Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
2.0 - 5.0 years
4 - 7 Lacs
maharashtra
Work from Office
Description: who has a more technical and practical understanding of security vulnerabilities. To help, the activities that the person in this role will perform:Review scan reports and alerts from monitoring tools like Qualys, Shodan and Risk Recon, perform triage on them to determine the risk level, and follow-up with the appropriate stakeholders (either internal ones or external business partners) for the remediation of those issues. Liaison with the respective stakeholders for keeping the inventory of monitored assets (IPs) up to date. Support in the scheduling, coordination, and execution of security audits. So, while vulnerability scanning is beneficial, the emphasis is more on the reme...
Posted 3 weeks ago
2.0 - 5.0 years
4 - 7 Lacs
maharashtra
Work from Office
Description: L1 PanelGulati, Vikas L2 PanelGulati, Vikas Firewall experience - checkpoint/palo alto/Fortinet. Network Security Architect Implementation managed Security Run Palo alto /Fortinet/Checkoint firewalls. Administration support Break fix issues on any two Next gen firewalls , Hands on implementation of IDS/IPS Fine tuning . Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade :C Level :To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) :No Remote work possibility :No Global Role Family :To be defined Local Role Name :To be defined Local Skills :FireWall-PaloAlto;firewalls Languages Required::ENGLISH Role Rarity :To Be Defin...
Posted 3 weeks ago
3.0 - 5.0 years
5 - 7 Lacs
mumbai, bengaluru
Work from Office
Description: Mumbai/Bangalore Generic JD Job Details:-Focuses on scanning internally and externally -Looking authenticated vs non-authenticated -Familiarity with JIRA (dashboards) -Familiarity with:Qualys Rapid7 Attack Surface mgmt. Rendori/sycognito -Python scripting for automation Job Responsibilities * Assist in the responsibility for the reviewing vulnerabilities' data from multiple sources (i.e. external / internal penetration testing, internal / external vulnerability scanning, etc.) across multiple technologies and a changing environment including infrastructure and applications to determine risk rating of vulnerabilities to business assets. * Assist in improving and automating existi...
Posted 3 weeks ago
2.0 - 7.0 years
4 - 9 Lacs
karnataka
Work from Office
"Experience5+ Years Responsibilities Conduct application onboarding into Ping SSO, configure SSO integrations, and maintain protocols such as SAML, OAuth, and OpenID Connect. Gather application requirements, configure SSO settings, and support new integrations. Perform testing, validation, and optimization of SSO integrations to ensure smooth authentication and access control. Collaborate with internal stakeholders to support SSO strategies and identity management policies. Requirements 5+ years of experience in Ping SSO and SSO integration development. In depth knowledge of SSO protocols and experience in application onboarding and authentication configurations. "
Posted 3 weeks ago
2.0 - 7.0 years
4 - 9 Lacs
maharashtra
Work from Office
Description L1 PanelGulati, Vikas L2 PanelGulati, Vikas Firewall experience - checkpoint/palo alto/Fortinet. Network Security Architect Implementation managed Security Run Palo alto /Fortinet/Checkoint firewalls. Administration support Break fix issues on any two Next gen firewalls , Hands on implementation of IDS/IPS Fine tuning . Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade C Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility No Global Role Family To be defined Local Role Name To be defined Local Skills FireWall-PaloAlto;firewalls Languages RequiredENGLISH Role Rarity To Be Defined
Posted 3 weeks ago
2.0 - 7.0 years
4 - 9 Lacs
maharashtra
Work from Office
Description who has a more technical and practical understanding of security vulnerabilities. To help, the activities that the person in this role will performReview scan reports and alerts from monitoring tools like Qualys, Shodan and Risk Recon, perform triage on them to determine the risk level, and follow-up with the appropriate stakeholders (either internal ones or external business partners) for the remediation of those issues. Liaison with the respective stakeholders for keeping the inventory of monitored assets (IPs) up to date. Support in the scheduling, coordination, and execution of security audits. So, while vulnerability scanning is beneficial, the emphasis is more on the remedi...
Posted 3 weeks ago
2.0 - 7.0 years
4 - 9 Lacs
maharashtra
Work from Office
Description ResponsibilitiesoIn depth knowledge on IBM IWA / IWS environment. oSystem administration of mainly IWS distributed network (install upgrade patching). Manage SW technical roadmap oSetup + maintain standards for the IWS network oAssist in installation, configuration and tuning of IWS distributed master(s) on AIX Linux (SA + HA) oAssist in the installation, automation, and tuning of IWS-agents on open systems (Linux, AIX, Windows) in collaboration with other teams (security, system administrators, ) oProvide own the design, deployment, automation, and scripting solutions to drive new capabilities, visibility, and efficiency oIn depth knowledge of automation frameworks - including b...
Posted 3 weeks ago
6.0 - 10.0 years
12 - 20 Lacs
mumbai, bengaluru, delhi / ncr
Hybrid
Identify, close new sales in cyber security services. Build relationships with CXOs, CISOs, and IT decision-makers. Understand client challenges and map them to service offerings. Deliver customized proposals & solutions. VAPT, SOC, MSSP, Cloud.
Posted 3 weeks ago
2.0 - 6.0 years
7 - 11 Lacs
pune
Work from Office
Job Description: Job Title: Information Security Specialist, Associate Location: Pune, India Role Description The Cryptography Engineering and Solutions team at Deutsche Bank, operating under the Chief Security Office (CSO), defines the banks cryptography strategy and provides expert guidance on all crypto-related matters, including audits and regulatory compliance. For the CertHub initiative, we are seeking an IT Security Developer to contribute to strategic programs within Cryptography Engineering and Solutions. Associate Information Security Specialist to support the design and maintenance of CI/CD pipelines on Google Cloud Platform (GCP), with a focus on cryptographic services and automa...
Posted 3 weeks ago
9.0 - 14.0 years
9 - 13 Lacs
pune
Work from Office
Job Summary: We are seeking a highly experienced WiFiEngineer to design, implement, and manage enterprise wireless networks usingAruba Wireless LAN Controllers (WLC). The ideal candidate will have deepexpertise in wireless networking, access point management, and securityprotocols. Key Responsibilities: Wireless Network Design: Architect and optimize WiFi networks using Aruba WLC for high-performance connectivity. Access Point Management: Configure and manage Aruba APs, ensuring seamless roaming and coverage. Security & Authentication: Implement 802.1X, WPA3, and role-based access control (RBAC) for secure wireless access. Troubleshooting & Optimization: Diagnose and resolve WiFi performance...
Posted 3 weeks ago
2.0 - 4.0 years
0 - 0 Lacs
gurugram
Work from Office
Role Title: Full-time Penetration Tester / SOC Analyst Nihon Cyber Defence, a leading Japanese Cyber Security company, are looking for a Penetration tester with knowledge in SOC operations to join our growing India SOC team, supporting their emerging worldwide client base. This is a dual-role : primarily focused on internal and external penetration testing projects while also supporting incident detection and response . This is a desk job, no remote work. Willing to work in 24x7 rotational shifts, including nights and weekends. Responsibilities Penetration Testing Responsibilities Plan, execute, and report on network, web application, and infrastructure penetration tests . Perform vulnerabil...
Posted 3 weeks ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
Role Overview: As a Senior Manager in Penetration Testing at LSEG, you will lead and drive the internal Penetration Testing team with a strong emphasis on high performance and technical excellence. Your responsibilities will include building and managing a team of internal penetration testers and technical Subject Matter Experts (SMEs) overseeing external partners conducting penetration testing. You should be a deeply technical leader with experience in managing high-performing technical teams within large enterprises and adept at managing senior stakeholders while continuously enhancing offensive security capabilities. Key Responsibilities: - Lead and manage LSEG's Penetration Testing team,...
Posted 3 weeks ago
3.0 - 7.0 years
0 Lacs
ahmedabad, gujarat
On-site
As a Senior Security Analyst specializing in Vulnerability Assessment and Penetration Testing (VAPT), your main role involves conducting thorough assessments and tests to identify and address security vulnerabilities in clients" systems, networks, and applications. You will utilize a combination of automated tools, manual testing techniques, and industry best practices to ensure comprehensive evaluations. Your responsibilities will include: - Conducting end-to-end vulnerability assessments and penetration tests across various systems, networks, and applications. - Analyzing assessment results to provide actionable recommendations for remediation and risk mitigation. - Collaborating with cros...
Posted 3 weeks ago
8.0 - 12.0 years
15 - 19 Lacs
bengaluru
Work from Office
Join us as a Software Principal Engineer on our Security Engineering team in Bangalore to do the best work of your career and make a profound social impact. What youll achieve As a Software Principal Engineer , you will be responsible for embedding secure development practices and leading vulnerability management across Dells product portfolio. You will collaborate closely with engineering and governance teams to drive security improvements and ensure secure, compliant product delivery. You will: Lead threat modeling, design security reviews, and vulnerability response processes to identify and mitigate risks Drive secure code practices, vulnerability scanning, triage, and remediation coordi...
Posted 3 weeks ago
2.0 - 7.0 years
4 - 9 Lacs
bengaluru
Work from Office
Hiring for CYBER SECURITY _ KOLKATAHYDERABAD Monitor and analyze security alerts and threats from various sources. Conduct vulnerability assessments and penetration testing. Develop, implement, and enforce security policies and procedures. Manage firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus software, and other security tools. Investigate security breaches and provide detailed incident reports. Collaborate with IT teams to secure networks, servers, applications, and endpoints. Conduct security awareness training for employees. Stay current with the latest cybersecurity trends, threats, and technology solutions. Participate in risk assessments and audits to ensure com...
Posted 3 weeks ago
9.0 - 13.0 years
35 - 37 Lacs
hyderabad
Work from Office
Summary This role offers an exciting opportunity to lead the development of ground breaking Transmission and Distribution applications on the innovative, cloud-native GridOS Platform, driving technological advancement in energy management. By spearheading organizational and architectural transformations in HTC, you will play a pivotal role in enhancing global energy infrastructure, fostering sustainable practices, and addressing climate challenges. Join us in shaping the future of energy distribution and making a meaningful impact on both technological evolution and environmental stewardship. Technology Responsibilities: Develop a scalable, pioneering Transmission & Distribution application ...
Posted 3 weeks ago
4.0 - 9.0 years
9 - 14 Lacs
hyderabad, bengaluru
Work from Office
Summary We are looking for an Sr Product Security Analyst, with a focus in vulnerability management and incident response capability. In this role you will work in a team to identify, risk rate, communicate and track product vulnerabilities and be a part of the product incident response team. Roles and Responsibilities In this role, you will: Be able to scope and participate in hardware and software penetration tests, vulnerability identification and vulnerability risk assessment Engage in incident response methods lead incident response processes related to product cyber Create and track meaningful metrics around product cyber risk and compensating controls Create vulnerability and incident...
Posted 3 weeks ago
3.0 - 5.0 years
7 - 11 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 3 weeks ago
5.0 - 7.0 years
5 - 9 Lacs
bengaluru
Work from Office
Job Summary Assist in implementing, maintaining and testing SOX controls supporting the Application Managers for custom applications and 3rd party Applications, support internal and external audits, and identify potential SOX compliance risks. Key Responsibilities: Pre-Implementation Quality Check: Conduct a thorough review of controls design and implementation before product/functional go-live, based on evidence submitted by engineering and application management teams. SOX ITGC and Automated Controls Evaluation: Test and evaluate the effectiveness of SOX IT General Controls (ITGC) and automated controls using audit checklists prepared by the Controls team to: Maintain SOX controls for inte...
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
pune
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
hyderabad
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 3 weeks ago
5.0 - 8.0 years
5 - 9 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 3 weeks ago
5.0 - 8.0 years
7 - 10 Lacs
bengaluru
Work from Office
Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...
Posted 3 weeks ago
7.0 - 12.0 years
9 - 14 Lacs
noida
Work from Office
Partner with product engineering teams to embed security in the SDLC through threat modelling, design reviews, and secure architecture guidance. Perform secure code reviews, static/dynamic analysis, and dependency scanning, ensuring vulnerabilities are identified and remediated early. Build and maintain security automation and guardrails (CI/CD integrations, pipelines, and developer tools) to scale AppSec across teams. Lead and evolve the threat modelling program, aligning security requirements with product architecture and risk profiles. Collaborate with engineering teams to remediate vulnerabilities and implement secure coding practices. Enhance the usage of SAST, DAST, SCA, and container ...
Posted 3 weeks ago
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
128529 Jobs | Dublin
Wipro
41046 Jobs | Bengaluru
EY
33823 Jobs | London
Accenture in India
30977 Jobs | Dublin 2
Uplers
24932 Jobs | Ahmedabad
Turing
23421 Jobs | San Francisco
IBM
20492 Jobs | Armonk
Infosys
19613 Jobs | Bangalore,Karnataka
Capgemini
19528 Jobs | Paris,France
Accenture services Pvt Ltd
19518 Jobs |