected incidents. Perform security research, analysis, security vulnerability assessments and penetration tests. Provide security audit and investigation support Monitor and track security systems for Vulnerability and respond to potential security Vulnerability. Provide support for the Vulnerability management program. Provide 24x7 support as operations team working in shifts. Participate in on-call system administration support including but not limited to weekends, holidays and after-business hours as required to service the needs of the business. Skills And Experience 4 to 5 years+ in Information Security space. Strong experiance in Service Now Ticketing tool, Dashboards and Integration. Strong experience with Zscaler ZIA, ZPA and ZDX. Strong experience with Vulnerability Management Program. Strong experience with Qualys Vulnerability Management Tool. Some good to have Experience with Crowdstrike EDR and SIEM. Strong experience with multiple network operating systems, including two or more of the following: Cisco iOS, Juniper ScreenOS or Junos, Fortinet FortiOS, CheckPoint GAiA, or Palo Alto Networks PAN-OS; Tanium, Rapid 7, Nessus, Nitro ESM, Symantec SEP, Symantec Message labs, Thales encryption, Allgress, Forecpoint, Blue coat, Firepower, Cisco ISE, Carbon Black, Titus, Encase Strong oral, written, and presentation abilities. Experiance with M365 Copilot. Some experience with Unix/Linux system administration. Strong experience with logging and alerting platforms, including SIEM integration. Current understanding of Industry trends and emerging threats; and Working Knowledge of incident response methodologies and technologies. Desirable Zscaler Certifications Associate and Professional for ZIA, ZPA and ZDX. Excellent Experiance in Zscaler ZIA, ZPA and ZDX. Experiance in Vulnerability Management Program. Experiance in Qualys Vulnerability Management Tool. Well-rounded background in network, host, database, and application security. Experience implementing security controls in a bi-modal IT environment. Experience driving a culture of security awareness. Experience administering network devices, databases, and/or web application servers. Professional IT Accreditations (CISM, CCSA, CCSE, JNCIA, CCNA, CISSP, CompTIA Security) Good to have. Abilities Non customer facing role but an ability to build strong relationships with internal teams, and security leadership, is essential act as Incident co-ordinator, for reviewing all security tools, ingesting incident data, tracking incident status, coordinating with internal and external assets to fulfill information requirements, and initiating escalation procedures. Document daily work and new processes. Embrace a culture of continuous service improvement and service excellence. Stay up to date on security industry trends.
Posted 2 weeks ago
5.0 years
0 Lacs
pune, maharashtra, india
On-site
About the role: We are seeking a hands-on Security & Compliance Lead to own and execute end-to-end security audits and compliance initiatives across applications, infrastructure, and organizational processes. This role ensures systems, applications, and business operations are secure, compliant, and aligned with both internal policies and regulatory requirements (e.g., RBI, ISO 27001, SOC 2 Type II). Responsibilities: Conduct technical assessments (e.g., VRA, security checklists) required by new BFSI clients. Analyse and complete detailed cloud infrastructure security and compliance questionnaires. Assist in mapping customer security and regulatory requirements (e.g., ISO 27001, RBI, SOC 2 type II) to internal controls. Maintain documentation and templates for commonly requested BFSI assessment artifacts. Manage and complete security questionnaires from clients, vendors, and partners. Evaluate vendor security and compliance by reviewing their responses and supporting documentation. Identify security risks within the company’s IT infrastructure, applications and services. Ensure compliance with security standards such as ISO 27001, GDPR, SOC 2, or any other relevant frameworks. Work with internal teams to maintain compliance with legal and regulatory requirements. Collaborate with the IT security, legal, and procurement teams to address concerns identified in the security assessments. Develop and maintain internal security policies and procedures related to vendor assessments and third-party risk management. Prepare detailed reports summarizing findings from security assessments and risk analysis. Provide recommendations to improve security measures and compliance. Educate internal staff and external partners about security best practices and compliance requirements Support pre-sales and onboarding teams with timely delivery of assessment documentation. Stay updated with AWS best practices, shared responsibility model, and emerging cloud security trends. Good to Have: Bachelor’s degree in computer science, Information Security, Data Science, or a related field 5+ years of experience working with Audit/compliance, application security assessments, AWS cloud security preferably BFSI domain 2+ yrs. of experience on AWS cloud security and risk assessments. Strong exposure to AWS cloud infrastructure (Guard Duty, security hub, inspector, Firewall, IAM, EC2, VPC, S3, Security Groups, etc.). Familiarity with secure coding practices, vulnerability management, and threat modelling. Experience with VRA templates, cloud security checklists, and assessment responses for enterprise or regulated clients. Familiarity with information security standards such as ISO 27001, SOC 2, RBI cybersecurity framework. Strong understanding of data protection, encryptions methodologies Ability to interpret and explain security configurations and policies in layman's terms. Experience with security controls, vulnerability scanning tools (e.g., Nessus, wire shark), or SIEM. Exposure with security tools such as network firewall, IPS/IDS is plus
Posted 2 weeks ago
4.0 years
0 Lacs
bengaluru, karnataka, india
On-site
About the Team At Navi, the InfoSec team safeguards our digital ecosystem - ensuring the confidentiality, integrity, and availability of critical systems and data. We lead the charge on cyber risk management, regulatory compliance, and data protection, while championing a security-first culture across all teams. Our mission: Protect what powers Navi - securely, compliantly, and confidently. About the Role Navi is looking for an Associate Manager II – Cyber Security to pilot key aspects of its group-wide information security and regulatory compliance program. The ideal candidate will be responsible for developing and implementing comprehensive security strategies to protect our organization’s information assets. This role involves interpreting and implementing information security and technology risks mandates from regulators such as RBI, IRDAI, SEBI, and NPCI, ensuring continuous tech compliance across all business units. This includes active engagement in security operations, incident response, risk assessments, and policy enforcement. The ideal candidate will play a strategic and operational role in defining, implementing, and maintaining Navi’s information security posture, while ensuring continuous technology compliance across all business units. You will collaborate closely with engineering, infrastructure, legal, and IT teams to establish and maintain robust security operations policies, frameworks, and controls. What We Expect From You Technical Skillset: Implement the overall security strategy for the organization. Translate complex regulatory requirements into actionable security controls. Security Operations: Perform daily security operations including monitoring, incident response, and threat management. Coordinate investigation and resolution of security breaches and vulnerabilities. Experienced on SIEM, XDR, ASM, DMARC, IAM , cloud security, email security, CASB, DLP is mandatory Experience and knowledge of managing security operations centers (SOC). Proficiency with SIEM tools (e.g., Splunk, ArcSight, QRadar). Ability to configure, monitor, and analyze security events. Knowledge of threat hunting, threat modeling, and incident response. Ability to analyze threat data and implement proactive security measures. Cloud Security:Understanding of cloud security principles and best practices for AWS and Google Cloud. Experience with cloud security tools and services Manage and respond to security incidents and breaches, conducting thorough investigations and implementing corrective actions. Risk Management: Identify, assess, and prioritize potential security risks and vulnerabilities. Experience with vulnerability assessment tools (e.g., Nessus, Qualys). Knowledge of patch management processes and remediation strategies. Develop and implement risk mitigation strategies and controls. Conduct regular security assessments and audits to ensure compliance with policies and standards. Policy and Compliance: Implement, review, and update security policies, procedures, and guidelines. Ensure compliance with industry standards and regulatory requirements (e.g., ISO 27001, PCI-DSS, RBI, IRDAI and SEBI). Coordinate and lead internal and external audits related to IT security. Training and Awareness: Promote a culture of security awareness throughout the organization. Technology and Innovation: Stay current with emerging security threats, technologies, and industry trends. Evaluate and implement new security technologies and solutions to enhance the organization’s security posture. Must Haves : Qualifications Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Relevant certifications such as CISSP, CISM, CISA, or equivalent are highly desirable. Experience: 4+ years of experience in cyber security in implementation and operations.. Proven experience in developing and implementing security strategies and policies. Strong knowledge of security frameworks, standards, and best practices. Skills: Excellent implementation and operation management skills. Strong analytical and problem-solving abilities. Effective communication and interpersonal skills. Proficiency in security tools and technologies (e.g., firewalls, intrusion detection/prevention systems, SIEM). Personal Attributes: High level of integrity and ethical conduct. Ability to work under pressure and manage multiple priorities. Strong attention to detail and accuracy. Inside Navi We are shaping the future of financial services for a billion Indians through products that are simple, accessible, and affordable. From Personal & Home Loans to UPI, Insurance, Mutual Funds, and Gold — we’re building tech-first solutions that work at scale, with a strong customer first approach. Founded by Sachin Bansal & Ankit Agarwal in 2018, we are one of India’s fastest-growing financial services organisations. But we’re just getting started! Our Culture The Navi DNA Ambition. Perseverance. Self-awareness. Ownership. Integrity. We’re looking for people who dream big when it comes to innovation. At Navi, you’ll be empowered with the right mechanisms to work in a dynamic team that builds and improves innovative solutions. If you’re driven to deliver real value to customers, no matter the challenge, this is the place for you. We chase excellence by uplifting each other—and that starts with every one of us. Why You'll Thrive at Navi At Navi, it’s about how you think, build, and grow. You’ll thrive here if: You’re impact-driven : You take ownership, build boldly, and care about making a real difference. You strive for excellence : Good isn’t good enough. You bring focus, precision, and a passion for quality. You embrace change : You adapt quickly, move fast, and always put the customer first.
Posted 2 weeks ago
7.0 years
0 Lacs
bengaluru, karnataka, india
On-site
At least 7 year of experience as a penetration tester Proven abilities to approach a black box and white box testing. Proven hands on experience in manual pen testing as major part of work profile Hands-on experience with vulnerability scanners (static and/or dynamic) and frameworks, including but not limited to Burp Suite, Checkmark, OWASP ZAP, Burp, Nmap, Nessus, Metasploit Framework Good hands on experience with API penetration testing of Rest/SOAP based interfaces Perfect knowledge of OWASP methodology and web vulnerabilities – you can easily explain and show how it works Python or any other scripting language. Comfortable using and working linux/unix environments Desirable skills to have PCI, NIST guidelines including PII, ISO2700x, cloud security, virtualization, SecDevOps, containerized deployment. Extremely committed and self-motivated individual with ability to deliver in challenging situations Excellent written and oral communication Assessing application and solution security controls against «black box», «grey box» and «white box» attacks using both manual and automated (DAST) penetration techniques Assessment of penetration test results with development teams, contribution to risk mitigation actions Source code analysis (client/server/database) for vulnerabilities with scanning tools - SAST
Posted 2 weeks ago
4.0 - 6.0 years
0 Lacs
bengaluru, karnataka, india
On-site
Job Role: Network security management Location: Bangalore Experience:-4-6Years Job Description: Experienced IT professional with a strong background in managing Cisco security appliances, conducting vulnerability assessments, and ensuring regulatory compliance. Proven expertise in maintaining network security, troubleshooting technical issues, and aligning IT operations with industry best practices. Roles & Responsibilities: - Administered Cisco SMA and WSA proxy devices, handling configuration, policy enforcement, and routine backups. - Created, updated, and maintained identification profiles, ensuring timely and accurate policy deployment. - Performed vulnerability assessments using tools such as Nessus and Qualys, identifying and mitigating security threats. - Troubleshot and resolved complex technical issues to minimize customer impact and system downtime. - Managed daily service requests with a focus on efficiency, quality, and adherence to service level agreements (SLAs). - Led quarterly upgrade initiatives for WSA and SMA appliances, aligning with security standards and best practices. - Ensured regulatory compliance by conducting internal audits and advising leadership on risk management strategies. - Compiled and submitted compliance documentation and reports to regulatory authorities in a timely and accurate manner. Must Have skills :Network security management with cisco SMA and WSA proxy devices .
Posted 2 weeks ago
5.0 years
0 Lacs
pune, maharashtra, india
On-site
Job Description The Senior Pen Tester is responsible for conducting security pen testing, monitoring, and auditing within a dynamic global organization. The products under test will have the coverage of embedded devices and cloud services. The Senior Pen Tester should have exposure to embedded devices as well as cloud services (AWS/Azure). Some of the products will be white box tests while others will be total black box engagements. A successful Senior Pen Tester will be able to take the product and evaluate the weak points in the design and implementation and focus in on those weaknesses to find security gaps. All the findings by the Senior Pen Tester will need to be clearly documented and relayed to the design team for mitigation. The Senior Pen Tester will need to be very versatile in their attack vectors and their knowledge of exploits. The ideal candidate will be well experienced in a broad range of attack vectors across a wide spectrum of devices from small, embedded devices to wide and complex cloud ecosystems. They will be responsible for interfacing with engineering teams to conduct security testing, auditing and should be able to explain the findings. They will be responsible for ensuring that engineering teams stay in compliance with the security expectations of the global organization. The Senior Pen Tester will be expected to stay current with the latest security threats and attack vectors that can be deployed against the product portfolio. They should also have experience in communicating clearly and concisely the findings of these activities to an audience. This position will be primarily based out in Pune (Global R&D center), INDIA, and will consistently work under the guidance and processes of global security and will support all the regional as well as global engineering groups. The testing activity and methodology deployed to confirm compliance is guided but expected to be enhanced by the Senior Pen Tester. The Senior Pen Tester will be expected to use their knowledge and experience to further develop internal testing processes and procedures. Key Duties Duties In addition to performing internal application and product security assessments the Senior Pen Tester will be expected to support response to possible breaches of security based on newly disclosed information. Other key duties include: Conduct security evaluation and threat assessments of embedded systems, mobile applications, web applications Conduct research for the purposes of finding new vulnerabilities and enhancing existing capabilities Circumventing security protection methods and techniques Performing data bus monitoring (snooping) and data injection Conduct communications protocol analysis in the embedded products, and applications Conduct wireless communications channel snooping, and data injection Reverse engineering complex systems and protocols Create detailed technical reports and proof of concept code to document findings Perform System Breakdown of the project/product before testing, identify and evaluate all the testing requirements and plan out the detailed testing activities, resources etc. Proactive detailed interaction with respective engineering group on the testing needs, testing progress/status and provide detailed analysis report Have effective Gitlab issue management reviewing and, providing mentorship and direction on planned testing activities for junior resources in line with defined processes and procedures. Assist in leading testing activities in all the regions, provide head-to-head support to Assessment Pillar Manager and help to drive continuous improvement in testing processes and procedures. Thorough adherence and follow-up of VERTIV SECURE requirements and Vulnerability Management and Incident Response processes. Preference given to other practical skills such as: functional analysis, memory image capture, static memory analysis, and data element extraction, etc. Requirements A bachelor’s degree in information technology, Computer Science or related Engineering field is highly desirable. Additional advanced security qualifications such as CISSP (Certified Information Systems Security Professional) certification, Offensive Security Web Expert (OSWE) or equivalent preferred. Eight or more years’ experience (5 to 8 years) in information, application, and embedded product security and/or IT risk management with a focus on security, performance, and reliability Solid understanding of security protocols, cryptography, authentication, authorization, and security Good working knowledge of current IT risks and experience implementing security solutions Ability to interact with a broad cross-section of personnel to articulate and enforce security measures Excellent written and verbal communication skills as well as business acumen Strong leadership, vision, effective communication and goal-oriented Strong ability to establish partnerships and influence change and achieve results within dynamic environment Meaningful technical contributions into the development lifecycle of an application, product, or service Preferred Knowledge Experience Includes Understanding and development experience of embedded systems / software, and web-based applications Linux network device driver/data-path performance exposure Familiarity with compilers, debuggers, disassemblers, and other low-level development and analysis tools Exposure to binary analysis tools such as IDA Pro, WinDbg, BinWalk, Valgrind, PIN, Panda, and S2E Working knowledge of hacking tools and techniques such as memory corruption exploits, rootkits, protocol poisoning, browser-based attacks, DNS poisoning, MetaSploit, nmap, Nessus, etc. Experience with UNIX kernel internals and low-level Windows internals Comfort with reading and understanding of x86 and/or ARM assembly Experience with program analysis techniques such as taint analysis, program slicing, symbolic execution, constraint solving, and dynamic instrumentation An understanding of common cryptographic algorithms and protocols including their weaknesses and attacks against them Ability to extract software/firmware from provided hardware Meaningful experience utilizing git (Github or gitlab) Understanding of network protocols and experience developing packet-level programs Experience with common microcontroller programming tools and debugging interfaces Linux network device driver/data-path performance exposure Exposure to Layer 2, Layer 3 networking, QoS Network and/or application security knowledge (L2/L3 firewall, DPI, IDS, IPS) Knowledge of common malware/botnet exploits and how they are targeted to exploit embedded systems Operating system configuration of Windows, Linux, Android, and iOS Computer boot process including boot loaders Conducting security evaluation and threat assessments of embedded systems, mobile applications, web applications An understanding of common cryptographic algorithms and protocols including their weaknesses and attacks against them Familiarity with compilers, debuggers, disassemblers, and other low-level development and analysis tools Having hands on real-time embedded C/C++ development experience that includes recent lab activities integrating with and debugging on target hardware. About The Team Work Authorization No calls or agencies please. Vertiv will only employ those who are legally authorized to work in the United States. This is not a position for which sponsorship will be provided. Individuals with temporary visas such as E, F-1, H-1, H-2, L, B, J, or TN or who need sponsorship for work authorization now or in the future, are not eligible for hire. Equal Opportunity Employer We promote equal opportunities for all with respect to hiring, terms of employment, mobility, training, compensation, and occupational health, without discrimination as to age, race, color, religion, creed, sex, pregnancy status (including childbirth, breastfeeding, or related medical conditions), marital status, sexual orientation, gender identity / expression (including transgender status or sexual stereotypes), genetic information, citizenship status, national origin, protected veteran status, political affiliation, or disability.
Posted 2 weeks ago
3.0 - 5.0 years
0 Lacs
bengaluru, karnataka, india
On-site
Job Description Summary As a Product Security Analyst, you will be collaborating with development teams to complete security testing and tool development for our GEHC products. You will be responsible for Performing VAPT for thick and thin clients, webservices, embedded devices and cloud. Conducting Compliance/Benchmark assessments using DISA Stigs/CIS Benchmarks .Review, Test and Suggest best practices for Cryptography, PKI (web and non-web perspective). Conducting Source code review and discuss with development teams in mitigating the issues and eliminating false positives. GE Healthcare is a leading global medical technology and digital solutions innovator. Our mission is to improve lives in the moments that matter. Unlock your ambition, turn ideas into world-changing realities, and join an organization where every voice makes a difference, and every difference builds a healthier world. Job Description Roles and Responsibilities You are a skilled Analyst who enjoys security work and is an expert in systems security, product / OT security and application security. In This Role, You Will Work with product managers, independent researchers, and in-house researchers to identify, rate, report and manage product vulnerabilities and incidents. Be responsible for providing technical leadership and defining, developing, and evolving security within software in a fast-paced and agile development environment using the latest secure software development technologies and infrastructure. Work with Cyber Security Leaders and SMEs to understand product requirements Translate security requirements / vision into a prioritized list of user stories, completing work according to required timelines and quality standards Assist security champions in completing Threat Modeling and Architecture Risk Analysis on product features Perform Security Code Reviews, Vulnerability Analysis and research on application code Coach and mentor developers to implement cryptography solutions securely (PKI, Code Signing, Stored Secrets, et cetera) Engage subject matter experts in successful transfer of complex domain knowledge Apply principles of Secure SDLC and methodologies like Lean/Agile/XP, CI, Software and Product Security Provide guidance and advice on writing secure code that meets standards and delivers desired functionality, using the technology selected for the project Understand application security methodologies and frameworks Leverage GE Digital&aposs tailored Secure SDL practice into specific engineering engagements Research new application security technologies and implement them to improve application security. Maintaining a backlog of security-related tools that will improve the maintainability and security of our code and the pace of development Promote best practices based on OWASP, SANS Top 25, and the GE Digital SDL. Write fuzz scenarios to see the break network protocol suites such as TCP/IP, IPv6, UDP, TLS, DTLS Ability to automate attack scenarios to avoid repetitive work. Good to have experience in Bluetooth/Wifi or any radio based attacks. Good to have experience in Rest API security testing and recommending best practices while opting for OAuth or OpenId connect Having experience working on IoT platform will be beneficial. Required Skills Professional expertise with Kali Linux, Metasploit, Meterpreter. Hands-on experience in Windows/Linux and network security. Execute Scans using tools such as Nessus, Burp, Fortify/Coverity, Splunk etc. Education Qualification Bachelor&aposs Degree in Computer Science or STEM Majors (Science, Technology, Engineering and Math) with a minimum of 3+ years of experience in systems security, product / OT security and application security. Desired Characteristics Certifications OSCP, CCSP. Languages C/C++/Java/Python/Ruby Proven experience in breaking the vulnerable boxes. Adaptable to learn new skills or technologies as per business needs. Detailed working knowledge of two modern programming languages, such as java, python, or ruby Good written and oral communication skills and successful security consulting background. At least 2 years of security consulting involvement with development team(s) that delivered software-based services Experience in developing secure applications A high energy and a result-oriented attitude/approach, with an understanding of release timelines and the need to enable development teams, not slow them down Experience with Security Development Lifecycle processes such as Threat Modeling desired Contribute to and lead discussions and communications within the team and outside, including customers and other business units Excellent knowledge of Object Oriented Analysis and Design, Software Design Patterns and coding principles Hands-on Experience with developing cloud-deployed applications that utilize oath 2 Hands-on experience with developing RESTful web services Mobile Architecture experience, designing, developing, and integrating solutions. Experience with penetration testing tools, ability to replicate security defects uncovered by groups such as GE&aposs red team Good understanding of security tools and technologies to facilitate secure development Inclusion and Diversity GE Healthcare is an Equal Opportunity Employer where inclusion matters. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law. We expect all employees to live and breathe our behaviors: to act with humility and build trust; lead with transparency; deliver with focus, and drive ownership always with unyielding integrity. Our total rewards are designed to unlock your ambition by giving you the boost and flexibility you need to turn your ideas into world-changing realities. Our salary and benefits are everything youd expect from an organization with global strength and scale, and youll be surrounded by career opportunities in a culture that fosters care, collaboration and support. #Hybrid Additional Information Relocation Assistance Provided: Yes Show more Show less
Posted 2 weeks ago
0 years
0 Lacs
bengaluru, karnataka, india
On-site
Introduction In this role, you'll work in one of our IBM Consulting Client Innovation Centers (Delivery Centers), where we deliver deep technical and industry expertise to a wide range of public and private sector clients around the world. Our delivery centers offer our clients locally based skills and technical expertise to drive innovation and adoption of new technology. Your Role And Responsibilities Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices. Preferred Education Master's Degree Required Technical And Professional Expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 5 plus years of experience Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding Practices: Knowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat Modelling: Ability to conduct threat modelling sessions to identify and mitigate security risks Preferred Technical And Professional Experience Vulnerability Assessment: Experience in conducting vulnerability assessments and penetration testing Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST) tools. Security Tools: Proficiency in using security tools like Burp Suite, Nessus, or Fortify.
Posted 2 weeks ago
5.0 years
0 Lacs
pune, maharashtra, india
On-site
Job Description We are seeking a creative and forward-thinking cybersecurity engineer to develop and enhance cyber security solutions to address unique security challenges in critical infrastructure and industrial businesses. This position is responsible for providing on-site cyber security services associated with industrial Process Control Networks for Honeywell customers in the Oil and Gas; Hydrocarbon Processing; Power Generation; Pulp, Paper & Printing; Continuous Web Solutions; Petrochemicals; Life Sciences; and Metals, Minerals and Mining markets. Services provided include on-site consulting, troubleshooting, network designs, implementation, assessments, and other related tasks as identified. Responsibilities Assume the lead role in assigned projects, ensuring delivery on time, within budget, and to customer satisfaction. Stay technically current with cybersecurity solutions and expand knowledge in designated network disciplines. Maintain relevant cybersecurity certifications such as CCNA, CISSP, GICSP, or similar. Keep abreast of current industry security standards (e.g., IEC-62443, ISO 27000). Build strong relationships with internal and external customers by providing accurate and efficient technical/engineering support. Diagnose problems and provide timely, accurate technical solutions in response to customer inquiries, questions, and issues. Network (VLANs, STP, HSRP, Static routing) config and Troubleshooting, Firewall configuration i.e policies, communication troubleshooting, AD, NMS, SIEM, AV, WSUS, etc Installation, configuration and troubleshooting. Uphold industrial safety awareness through the completion of pertinent safety certifications. Qualifications Bachelor's degree in computer-related fields (e.g., Computer Science, Computer Information Systems, Electronics) or equivalent experience. Cisco Certified Network/Design/Security Professional (at least one certification). GICSP/CISSP Certified Information Systems Security Professional or similar security certification. 5+ years of experience in Networking, endpoint security, and conducting audits/assessments in IT security. 3+ years of experience in Security Projects. 2+ years of experience in Cybersecurity Vulnerability or Risk assessment. 2+ years of experience with Microsoft Active Directory, DNS, WSUS, and Terminal Server. 2+ year of experience in vulnerability scanning and assessments using tools like Nessus and NMAP. Proven experience designing or deploying a minimum of 10 projects leveraging virtualization, preferably VMware. 3+ years of Network Security Experience: Firewalls, ACL, IDS, IPS, SIEM, particularly with Cisco Routers, Switches, or Firewalls. 3+ years of experience with antivirus systems and backup & restore solutions. 3+ years of experience providing network services on customer sites. Excellent written and oral communication skills. Willingness to travel 30-65%. Preferred Qualifications and Experience 3 years’ experience in Operational Technology (OT). IEC-62443 Risk Assessment/Design/Maintenance Certification (at least one). Knowledge of networking protocols including HSRP, STP, RSTP, MSTP, VLAN, 802.1q, IPv4, IPv6, RIPv2, OSPF, EIGRP, DNS, NTP, EtherChannel, FTP, TFTP, and SSH. Awareness of OT cybersecurity best practices and recommendations. Proficiency in preparing functional and detailed design specifications. Ability to work independently. Excellent troubleshooting skills to resolve complex network, application, or system integration issues. About Us Honeywell helps organizations solve the world's most complex challenges in automation, the future of aviation and energy transition. As a trusted partner, we provide actionable solutions and innovation through our Aerospace Technologies, Building Automation, Energy and Sustainability Solutions, and Industrial Automation business segments – powered by our Honeywell Forge software – that help make the world smarter, safer and more sustainable.
Posted 2 weeks ago
2.0 years
0 Lacs
khurda
On-site
Job Title: - Presales Engineer Job Description : Qualysec is seeking a Pre-Sales Engineer to join our growing team. The ideal candidate will act as a key technical advisor during the sales process, helping clients understand and choose the right cybersecurity solutions. You will work closely with the sales and technical teams to deliver customized proposals and ensure a seamless transition from pre-sales to project execution. This role is perfect for someone with a passion for cybersecurity, strong communication skills, and the ability to translate technical concepts into business value. Qualification : - Bachelor's Degree in a related Cybersecurity/IT/Computer Science field. Experience : - 2+ Years in Cybersecurity Pre-Sales Location : - Bhubaneswar Job Type : - Full Time Responsibilities · Collaborate with the sales team to understand customer requirements and create technical solutions · Conduct technical presentations. · Assist in preparing proposals, RFP/RFI responses, and project estimations · Explain VAPT methodology, tools, and report deliverables to both technical and non-technical stakeholders · Liaise with technical teams (e.g., Penetration Testers to ensure smooth knowledge transfer post-sales · Conduct gap analysis and suggest appropriate services (Web, Mobile, API, Network, Cloud VAPT etc.) · Support proof-of-concept (PoC) setups for clients as required · Stay updated with the latest cybersecurity trends and tools Skills Required Strong understanding of cybersecurity concepts, especially VAPT Familiarity with tools like Burp Suite, Nessus, Nmap, Metasploit, OWASP Top 10 Excellent communication and presentation skills Ability to simplify technical information for non-technical stakeholders Good documentation and proposal writing skills Self-driven and client-oriented attitude Excellent written and verbal communication skills, with the ability to clearly document and communicate findings and recommendations. Prior experience in a Pre-Sales / Technical Consultant role in a cybersecurity firm is highly desirable. Benefits: · Competitive salary, great perks, and a work culture that’s as fun as it is rewarding. · On-time Salary · Paid time off and holidays. · Leave encashment · Provident Fund · Plenty of room to experiment, innovate, and grow. About Us: Qualysec is a leading cybersecurity firm specializing in comprehensive penetration testing and risk assessment services. Our tailored solutions help businesses proactively defend against evolving cyber threats. With over four years of experience, we take pride in having served more than 150 clients across 21 countries—a testament to our commitment to quality and resilience. Our dynamic work environment and employee-focused culture drive our continuous growth and success. Job Type: Full-time Benefits: Food provided Leave encashment Paid sick time Paid time off Provident Fund
Posted 2 weeks ago
4.0 - 6.0 years
6 - 7 Lacs
bengaluru
On-site
Job Requirements Penetration Test Engineer – Product Cyber Security - We are looking for an experienced and certified Embedded and Application Penetration Tester to join our Product Cybersecurity team. In this role, you will be responsible for conducting comprehensive security assessments of our products including embedded devices, web applications, thick-client applications, and mobile applications. ESSENTIAL DUTIES AND RESPONSIBILITIES Conduct comprehensive security assessments of Wabtec products, including embedded devices, IoT devices, thick client applications, mobile and web applications, Use penetration testing and Red Team techniques to discover and exploit vulnerabilities Create findings reports and communicate to stakeholders Perform compliance testing of embedded systems with respect to IEC-62443-4-2 standards Explore new ways to exploit devices by dumping and analyzing firmware (incl reverse engineering) Interact with and test JTAG, UART, and other hardware debug interfaces Provide guidance on vulnerability remediation to engineering teams Manage the penetration testing request process and backlog/pipeline Recommend and implement improvements to testing processes and methodologies Support PSIRT and Vulnerability Disclosure processes and activities Promote security awareness through hacking demonstrations, CTF events .. Proactively perform threat hunting for any new vulnerabilities/risk associated with products and applications. Be up to date with cybersecurity trends and share information on new exploits, vulnerabilities to the appropriate stakeholders. Collaborate with cross-functional teams and stakeholders to identify and mitigate security risks. Work Experience QUALIFICATIONS & SKILLS: Bachelor's degree in computer science, cybersecurity, or a related field 4-6 years of experience in web, network and embedded/IoT applications penetration testing Strong expertise in various penetration testing techniques and attack frameworks such as MITRE ATTCK, PTES standards, fuzz testing, brute force attacks, OWASP top 10 tests, and more Hands-on experience with penetration testing tools including open-source tools, such as Metasploit and the Kali Linux tool set, Nessus, Qualys guard, nmap, Wireshark and Burp Suite etc. Demonstrate strong manual penetration testing skills and techniques that are required besides automated tools and frameworks Good understanding of embedded systems security testing including firmware security, secure configuration analysis, secure boot, physical port testing (USB, serial, CAN, wireless, etc.,) Knowledge of the secure SDLC and vulnerability/risk lifecycle Knowledge of common vulnerability frameworks such as CVSS, and OWASP top 10 Experience with hardware debug tools and test equipment Solid understanding of network security and penetration testing methodologies Strong problem-solving and critical thinking skills Excellent communication and report writing abilities Certification in a relevant area such as OSCP, OSWP, GPEN, CPTC, or CPTE is highly desired Excellent communication and presentation skills Ability to collaborate effectively as part of a global cross functional team, working independently with minimal supervision.
Posted 2 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |