Home
Jobs

962 Penetration Testing Jobs - Page 38

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2 - 6 years

4 - 8 Lacs

Noida

Work from Office

Naukri logo

Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Primary Skills 1. PKI, HSM, Encryption and Cryptography solutions. 2. Bureau Solutions, Instant Financial Issuance, Cryptographic and Digital Card Solutions. Additional SKills 1. nShield HSMs, Identity Enterprise, KeyControl, DataControl, and others 2. Financial industry knowledge and PKI, HSM, Cryptography 3. Knowledge and experience in PCI DSS

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

1.Application Security Engineer Mandatory skills: 8"“10-years of manual penetration testing experience( Mobile, Web application , Web services, API ) Manual pen test experience on mobile application at least 20+ apps. T he ability to notice "odd" behavior and able to take the initiative to investigate it. Manual Web application and Web Services, API experience more then 300+ Applications. Very good in reporting as per the best practices. Person should know the vulnerability and the remediation in depth so that he can suggest the same to all the stakeholders. Expert in Burp Suite tool. Technical Skills: Knowledge of how to put into practice the OWASP Security Testing Standard. Fair understanding of testing the applications behind the Web Application Firewall and the evasion techniques. Good pen testers have the drive to keep digging and enjoy solving puzzles. Tools and procedures can be learned, but the "knack" or "hacker gene" is something that the person must have developed on their own or they will never be a top-level tester. As far as tools, the baseline is the same as web app pen testing, e.g., Kali, Burp, Python, Wireshark, radar, etc. For mobile app specific tools, theres Frida, MARA, Cydia, and others- there are multiple platforms that can accomplish the same thing, so to an extent its the testers preferences. In addition to the basic scripting skills necessary for most pen testing, a mobile pen tester should have experience with Java and Objective-C as those are the main languages for app development, as well as JavaScript since thats how Frida interactions are done (as mini-JS scripts to control the app and hook function calls). Ideally a tester will have experience as a mobile app developer, since its easier to understand the disassembly of an app if you understand how it was put together in the first place. A good understanding of jailbreaking, certificate management, and MITM operations are also necessary since natively the mobile application and the device will not allow MITM. Banking and financial domain experience would be addon to the existing skillsets. Last but not the least the person should have the excellent soft skill and a good team player. 2. DevSecops Engineer: Role Overview The Application DevSecOps Program is seeking a DevSecOps Security Engineer who will be responsible for executing comprehensive security scans, including but not limited to SAST, DAST, IAST, and ad-hoc penetration testing. The candidate will play a critical role in advancing the "Shift Left and Secure Early" initiative, ensuring security vulnerabilities are identified and mitigated early in the development lifecycle. This role involves analyzing security vulnerabilities and providing remediation solutions by writing secure code, offering guidance to development teams, and coordinating with cross-functional teams across the platform. Key Responsibilities Hands-on experience in creating and implementing DevSecOps pipelines using CI/CD automation tools such as Jenkins, GitHub Actions, CheckmarxOne, BurpSuite, and other open-source security tools. Implement and enforce Application Cyber Security Controls/Policies developed by the DevSecOps Program. Perform security vulnerability demonstrations for application teams to help them understand the impact and remediation strategies. Drive resolution of application security issues, collaborating with development and operations teams. Provide clear, actionable guidance to application teams for effective vulnerability mitigation and secure coding practices. Conduct comprehensive application security assessments using industry-standard security tools (SAST, SCA, DAST, PT, etc.). Automate repetitive tasks using tools such as Postman, PowerShell, and Python scripting. Create and maintain executive-level dashboards to track security metrics and assessments using PowerBI or similar reporting tools. Categorize and recommend security assessment strategies for both existing and new application development projects. Provide training and coaching to development and supplier teams on application security best practices and secure coding techniques. Develop training material and conduct training sessions to improve security awareness across teams. Skill-set Required Hands-on experience in writing secure code in languages such as Java, JavaScript, Python, and .NET. Proven experience running security scans, including SAST, SCA, DAST, and penetration testing (PT). Deep understanding of the OWASP Top 10 vulnerabilities and mitigation strategies for each. Solid background in application development, including working with compiled code, mobile applications, website design, and web services. Proficient in programming, scripting, and query languages such as Java, SQL, HTML, JavaScript, Python, and PowerShell. Familiarity with cloud security practices (AWS, Azure, or GCP) and container security (Docker, Kubernetes) is a plus. At least 3-5 years of DevSecOps experience focused on application testing, security integration, and automation. Preferred:Candidates with scripting experience in Python, Shell scripting, or other automation tools. 3.Vulnerability Assessment and Penetration Testing: This role is responsible for providing strong security testing services to meet project requirements. Solid competencies in information security processes, framework, and technologies, such as:Application Vulnerability Assessment, Penetration Testing, Ethical Hacking, OWASP Top 10, NIST, OSSTMM, OSINT etc. Good understanding of core security mechanisms, crypto libraries, and server-side security. Good understanding of supported frameworks and cleansers functions. Ability to understand vulnerabilities, interact and explain security risks/ impact to teams. Document vulnerabilities and collaborate with application team to help provide remediation. Experience in tools Appscan, Burp Suite, Insomnia REST and opensource tools like kali Linux. Adopt risk-based approach to translate technology risk into actual business impacts and prioritized actions. Prepare and propose any security tools to facilitate qualitative security testing. Ability to listen and articulate ideas verbally and in written formats to a broad range of audiences; ability to ask probing questions and deliver presentations that have impact. Any security certifications are a plus. OSCP preferred. Exposure to banking/ financial services domain is a plus.

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Ahmedabad

Work from Office

Naukri logo

About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Coimbatore

Work from Office

Naukri logo

Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Kochi

Work from Office

Naukri logo

About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Gurgaon

Work from Office

Naukri logo

Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Kolkata

Work from Office

Naukri logo

Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 months ago

Apply

2 - 6 years

4 - 8 Lacs

Chennai

Work from Office

Naukri logo

Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 months ago

Apply

7 - 12 years

15 - 20 Lacs

Chennai, Pune, Delhi

Work from Office

Naukri logo

As a Principal Offensive Security Consultant, you'll be reporting to a Vice President in our Offensive Security team and deliver projects for some of the biggest enterprises in the world. You will perform various web application, API, mobile, and infrastructure penetration tests. You will also draft reports based on the assessment results and gathered evidence and help address client inquiries regarding these results. In addition to the execution of traditional security assessments, you will participate in their refinement and improvement. Day to day responsibilities Lead the execution of consultative, offensive security, and cloud security engagements as a thought-leader in the eyes of the client and your teammates Solution and scope engagements for our clients, including penetration tests, consultative engagements, cloud security projects, and more Oversee the delivery of multiple engagements in parallel to ensure that junior members of the team can deliver and exceed client expectation Execute internal strategic initiatives to help our practice grow, adapt, and evolve Manage junior members of the team by conducting one-on-ones, providing feedback and coaching, and supporting their career growth Remote working would be an option Essential Traits: 7+ years in cybersecurity, with at least 5 years in penetration testing, cloud security or red teaming A strong understanding of offensive security methodology and vulnerability frameworks such as the OWASP Top 10, MITRE ATT&CK, PTES, or others An ability to analyze root causes and deliver technological recommendations to our clients Essential Traits: Bachelor s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration Deep understanding of penetration testing, cloud security, or red teaming The capability to build and cultivate relationships with clients and colleagues A proven ability to lead and deliver information security assessments that don t always come with a playbook A deep understanding of application security, cloud security, infrastructure security, and other offensive or defensive security domains Demonstrated ability to manage and coach a team of ambitious information security phenoms

Posted 3 months ago

Apply

5 - 10 years

7 - 12 Lacs

Pune

Work from Office

Naukri logo

We are looking for C/C++ programming, Cryptography, Threat modelling, Penetration testing, knowledge of vehicle electrical architecture and vulnerabilities, Embedded Linux, Python is added advantage. Threat modeling at the vehicle level, and also the ECU level Influencing the architecture design of new features (embedded, cloud and mobile) to ensure that our security needs can be met Identifying and implementing cryptographic security controls Providing technical leadership to teams to help them grow their security capability Developing tools and frameworks that make it easy for teams to adopt security Performing penetration testing on new products to find vulnerabilities Driveembeddedcybersecurity requirements into new product programs - Drive process improvements. Ideate and deploy innovative solutions in implementing the security in automotiveembeddedSoftware development 6+ years of experience withembeddedsystems/software engineering and/or IoT systems 3+ years of experience with leading and creating a vision for a team, and communication with leadership 5+ years of experience in development ofembeddedapplications in C or C++ 5+ years of experience with Agile practices Experience with Linux distributions Experience with applying cryptographic concepts in theembeddedspace Experience interpreting and applying standards (e.g. ISO 21434) and specifications in theembeddedsoftware space Experience withembeddedLinux and other Real Time Operating Systems (RTOS) Experience in the application of cryptographic security controls forembeddedsystems Experience in the development ofembeddedsystems for vehicles Experience in the development of IoT devices Experience performing penetration testing ofembeddedsystems PKI experience Experience in a DevOps role Developed AWS-native applications Understanding of FTP, TLS, UDP, PCI/IP Bachelor's degree Computer Engineering, Cyber Security / Security Engineering, Computer Science, Electronics Engineering or equivalent experience Advanced degree is a plus

Posted 3 months ago

Apply

5 - 10 years

7 - 12 Lacs

Karnataka

Work from Office

Naukri logo

"Seeking 8 contract resources in Hyderabad and Bangalore for performing SAST (Static application security testing), SCA (Software Composition Analysis) and DAST (Dynamic application security testing) to perform identification and remediation of vulnerabilities in Applications. About the Job:This position is a Contractor at Senior Specialist Cyber Security role for performing Application Security Testing in Cyber Security Organization. This profile will be passionate in preventing risk by performing remediation validation of vulnerabilities identified during the testing process. While doing so they will also be identifying vulnerabilities in the applications of the enterprise by configuring scan settings for effective vulnerability enumeration, Identify and document findings, approve false positives and define/document approved mitigations used by AppSec Testers. Experience Level:8 years Location:Hyderabad or Bengaluru Roles and Responsibilities: Perform SAST/SCA/DAST scans using industry vulnerability scanner SAST/SCA Veracode, using supplied compiled binary, configure scan platform to correct scan for both static code CWEs as well as SCA derived CVEs. Work will include coordination with app owner to ensure all branches of code are included in compiled binary file. DAST Work begins with crawling the target application to identify existing directory and file structure. Once identified, execute DAST scan using HCL product to identify dynamic issue only visible during code execution. This person will be primarily tasked to execute scan retest by performing revalidation tests of previously identified critical and high severity vulnerabilities as requested by the client application teams. During testing process, tester MUST ensure application is not degraded and/or taken out of service due to scanning activities. Tester must ensure results from scanner are present in Vulnerability reporting platforms and visible to approved app users. Perform manual validation and false positive analysis on the automated scan results. Provide remediation support will analyze the top rated vulnerabilities along with provide support to application teams on remediation strategies from identified risks. Primary / Mandatory skills:Overall 8+ years of IT experience 7+ years of application security Experience 5+ years of Application Security testing Experience Bachelor's degree required. Deep familiarity with the OWASP Top 10 and other security concerns for web applications Deep Understanding of OWASP Application Security Verification Standards (ASVS) Deep understanding of SAST, DAST, SCA Scanning practices Experience in scanning leveraging Veracode, Appscan.or other enterprise tools. Understand how to interpret and assess CVEs (Common Vulnerability and Exposures) and CWEs (Common Weakness Enumeration) as found by scanning tools. Understanding of SAST, DAST tools and dependency scanning tools Experience working/integrating with secret management systems. Advanced knowledge of front end and back end web application development in at least one technology stack (.NET, Java, PHP, Ruby/Rails, Angular, Node.js, etc.) Track record of staying current with trends, techniques, tools, and processes that drive improvement of security posture of applications. Strong documentation skills Excellent verbal and written communication skills, with proven technical writing abilities (English language proficiency required) Team oriented thinking with demonstrated ability to produce high quality work as part of a fast paced, dynamic team. Proven ability to communicate, collaborate, and present effectively with teams and individuals in different disciplines or areas. Technical Skills:SAST, DAST, SCA Additional information (if any):Flexible to provide coverage in US morning hours upon need."

Posted 3 months ago

Apply

8 - 13 years

20 - 32 Lacs

Noida

Work from Office

Naukri logo

8+ years Hands-on experience in 2 or more of the Vuln Assessment tools and Vuln. Lifecycle management. Well conversant in Rapid7 VM Tools and Features. Working Knowledge in CrowdStrike Falcon is also desired.

Posted 3 months ago

Apply

3 - 7 years

2 - 6 Lacs

Ahmedabad

Work from Office

Naukri logo

Understand VAPT Reports & Provides VAPT solutions to the Clients. Provide technical support, Perform regular internal & external security audits Manage the Antivirus , DLP & Anti-malware Software Inform management of security vulnerabilities Required Candidate profile Thorough knowledge on Operating Systems as well as their File Systems and security features is a must, Linux & Windows being the most prominent. Engage in 'Ethical Hacking' Analytical mindset

Posted 3 months ago

Apply

9 - 13 years

25 - 30 Lacs

Bengaluru

Work from Office

Naukri logo

Could you be the full-time Cybersecurity IT Architect in [Bangalore] we're looking for? Your future role Take on a new challenge and apply your extensive cybersecurity expertise in a new cutting-edge field. You'll work alongside innovative, dedicated, and collaborative teammates. You'll lead the design and maintenance of our Cybersecurity Platform (CSP) for international railway projects, ensuring the highest security standards. Day-to-day, you'll work closely with teams across the business (System Engineering Managers, IT Engineers), spearhead application selection, and much more. You'll specifically take care of documenting requirement specifications and design reviews, but also provide expert support to projects in case of configuration or deployment issues. We'll look to you for: Deriving specifications of Linux IT modules within the CSP services Leading architecture, design, and integration activities of Linux IT services Adapting Linux modules to meet project-specific needs and regulations Documenting technical specifications and contributing to design reviews Supporting penetration testing and reviewing test procedures Contributing to stakeholder training and supporting tendering activities All about you We value passion and attitude over experience. That's why we don't expect you to have every single skill. Instead, we've listed some that we think will help you succeed and grow in this role: University/Engineering degree Experience or understanding of Linux-based solution design and deployment Knowledge of virtualization concepts and technologies Familiarity with IT/OT environments A certification in relevant IT fields (desirable) Strong documentation and presentation skills Ability to communicate and collaborate effectively with diverse teams Things you'll enjoy Join us on a life-long transformative journey the rail industry is here to stay, so you can grow and develop new skills and experiences throughout your career. You'll also: Enjoy stability, challenges and a long-term career free from boring daily routines Work with cutting-edge security standards for rail signalling Collaborate with transverse teams and helpful colleagues Contribute to innovative projects that shape the future of mobility Utilise our flexible working environment Steer your career in whatever direction you choose across functions and countries Benefit from our investment in your development, through award-winning learning Progress towards leadership roles within cybersecurity and IT architecture Benefit from a fair and dynamic reward package that recognises your performance and potential, plus comprehensive and competitive social coverage (life, medical, pension)

Posted 3 months ago

Apply

0 - 7 years

20 - 25 Lacs

Bengaluru

Work from Office

Naukri logo

Amazon Music is an immersive audio entertainment service that deepens connections between fans, artists, and creators. From personalized music playlists to exclusive podcasts, concert livestreams to artist merch, Amazon Music is innovating at some of the most exciting intersections of music and culture. We offer experiences that serve all listeners with our different tiers of service: Prime members get access to all the music in shuffle mode, and top ad-free podcasts, included with their membership; customers can upgrade to Amazon Music Unlimited for unlimited, on-demand access to 100 million songs, including millions in HD, Ultra HD, and spatial audio; and anyone can listen for free by downloading the Amazon Music app or via Alexa-enabled devices. Join us for the opportunity to influence how Amazon Music engages fans, artists, and creators on a global scale. A Software Design Engineer in Test (SDET) at Amazon is a developer with the primary responsibility of writing frameworks and tools to test products. It is a very unique and challenging role and provides immense opportunity to design and develop wide-reaching tools. It combines the "building" aspect of software design engineering with the "breaking" aspect of software test engineering. Our team is focused on building a personalized, curated, and seamless music experience. We want to help our customers discover up-and-coming artists, while also having access to their favorite established musicians. We build systems that are distributed on a large scale that can support Amazon s global platform, and customer base. Come innovate with the Amazon Music team! A Software Design Engineer in Test (SDET) at Amazon is a developer with the primary responsibility of writing frameworks and tools to test products. It is a very unique and challenging role and provides immense opportunity to design and develop wide-reaching tools. It combines the "building" aspect of software design engineering with the "breaking" aspect of software test engineering. SDET responsibilities include: - Design and scale the device lab and automation for multiple platform teams (Android, iOS, Fire Tablet, Voice and Desktop). - Design and implement automation framework that work across multiple platforms. - Lead automation efforts, and explore new test automation tools and methods. - Defining automation plan to support international app releases. - Establish processes and tool set to maintain automation scripts and generate regular test reports. - Working directly with Developers, QA Engineers, Product Managers, Software Dev Managers and Technical Program Managers to ensure quality of our platforms and international launches. - Working with many cross teams to support automation infrastructure. - 2+ years of test automation frameworks and tools building experience - 2+ years of non-internship professional software development testing experience - Experience programming with at least one modern language such as Java, C++, or C# including object-oriented design - Experience in penetration testing and exploitability-focused vulnerability assessment - Experience in platform-level security mitigations and hardening for Linux and Windows

Posted 3 months ago

Apply

10 - 14 years

12 - 16 Lacs

Bengaluru

Work from Office

Naukri logo

CIO Security and Application Engineer About Accenture:"" Accenture is a global professional services company with leading capabilities in digital, cloud and security. Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Interactive, Technology and Operations services"all powered by the world's largest network of Advanced Technology and Intelligent Operations centers. Our +700. 000 people deliver on the promise of technology and human ingenuity every day, serving clients in more than 120 countries. We embrace the power of change to create value and shared success for our clients, people, shareholders, partners, and communities. Visit us at . Job description : We are seeking an experienced Security and Application Engineer to lead the successful mobilization and delivery of Access Control & CCTV Technology Projects. This role involves supporting enterprise-level application selection and implementation, including migrating from legacy systems. The incumbent will implement physical security standards in Accenture facilities and provide essential support to Global Assistance and Protection (GAP) business partners, vendors, and facilities team members. Responsibilities include delivering security projects within a complex corporate environment that values collaboration, independent thinking, proactive problem-solving, integrity, efficiency, and continuous organizational transformation. Responsibilities/Accountabilities: Responsible for leading the global team for day-to-day operations of the access control, security video, and mass notification systems . Responsible for identifying talent / experience gaps within team and creating a global plan to improve overall operational support and business resiliency . Responsible for ensuring completion of system projects, including requirements gathering, system / solutions design, deployment within agreed deadlines and budget, and any potential issues escalated in line with internal policy while maintaining the clients' best interests . Initial consultation with clients to develop the client requirements / scope of works . Act as a point of escalation for the group both technically and operationally . Prepare an outline and detailed e nterprise a rchitecture, s olutions d esign, and associated documentation . Prepare technical specifications, solutions design information, system schematics, etc. Support the system implementation / deployment activities, including active involvement in the set-up, programming, configuration, and implementation activities . Support commissioning activities and project completion activities . Qualifications Qualifications : A bachelors degree in engineering or computer science or related field or an associates degree or equivalent with sufficient experience. 15+ years experience in physical security field and 10+ years experience in program and team leadership.? E xperience d in the practical design and implementation of electronic and security systems . Genetec Security Center Omnicast technical and enterprise certified preferred . Preferred Software House CCure 9000 Level 4 Enterprise Certified . Mandatory L1 certified . E xperience managing enterprise deployment s for Genetec and CCure 9000 across geographic regions . Experience managing local on-premises hosting environments as well as cloud-based solutions to include Azure / AWS for CCure and Azure / Stratocast for Genetec . Experience managing HID and Software House access control hardware . High-level proficiency and expertise relevant to the design, deployment, and management of integrated e nterprise physical and technical security systems (this will include a comprehensive understanding of ICT Infrastructure, Hosting Arrangement and Networks) . Proven technical experience in designing, managing, and delivering physical security systems / application projects within a corporate security environment . Knowledge of Physical Security Information Management and network security measures. K nowledge in Database and Network Management, software applications, protocols, and standards. Hands-on hardware troubleshooting experience. Enterprise automated physical access control and intrusion detection (ACS/IDS) systems . Capable of managing complex stakeholder environments . Candidates will require the skills and aptitude to drive decisions quickly and efficiently . Proven record of successful physical security system implementations / migrations . Capable of delivering quality solutions and outcomes within complex and time-sensitive environments . A high level of expertise and experience in electronic security system upgrades and migrations . Experience of producing technical reports . Ability to identify and meet project deadlines and deliverables . Strong written and verbal communication skills with both internal and external parties .

Posted 3 months ago

Apply

4 - 8 years

6 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role : As a Senior Vulnerability Management Specialist, you will be a key member of our cybersecurity team responsible for managing and enhancing our vulnerability management program. Leveraging your extensive experience with Nessus and other vulnerability assessment tools, you will play a critical role in identifying, prioritizing, and mitigating security vulnerabilities across our clients' environments. Lead the development and implementation of the vulnerability management strategy, policies, and procedures. Conduct regular vulnerability assessments and penetration tests using Nessus and other industry-standard tools to identify security weaknesses in networks, systems, and applications. Analyze scan results and prioritize vulnerabilities based on severity, exploitability, and potential impact. Collaborate with cross-functional teams to develop and implement remediation plans to address identified vulnerabilities in a timely manner. Provide technical guidance and mentorship to junior members of the vulnerability management team. Stay abreast of emerging cyber threats, vulnerabilities, and industry best practices to continually improve the effectiveness of the vulnerability management program. Prepare and present reports on vulnerability assessment findings, remediation progress, and overall program effectiveness to senior management and clients. Primary Skills Vulnerability Management Vulnerability Assessment Nessus Rapid 7 Skills (competencies) Agile (Software Development Framework) Analytical Thinking AWS Architecture Business Acumen Capgemini Integrated Architecture Framework (IAF) Cloud Architecture Coaching Collaboration Commercial Awareness Cryptography DevOps Financial Awareness Google Cloud Platform (GCP) Incident Management Innovation Negotiation Penetration Testing Risk Assessment Risk Management Security Threat Recognition Security Vulnerability Recognition Sherwood Applied Business Security Architecture (SABSA) methodology Stakeholder Management StorageArchitecture Strategic Planning Technical Governance TOGAF (Framework) Verbal Communication Written Communication

Posted 3 months ago

Apply

4 - 9 years

6 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

About The Role : Initiates the design, development, execution, and implementation of scientific research projects to fuel growth in secure computing, cryptographic algorithms, communication, memory, networking, intellectual property, and new business opportunities. Applies scientific research principles and concepts to potential inventions and products to define and architect secure design, development, and operation of Intel's hardware and software products and services. Ensures products conform to standards and specifications. Evaluates threat assessments, security components design and conducts vulnerability assessments. Identifies new vulnerabilities and gaps in existing security test automation and develops tools and processes to close the gap. Works with other security researchers to develop evolving ethical hacking skills and networking product knowledge. Maintains substantial knowledge of state of threat security principles, theories, and attacks and contributes to literature and conferences participating in intellectual property development. Develops security related project plans and cost estimates, assesses projects risks, and responds to customer/client requests or events as they occur. Research technological trends, enables partnerships and collaboration among industry, academia, standards bodies, product, and other technical groups to address important technology and customer issues, and finds innovative solutions to difficult problems for midterm or long-term time frames. Influences external research, disseminates results, and raises the profile of conducted research through scientific publications, patents, talks, and Intel internal or external outreach efforts. Performs research to define boundaries and create proof of concepts or prototype new ideas including test chips and competitive analysis versus industry trends. Works with engineering design teams to determine product requirements and the feasibility of new technology adoption and robustness of secure product design. Recommends features and influences future Intel product roadmap. Qualifications Minimum Qualifications: Master of Science (M.S.) degree in Electrical Engineering, Computer Engineering, or Computer Information Systems with 4+ years of experience in Security Domain. Proficiency in C, Kernel, Assembly, and Python programming. Strong understanding of CPU Architecture and Micro-Architecture. Experience in building and debugging kernels and writing kernel modules. Experience using configuration management tools like GitHub. Experience in developing automated applications, tools and exploits. Familiarity of Secure development life cycle and Static Analysis Tools, Penetration Testing Tools, Security Auditing Tools. Solid knowledge of hardware validation/debug, software validation/testing. Excellent team player with strong English communication skills. Preferred Qualifications: Demonstrable knowledge of security practices, computer architecture, and participation in conferences focused on secure design. Experience in writing AI workloads for accelerators. Proficiency in security fuzzing using AFL. Any experience in hardware validation/debug is a plus. Any experience in project management is a plus. Inside this Business Group The Data Center & Artificial Intelligence Group (DCAI) is at the heart of Intel's transformation from a PC company to a company that runs the cloud and billions of smart, connected computing devices. The data center is the underpinning for every data-driven service, from artificial intelligence to 5G to high-performance computing, and DCG delivers the products and technologiesspanning software, processors, storage, I/O, and networking solutionsthat fuel cloud, communications, enterprise, and government data centers around the world.

Posted 3 months ago

Apply

12 - 17 years

14 - 19 Lacs

Gurgaon

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NA Minimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary:As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Expected to provide solutions to problems that apply across multiple teams- Develop and implement security architecture solutions- Conduct security assessments and provide recommendations- Stay updated on the latest security trends and technologies Professional & Technical Skills:- Must To Have Skills:Proficiency in SailPoint IdentityNow- Strong understanding of cloud security principles- Experience in implementing security controls in cloud environments- Knowledge of industry-standard security frameworks- Excellent communication and presentation skills Additional Information:- The candidate should have a minimum of 12 years of experience in SailPoint IdentityNow- This position is based at our Gurugram office- A 15 years full time education is required Qualifications 15 years full time education

Posted 3 months ago

Apply

5 - 10 years

7 - 12 Lacs

Coimbatore

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Architecture Design Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary:As a Security Architect, you will be responsible for defining the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your role will involve documenting the implementation of cloud security controls and transitioning to cloud security-managed operations. You will play a crucial role in safeguarding our organization's digital assets and ensuring the security of our cloud infrastructure. Roles & Responsibilities:- Expected to be an SME, collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and maintain the cloud security framework and architecture.- Ensure that the cloud security controls are implemented effectively.- Collaborate with stakeholders to understand business requirements and performance goals.- Document the implementation of cloud security controls.- Transition to cloud security-managed operations. Professional & Technical Skills:- Must To Have Skills:Proficiency in Security Architecture Design.- Strong understanding of cloud security principles and best practices.- Experience in designing and implementing security controls for cloud environments.- Knowledge of cloud platforms such as AWS, Azure, or Google Cloud.- Familiarity with security frameworks and standards such as ISO 27001 and NIST.- Experience in conducting security risk assessments and vulnerability assessments. Additional Information:- The candidate should have a minimum of 5 years of experience in Security Architecture Design.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualifications 15 years full time education

Posted 3 months ago

Apply

7 - 12 years

9 - 14 Lacs

Chennai

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : Bachelor or college degree in related field or equivalent work experience Summary:As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Lead security assessments and provide recommendations- Develop security architecture and design for cloud environments Professional & Technical Skills:- Must To Have Skills:Proficiency in SailPoint IdentityIQ- Strong understanding of cloud security principles- Experience in implementing security controls in cloud environments- Knowledge of industry security standards and best practices- Hands-on experience with security tools and technologies Additional Information:- The candidate should have a minimum of 7.5 years of experience in SailPoint IdentityIQ- This position is based at our Chennai office- A Bachelor or college degree in related field or equivalent work experience is required Qualifications Bachelor or college degree in related field or equivalent work experience

Posted 3 months ago

Apply

7 - 12 years

9 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : NA Minimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary:As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will also document the implementation of the cloud security controls and transition to cloud security-managed operations. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Lead security assessments and provide recommendations- Develop security architecture standards and guidelines- Conduct security reviews and audits Professional & Technical Skills:- Must To Have Skills:Proficiency in SailPoint IdentityIQ- Strong understanding of cloud security principles- Experience in designing and implementing security solutions for cloud environments- Knowledge of industry standards and best practices in cloud security- Hands-on experience with security tools and technologies Additional Information:- The candidate should have a minimum of 7.5 years of experience in SailPoint IdentityIQ- This position is based at our Bengaluru office- A 15 years full time education is required Qualifications 15 years full time education

Posted 3 months ago

Apply

10 - 15 years

8 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

Experience: Minimum 10 years experience in information security Responsibilities: Conduct threat modeling and risk assessments to evaluate potential security risks associated with the organization Provide guidance on risk remediation strategies and the implementation of countermeasures to address identified security risks Ensure GDPR PCI-DSS compliance across all areas of the organization Work with the development team to ensure compliance with SDLC lifecycle and secure coding practices Lead encryption efforts and disable deprecated protocols to maintain data security while in transit or at rest Incorporate NIST framework into the organizations security practices and stay up-to-date with the latest controls Review penetration testing reports, static and dynamic application security testing results, SaaS platforms, Azure Defender reports, and third-party application integration risks to identify vulnerabilities and evaluate overall security posture Provide expertise in security and network architecture and design Create comprehensive data flow diagrams to identify potential threats and identify areas for improvement Evaluate cloud security posture and provide recommendations to enhance overall security Continuously identify potential flaws in the entire architecture and implement security controls and practices to prevent future breaches

Posted 3 months ago

Apply

0 - 7 years

19 - 21 Lacs

Bengaluru

Work from Office

Naukri logo

Amazon Music is an immersive audio entertainment service that deepens connections between fans, artists, and creators. From personalized music playlists to exclusive podcasts, concert livestreams to artist merch, Amazon Music is innovating at some of the most exciting intersections of music and culture. We offer experiences that serve all listeners with our different tiers of service: Prime members get access to all the music in shuffle mode, and top ad-free podcasts, included with their membership; customers can upgrade to Amazon Music Unlimited for unlimited, on-demand access to 100 million songs, including millions in HD, Ultra HD, and spatial audio; and anyone can listen for free by downloading the Amazon Music app or via Alexa-enabled devices. Join us for the opportunity to influence how Amazon Music engages fans, artists, and creators on a global scale. A Software Design Engineer in Test (SDET) at Amazon is a developer with the primary responsibility of writing frameworks and tools to test products. It is a very unique and challenging role and provides immense opportunity to design and develop wide-reaching tools. It combines the "building" aspect of software design engineering with the "breaking" aspect of software test engineering. Our team is focused on building a personalized, curated, and seamless music experience. We want to help our customers discover up-and-coming artists, while also having access to their favorite established musicians. We build systems that are distributed on a large scale that can support Amazon s global platform, and customer base. Come innovate with the Amazon Music team! A Software Design Engineer in Test (SDET) at Amazon is a developer with the primary responsibility of writing frameworks and tools to test products. It is a very unique and challenging role and provides immense opportunity to design and develop wide-reaching tools. It combines the "building" aspect of software design engineering with the "breaking" aspect of software test engineering. SDET responsibilities include: - Design and scale the device lab and automation for multiple platform teams (Android, iOS, Fire Tablet, Voice and Desktop). - Design and implement automation framework that work across multiple platforms. - Lead automation efforts, and explore new test automation tools and methods. - Defining automation plan to support international app releases. - Establish processes and tool set to maintain automation scripts and generate regular test reports. - Working directly with Developers, QA Engineers, Product Managers, Software Dev Managers and Technical Program Managers to ensure quality of our platforms and international launches. - Working with many cross teams to support automation infrastructure. - 1+ years of test automation frameworks and tools building experience - 2+ years of non-internship professional software development testing experience - Experience programming with at least one modern language such as Java, C++, or C# including object-oriented design - Experience in penetration testing and exploitability-focused vulnerability assessment - Experience in platform-level security mitigations and hardening for Linux and Windows

Posted 3 months ago

Apply

Exploring Penetration Testing Jobs in India

The field of penetration testing, also known as ethical hacking, is rapidly growing in India as organizations prioritize the security of their digital assets. Penetration testers play a crucial role in identifying vulnerabilities in systems, networks, and applications to help companies protect themselves from cyber threats. If you are considering a career in penetration testing in India, here is some valuable information to help you navigate the job market.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Mumbai
  5. Delhi

These cities are known for their thriving IT industries and have a high demand for skilled penetration testers.

Average Salary Range

The average salary for penetration testing professionals in India ranges from INR 4-6 lakhs per annum for entry-level positions to INR 12-18 lakhs per annum for experienced professionals. Salaries may vary based on location, company size, and level of expertise.

Career Path

A typical career path in penetration testing may include roles such as Junior Penetration Tester, Penetration Tester, Senior Penetration Tester, and eventually progressing to positions like Penetration Testing Team Lead or Chief Information Security Officer (CISO).

Related Skills

In addition to expertise in penetration testing tools and techniques, professionals in this field are often expected to have knowledge of networking, operating systems, coding/scripting languages, and cybersecurity best practices.

Interview Questions

  • What is the difference between penetration testing and vulnerability assessment? (basic)
  • Explain the steps involved in a penetration testing process. (medium)
  • How do you stay updated with the latest security trends and vulnerabilities? (basic)
  • Can you describe a recent penetration testing project you worked on? (medium)
  • What are common techniques used in social engineering attacks? (medium)
  • How would you prioritize vulnerabilities based on their severity? (medium)
  • What is the importance of a penetration testing report? (basic)
  • How do you handle ethical dilemmas in penetration testing? (medium)
  • Can you explain the concept of privilege escalation in penetration testing? (medium)
  • Describe a scenario where you encountered a challenging vulnerability and how you addressed it. (advanced)
  • What tools do you use for network reconnaissance in penetration testing? (basic)
  • How would you approach testing the security of a web application? (medium)
  • Explain the difference between black-box, white-box, and grey-box testing. (medium)
  • What are the limitations of automated penetration testing tools? (medium)
  • How do you ensure compliance with relevant regulations and standards in penetration testing? (medium)
  • Can you discuss the role of threat modeling in penetration testing? (medium)
  • Describe a time when you had to explain technical findings to non-technical stakeholders. (medium)
  • What is the impact of false positives in a penetration testing report? (medium)
  • How would you handle a situation where a client does not prioritize fixing critical vulnerabilities? (medium)
  • Have you ever discovered a zero-day vulnerability during a penetration test? (advanced)
  • How do you approach testing the security of IoT devices? (medium)
  • What are the best practices for securely storing and managing penetration testing results? (medium)
  • Can you explain the concept of a pivot in a penetration testing context? (medium)
  • How would you assess the security of a mobile application? (medium)
  • What steps do you take to ensure the confidentiality and integrity of sensitive data during a penetration test? (medium)

Conclusion

As the demand for cybersecurity professionals continues to rise, pursuing a career in penetration testing can be a rewarding and challenging path. By honing your skills, staying updated with industry trends, and preparing for interviews diligently, you can position yourself for success in this dynamic field. Good luck on your job search journey!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies