Jobs
Interviews

668 Qualys Jobs - Page 4

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! Qualys is a leading provider of cloud-based IT, security, and compliance solutions. Our platform helps businesses streamline security operations and lower the cost of compliance by delivering critical security intelligence on demand and automating the full spectrum of auditing, compliance, and protection. We are a trusted partner to some of the world’s largest organizations and continue to innovate at the intersection of cybersecurity and technology. Overview: We are seeking a proactive, detail-oriented Sourcing Specialist with a strong foundation in identifying and engaging top-tier engineering and technical talent . In this role, you will partner closely with recruiters and hiring managers to build diverse, high-quality candidate pipelines that align with our fast-paced and innovative work environment. Key Responsibilities: Collaborate with recruiters and hiring teams to understand role requirements and define sourcing strategies for technical roles (Java, Fullstack, UI, QA etc.). Proactively identify and engage passive talent using tools such as LinkedIn Recruiter, Naukri, Boolean searches, and talent databases. Maintain a strong pipeline of qualified candidates through talent mapping and continuous outreach. Develop and maintain sourcing dashboards and metrics to track pipeline health and performance. Promote Qualys' employer brand through candidate interactions and targeted outreach campaigns. Support diversity sourcing initiatives and contribute to inclusive hiring practices. Screen and qualify candidates before passing them to the recruiting team. Keep up-to-date with industry trends, new sourcing tools, and competitive intelligence in the cybersecurity and tech space. Qualifications: 2–4 years of experience in technical sourcing, preferably in a high-growth SaaS or cybersecurity company. Proven success sourcing for roles such as Software Engineers, Big Data Engineers, QA Engineers, or similar. Deep understanding of modern sourcing techniques, Boolean logic, and candidate engagement strategies. Proficiency with sourcing tools such as LinkedIn Recruiter, Naukri, Hireist, or equivalent platforms. Experience working with an ATS (Workday preferred). Strong interpersonal and communication skills with the ability to engage passive talent. Self-motivated, highly organized, and comfortable working in a fast-paced, collaborative environment. Bachelor's degree or equivalent work experience in Human Resources, Business, or related field. What We Offer: A chance to be part of a market leader in cloud security A collaborative, innovation-driven culture Opportunities to grow and make a global impact

Posted 1 week ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Our exciting Opportunity We are now looking for a Security Vulnerability Analyst professional for our security team. This job role is responsible for identifying, researching, prioritizing, remediating, and mitigating vulnerabilities as part of the vulnerability management practice. The professional will work alongside a highly Skilled, diverse team, making Sure that the information assets, that we are responsible to protect, are secured! We believe in trust – we trust each other to do the right things! We believe in taking decisions as close to the product and technical expertise as possible. We believe in Creativity – trying new things and learning from our mistakes. We believe in Sharing our insights and helping one another to build an even better user plane. We truly believe in happiness, we enjoy and feel passionate about what we do and value each other’s technical competence deeply. You will Daily operations and maintenance of vulnerability scanning tools and Supporting infrastructure Register the assets in the scanning tool and perform scanning as per the agreed schedule. Perform Vulnerability Management, including but not limited to: Supporting scan tools, executing vulnerability scans, CIS Hardening, performing analysis, recommending / tracking mitigations Monitor ticket / email queue for Vulnerability & Pen test request. Monitor email / Web based reporting of vulnerabilities from outside reporters. Responsible for Completion status and reporting Vulnerability assessment scan. Periodic validation of assets through Central depository. Perform, review and analyze security vulnerability data to identify applicability and false positives, recommend corrective actions for mitigation Publish report as per the defined schedule on identified security vulnerabilities as well the Control gaps identified during security Control review. Manage tracking and remediation of vulnerabilities by leveraging agreed-upon action plans and timelines with responsible technology developers and Support teams. Overall responsible for governance and tracking of Vulnerability Remediation action Plan Plan and handshake Vulnerability schedule with customer & stakeholders. Assist in metrics development and reporting. You must have Solid understanding of security controls (e.g. Access Control, auditing, authentication, encryption, integrity, physical security, and application security). Working knowledge of scanning tools (nessus, qualys, netsparker, Fortify, etc.) Strong understanding of enterprise, network, system and application level security issues understanding of enterprise Computing environments, distributed applications, and a Strong understanding of TCP/IP networks also with available security Control (technical & process Control) for respective layers The ability to provide Support after normal business hours The ability to work constructively under pressure Ability to work both in a team as well as individually participate in the out-of-hours on Call rotation, providing technical Support to the business for major and critical incidents Knowledge Sharing and Collaboration skills Deliver results and meet customer expectations excellent communication skills; English is a must Key qualifications: Bachelor's Degree (B.E./B.tech) in Computer science or related field. Experience: 5 years What’s in it for you? Here at Ericsson, our Culture is built on over a Century of courageous decisions. With us, you will no longer be dreaming of what the future holds – you will be redefining it. You won’t develop for the status quo, but will build what replaces it. Joining us is a Way to move your Career in any direction you want; with hundreds of Career opportunities in locations all over the world, in a place where Co-Creation and Collaboration are embedded into the walls. You will find yourself in a Speak-up environment where empathy and humanness Serve as cornerstones for how we work, and where work-life balance is a priority. Welcome to an inclusive, global Company where your opportunity to make an impact is endless. What happens once you apply? To prepare yourself for next steps, please explore here: https://www.ericsson.Com/en/careers/job-opportunities/hiring-process Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. We are committed to providing reasonable accommodations to all individuals participating in the application and interview process. If you need assistance or to request an accommodation due to a disability please reach out to Contact us We are proud to announce Ericsson India is ranked 19th among all 50 countries and is once again officially Great Place to Work Certified™ in 2024. Every year, more than 10,000 organizations from over 60 countries partner with the Great Place to Work® Institute for assessment, benchmarking and planning actions to strengthen their workplace culture and this Certification acknowledges our employees value their employee experience and our workplace culture. Primary country and city: India (IN) || Noida Req ID: 770318

Posted 1 week ago

Apply

0 years

3 - 7 Lacs

Hyderābād

On-site

Category IT Security / Cyber Security Location Hyderabad, Telangana Job family IT Security Shift Evening Employee type Regular Full-Time Job Description (Summary) The primary responsibilities include managing vulnerability assessments using the Qualys tool, creating detailed metrics and reports, and collaborating with relevant teams to ensure timely remediation of identified vulnerabilities. To ensure the organization's IT infrastructure remains secure by proactively identifying, assessing, and mitigating vulnerabilities through effective use of the Qualys tool and coordinated efforts with cross-functional teams. The basic purpose of this position is to safeguard the organization's digital assets by maintaining a robust vulnerability management program that prioritizes risk reduction and compliance with security policies. Perform daily vulnerability assessments, create weekly metrics and reports, and handle ad-hoc requests as they arise. Work on analytical projects to enhance the vulnerability management process and develop strategies to address identified security issues. Prepare and present metrics and reports to senior leadership, showcasing trends in vulnerabilities over the year and how they are being addressed. Produce reports daily, weekly, and as needed on vulnerability assessments and remediation efforts. Responsible for training new hires and occasionally participating in candidate interviews. Technical/Job Specific Knowledge Vulnerability Management: In-depth knowledge of vulnerability assessment, prioritization, and remediation processes. Qualys: Proficiency in using Qualys for scanning, identifying, and managing vulnerabilities across various environments. Security Frameworks: Familiarity with industry standards and frameworks such as OWASP, NIST, and CIS. Network Security: Understanding of network protocols, firewalls, and intrusion detection/prevention systems. Skills Analytical Skills: Strong analytical abilities to identify and assess vulnerabilities and their potential impact. Technical Aptitude: Competence in using security tools and technologies to perform thorough assessments. Problem-Solving: Effective problem-solving skills to develop and implement remediation plans. Communication: Clear and concise communication skills to report findings and collaborate with different teams. Attention to Detail: High level of attention View more

Posted 1 week ago

Apply

100.0 years

0 Lacs

Delhi

On-site

About Us At Kuoni Tumlare, we deliver truly inspiring and innovative solutions and experiences that create value both for our Partners and Society at large. Our wide portfolio of products and solutions is built on 100+ years of destination management experience. Our solutions include series tours, technical visits, educational tours, Japan specialist travel consulting, as well as meetings, incentives, conferences, and exhibitions. Our product portfolio includes MyBus excursions at destinations as well as guaranteed departure tours devised and delivered by our Seat-in-Coach specialists, Europamundo (EMV) and MyBus Landcruise. We cater to a wide range of customer needs in close collaboration with our trusted suppliers and powered by our team of destinations experts - enabling us to make a real difference to the world. About the Business / Function Proudly part of Kuoni Tumlare, TUMLARE SOFTWARE SERVICES (P) LTD. is a multinational technology support company that serves as a trusted technology partner for businesses since 1999. We also help established brands reimagine their business through digitalization. Job Overview As an IT Security Engineer, you are responsible for various IT Security matters, such as daily management and control of various cybersecurity products, support in identifying requirements and business cases for new and existing security solutions, extensive cooperation with multiple project and operation teams on different security-related topic, and much more. Key Responsibilities Vulnerability Management & Penetration Testing: Perform regular vulnerability assessments and penetration tests on servers, middleware, and public-facing web applications. Patch Management: Oversee the security and lifecycle management of operating systems and middleware platforms, including patch management, version upgrades (e.g., WebLogic, WebSphere), security updates SSL certificate management and user access controls to ensure secure and stable environments. Secure Coding Collaboration: Work closely with software development teams to enforce secure coding practices aligned with the OWASP security framework. Security Tools & Solutions Management: Administer and support security tools such as Netskope/Zscaler Cloud Security, firewalls, Web Application Firewalls (WAF) End Point Protection: Antivirus solutions (TrendMicro, McAfee/Trellix ePO). SIEM Monitoring & Management: Monitor and manage Security Information and Event Management (SIEM) systems to ensure timely detection and response to security events. Incident Response Handling: Lead incident response activities including investigation, containment, eradication, and root cause analysis of security incidents. Cross-Team Coordination: Collaborate with internal stakeholders and external service providers to resolve security issues and maintain compliance with organizational policies. Access Governance: Review and validate Change Requests, Privileged Access Requests, and other access control-related approvals. Audit & Compliance Support: Assist in internal and external security audits, including firewall reviews, and compliance checks. Manage Core IT Services Security: Administer and secure essential IT services including FTP, SFTP, IIS, Ports and implement Role-Based Access Control (RBAC) to enforce least-privilege access principles and ensure operational integrity. Knowledge, Skills, Experience, Qualifications Experience: 3+ years of hands-on experience. Technical Skills: Server: - Windows server (2016/2019/2022), Linux (RHEL, Ubuntu) Antivirus Solutions (McAfee Trellix ePO, Trend Micro) SIEM Platforms (e.g., Splunk) Vulnerability Scanning (Nessus, Qualys, OpenVAS) Penetration Testing Tools (Burp Suite, OWASP ZAP) Basic scripting (PowerShell, Bash) for automation of tasks CSI (Critical Security Incidents) framework, compliance and audit preparation Certification Certified Ethical Hacker (CEH) CompTIA Security+ CCNA- Cisco Certified network Associate What we offer Probation period - only 3 months. 5 Days Working Annual Bonus – as per company policy. Long Service Award. Paid leaves for Birthday and Wedding/Work Anniversary Learning Opportunity through an online learning platform with rich training courses and resources. Company Sponsored IT Certification - as per company policy Following insurance from Date of Joining: o Group Medical Insurance with Sum Insured of up to 5 Lakh o Term life Insurance - 3 times of your CTC o Accidental Insurance - 3 times of your CTC Employee Engagement Activities: o Fun Friday per week o Annual Off-Site Team Building o End Year Party o CSR programs o Global Employee Engagement Events Job Location - On site. Pitampura, Netaji Subhash Place, New Delhi - 110034. In case your profile is a match and in alignment with your career interests, then submit your updated Application directly on the link. Experience level: Mid

Posted 1 week ago

Apply

6.0 - 9.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! Job Description The Senior Recruiter will contribute to the overall technical recruitment strategy and processes for Qualys India. This role reports to the Senior Manager of Recruiting and partners with the key stakeholders to develop and deliver a talent acquisition strategy that identifies and engages top technical talent. The Senior Recruiter will play a key role in building the future workforce by actively creating recruiting processes, developing relationships with management and potential future employees. Shares the company vision with the potential employees, conducts assessments for those who meet the technical bar, and connects these potential employees with the hiring teams. Successful individual will be creative in their sourcing methods and strategies with a strong focus on understanding the marketplace, branding and overall culture. Principal Duties and Responsibilities: Screen and evaluate candidate qualifications against job requirements, and conduct interviews to determine overall fit Work with the broader Human Resources team, business leaders and other key stakeholders to define short and long-term talent acquisition goals Build relationships with hiring managers to understand their talent acquisition needs and translate those needs into a recruitment strategy with actionable recruitment plans in partnership with the Human Resources team Understand and balance department team needs and priorities with the priorities and needs of the business Practice full life-cycle recruiting from requisition approval to offer to acceptance Possess subject matter expertise in hiring and that ensures recruiting processes meet requirements Stay abreast of trends and compliance issues in recruiting; develop plans to change course or implement new recruitment strategies as required Desired Candidate: 6-9 years of recruiting experience in a fast-paced environment, preferably from a product or a startup environment. Must possess strong written and verbal communication skills Bachelor’s degree in any discipline Experience working in a software product or technology startup preferred Should have a strong knowledge of tools and resources surrounding the internet, social media and job board sites Must have an eye for talent with a strong ability to screen and recruit top talent with strong networking skills and a broad knowledge of the local market Ability to work in a dynamic environment and juggle multiple priorities Build a pipeline and bench strength for prospective future growth Be highly organized, efficient and manage time effectively Self-motivated and creative in sourcing candidates Strong customer service mindset, focused and responsive

Posted 1 week ago

Apply

1.5 - 3.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Our technology services client is seeking multiple System Administrator to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: System Administrator Experience: 1.5 - 3 Years Location: Chennai, Kolkata Notice Period: Immediate- 15 Days Mandatory Skills: VMware , Onpremise, Windows, VMare Configuration Job Description: Maintenance, Administration, Configuration, Monitoring and Troubleshooting of Windows 2012 / 2016 / 2019 / 2025 Servers. VMware vSphere Infrastructure - Installation, configuration, troubleshooting of VMware ESXi servers, Virtual appliance, vCenter, ESXI host upgrade and patching. Creating and managing VMware cluster, Enabling HA, and DRS features in a cluster. Configuration of Virtual switches, port groups and network connections Creating and managing standard templates and keeping them update. Deploying VMs from template and allocates resources as per client requirements. Security hardening of VMs and Esxi servers for security compliance. Performing snapshots, cloning, migrations of VMs Vulnerability Management - Assist in providing support and resolution for the Critical/High open vulnerabilities on Windows/ VMware Servers. Providing support to mitigate external Vulnerabilities reported by KPMG team. Coordinate with Server Owners to fix Application related vulnerabilities with the defined SLA. Providing support to raise a risk on insight360 portal for servers which have surpassed the SLA. Data Centre Operations - Installation, Configuration, Monitoring and Troubleshooting of physical servers like DELL PowerEdge, HP ProLiant, Cisco UCS servers. Coordination with OEM/Partners Technical Support Team to resolve problems. Support for Windows Defender, SOC SIEM, BigFix, Qualys, CIS CAT, SolarWinds team for installation, configuration, upgradation and troubleshooting of applications. Coordination with Backup team, Database and Network team to resolve problems. Incident and RITM Management - Work on Incidents, RITM raised for Server OS issue, backup failure, access management, performance alerts etc. Change Management – Work on Change Requests for Commission of new servers, Decommission, Operating system upgradation, IP change Activity, virtual machine CPU/Memory/Disk upgradation and others. Installation of monthly windows security updates for the on-prem windows servers. If you are interested, share the updated resume to hema.g@s3staff.com

Posted 1 week ago

Apply

100.0 years

0 Lacs

Delhi, India

On-site

About Us At Kuoni Tumlare, we deliver truly inspiring and innovative solutions and experiences that create value both for our Partners and Society at large. Our wide portfolio of products and solutions is built on 100+ years of destination management experience. Our solutions include series tours, technical visits, educational tours, Japan specialist travel consulting, as well as meetings, incentives, conferences, and exhibitions. Our product portfolio includes MyBus excursions at destinations as well as guaranteed departure tours devised and delivered by our Seat-in-Coach specialists, Europamundo (EMV) and MyBus Landcruise. We cater to a wide range of customer needs in close collaboration with our trusted suppliers and powered by our team of destinations experts - enabling us to make a real difference to the world. About the Business / Function Proudly part of Kuoni Tumlare, TUMLARE SOFTWARE SERVICES (P) LTD. is a multinational technology support company that serves as a trusted technology partner for businesses since 1999. We also help established brands reimagine their business through digitalization. Job Overview As an IT Security Engineer, you are responsible for various IT Security matters, such as daily management and control of various cybersecurity products, support in identifying requirements and business cases for new and existing security solutions, extensive cooperation with multiple project and operation teams on different security-related topic, and much more. Key Responsibilities Vulnerability Management & Penetration Testing: Perform regular vulnerability assessments and penetration tests on servers, middleware, and public-facing web applications. Patch Management: Oversee the security and lifecycle management of operating systems and middleware platforms, including patch management, version upgrades (e.g., WebLogic, WebSphere), security updates SSL certificate management and user access controls to ensure secure and stable environments. Secure Coding Collaboration: Work closely with software development teams to enforce secure coding practices aligned with the OWASP security framework. Security Tools & Solutions Management: Administer and support security tools such as Netskope/Zscaler Cloud Security, firewalls, Web Application Firewalls (WAF) End Point Protection: Antivirus solutions (TrendMicro, McAfee/Trellix ePO). SIEM Monitoring & Management: Monitor and manage Security Information and Event Management (SIEM) systems to ensure timely detection and response to security events. Incident Response Handling: Lead incident response activities including investigation, containment, eradication, and root cause analysis of security incidents. Cross-Team Coordination: Collaborate with internal stakeholders and external service providers to resolve security issues and maintain compliance with organizational policies. Access Governance: Review and validate Change Requests, Privileged Access Requests, and other access control-related approvals. Audit & Compliance Support: Assist in internal and external security audits, including firewall reviews, and compliance checks. Manage Core IT Services Security: Administer and secure essential IT services including FTP, SFTP, IIS, Ports and implement Role-Based Access Control (RBAC) to enforce least-privilege access principles and ensure operational integrity. Knowledge, Skills, Experience, Qualifications Experience: 3+ years of hands-on experience. Technical Skills: Server: - Windows server (2016/2019/2022), Linux (RHEL, Ubuntu) Antivirus Solutions (McAfee Trellix ePO, Trend Micro) SIEM Platforms (e.g., Splunk) Vulnerability Scanning (Nessus, Qualys, OpenVAS) Penetration Testing Tools (Burp Suite, OWASP ZAP) Basic scripting (PowerShell, Bash) for automation of tasks CSI (Critical Security Incidents) framework, compliance and audit preparation Certification Certified Ethical Hacker (CEH) CompTIA Security+ CCNA- Cisco Certified network Associate What We Offer Probation period - only 3 months. 5 Days Working Annual Bonus – as per company policy. Long Service Award. Paid leaves for Birthday and Wedding/Work Anniversary Learning Opportunity through an online learning platform with rich training courses and resources. Company Sponsored IT Certification - as per company policy Following insurance from Date of Joining: Group Medical Insurance with Sum Insured of up to 5 Lakh Term life Insurance - 3 times of your CTC Accidental Insurance - 3 times of your CTC Employee Engagement Activities: Fun Friday per week Annual Off-Site Team Building End Year Party CSR programs Global Employee Engagement Events Job Location - On site. Pitampura, Netaji Subhash Place, New Delhi - 110034. In case your profile is a match and in alignment with your career interests, then submit your updated Application directly on the link. Experience level: Mid

Posted 1 week ago

Apply

100.0 years

0 Lacs

Delhi, Delhi

On-site

About Us At Kuoni Tumlare, we deliver truly inspiring and innovative solutions and experiences that create value both for our Partners and Society at large. Our wide portfolio of products and solutions is built on 100+ years of destination management experience. Our solutions include series tours, technical visits, educational tours, Japan specialist travel consulting, as well as meetings, incentives, conferences, and exhibitions. Our product portfolio includes MyBus excursions at destinations as well as guaranteed departure tours devised and delivered by our Seat-in-Coach specialists, Europamundo (EMV) and MyBus Landcruise. We cater to a wide range of customer needs in close collaboration with our trusted suppliers and powered by our team of destinations experts - enabling us to make a real difference to the world. About the Business / Function Proudly part of Kuoni Tumlare, TUMLARE SOFTWARE SERVICES (P) LTD. is a multinational technology support company that serves as a trusted technology partner for businesses since 1999. We also help established brands reimagine their business through digitalization. Job Overview As an IT Security Engineer, you are responsible for various IT Security matters, such as daily management and control of various cybersecurity products, support in identifying requirements and business cases for new and existing security solutions, extensive cooperation with multiple project and operation teams on different security-related topic, and much more. Key Responsibilities Vulnerability Management & Penetration Testing: Perform regular vulnerability assessments and penetration tests on servers, middleware, and public-facing web applications. Patch Management: Oversee the security and lifecycle management of operating systems and middleware platforms, including patch management, version upgrades (e.g., WebLogic, WebSphere), security updates SSL certificate management and user access controls to ensure secure and stable environments. Secure Coding Collaboration: Work closely with software development teams to enforce secure coding practices aligned with the OWASP security framework. Security Tools & Solutions Management: Administer and support security tools such as Netskope/Zscaler Cloud Security, firewalls, Web Application Firewalls (WAF) End Point Protection: Antivirus solutions (TrendMicro, McAfee/Trellix ePO). SIEM Monitoring & Management: Monitor and manage Security Information and Event Management (SIEM) systems to ensure timely detection and response to security events. Incident Response Handling: Lead incident response activities including investigation, containment, eradication, and root cause analysis of security incidents. Cross-Team Coordination: Collaborate with internal stakeholders and external service providers to resolve security issues and maintain compliance with organizational policies. Access Governance: Review and validate Change Requests, Privileged Access Requests, and other access control-related approvals. Audit & Compliance Support: Assist in internal and external security audits, including firewall reviews, and compliance checks. Manage Core IT Services Security: Administer and secure essential IT services including FTP, SFTP, IIS, Ports and implement Role-Based Access Control (RBAC) to enforce least-privilege access principles and ensure operational integrity. Knowledge, Skills, Experience, Qualifications Experience: 3+ years of hands-on experience. Technical Skills: Server: - Windows server (2016/2019/2022), Linux (RHEL, Ubuntu) Antivirus Solutions (McAfee Trellix ePO, Trend Micro) SIEM Platforms (e.g., Splunk) Vulnerability Scanning (Nessus, Qualys, OpenVAS) Penetration Testing Tools (Burp Suite, OWASP ZAP) Basic scripting (PowerShell, Bash) for automation of tasks CSI (Critical Security Incidents) framework, compliance and audit preparation Certification Certified Ethical Hacker (CEH) CompTIA Security+ CCNA- Cisco Certified network Associate What we offer Probation period - only 3 months. 5 Days Working Annual Bonus – as per company policy. Long Service Award. Paid leaves for Birthday and Wedding/Work Anniversary Learning Opportunity through an online learning platform with rich training courses and resources. Company Sponsored IT Certification - as per company policy Following insurance from Date of Joining: o Group Medical Insurance with Sum Insured of up to 5 Lakh o Term life Insurance - 3 times of your CTC o Accidental Insurance - 3 times of your CTC Employee Engagement Activities: o Fun Friday per week o Annual Off-Site Team Building o End Year Party o CSR programs o Global Employee Engagement Events Job Location - On site. Pitampura, Netaji Subhash Place, New Delhi - 110034. In case your profile is a match and in alignment with your career interests, then submit your updated Application directly on the link. Experience level: Mid

Posted 1 week ago

Apply

0.0 - 5.0 years

0 Lacs

Pune, Maharashtra

On-site

Pune,Maharashtra,India +2 more Job ID 770318 Our exciting Opportunity We are now looking for a Security Vulnerability Analyst professional for our security team. This job role is responsible for identifying, researching, prioritizing, remediating, and mitigating vulnerabilities as part of the vulnerability management practice. The professional will work alongside a highly Skilled, diverse team, making Sure that the information assets, that we are responsible to protect, are secured! We believe in trust – we trust each other to do the right things! We believe in taking decisions as close to the product and technical expertise as possible. We believe in Creativity – trying new things and learning from our mistakes. We believe in Sharing our insights and helping one another to build an even better user plane. We truly believe in happiness, we enjoy and feel passionate about what we do and value each other’s technical competence deeply. You will Daily operations and maintenance of vulnerability scanning tools and Supporting infrastructure Register the assets in the scanning tool and perform scanning as per the agreed schedule. Perform Vulnerability Management, including but not limited to: Supporting scan tools, executing vulnerability scans, CIS Hardening, performing analysis, recommending / tracking mitigations Monitor ticket / email queue for Vulnerability & Pen test request. Monitor email / Web based reporting of vulnerabilities from outside reporters. Responsible for Completion status and reporting Vulnerability assessment scan. Periodic validation of assets through Central depository. Perform, review and analyze security vulnerability data to identify applicability and false positives, recommend corrective actions for mitigation Publish report as per the defined schedule on identified security vulnerabilities as well the Control gaps identified during security Control review. Manage tracking and remediation of vulnerabilities by leveraging agreed-upon action plans and timelines with responsible technology developers and Support teams. Overall responsible for governance and tracking of Vulnerability Remediation action Plan Plan and handshake Vulnerability schedule with customer & stakeholders. Assist in metrics development and reporting. You must have Solid understanding of security controls (e.g. Access Control, auditing, authentication, encryption, integrity, physical security, and application security). Working knowledge of scanning tools (nessus, qualys, netsparker, Fortify, etc.) Strong understanding of enterprise, network, system and application level security issues understanding of enterprise Computing environments, distributed applications, and a Strong understanding of TCP/IP networks also with available security Control (technical & process Control) for respective layers The ability to provide Support after normal business hours The ability to work constructively under pressure Ability to work both in a team as well as individually participate in the out-of-hours on Call rotation, providing technical Support to the business for major and critical incidents Knowledge Sharing and Collaboration skills Deliver results and meet customer expectations excellent communication skills; English is a must Key qualifications: Bachelor's Degree (B.E./B.tech) in Computer science or related field. Experience: 5 years What’s in it for you? Here at Ericsson, our Culture is built on over a Century of courageous decisions. With us, you will no longer be dreaming of what the future holds – you will be redefining it. You won’t develop for the status quo, but will build what replaces it. Joining us is a Way to move your Career in any direction you want; with hundreds of Career opportunities in locations all over the world, in a place where Co-Creation and Collaboration are embedded into the walls. You will find yourself in a Speak-up environment where empathy and humanness Serve as cornerstones for how we work, and where work-life balance is a priority. Welcome to an inclusive, global Company where your opportunity to make an impact is endless. What happens once you apply? To prepare yourself for next steps, please explore here: https://www.ericsson.Com/en/careers/job-opportunities/hiring-process Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply?

Posted 1 week ago

Apply

0.0 - 10.0 years

0 Lacs

Pune, Maharashtra

On-site

Pune,Maharashtra,India +2 more Job ID 770317 Long Description Our exciting Opportunity We are now looking for a Security Vulnerability Engineer for our security team. This job role is responsible for identifying, researching, prioritizing, remediating, and mitigating vulnerabilities as part of the vulnerability management practice. The professional will work alongside a highly Skilled, diverse team, making Sure that the information assets, that we are responsible to protect, are secured! We believe in trust – we trust each other to do the right things! We believe in taking decisions as close to the product and technical expertise as possible. We believe in Creativity – trying new things and learning from our mistakes. We believe in Sharing our insights and helping one another to build an even better user plane. We truly believe in happiness, we enjoy and feel passionate about what we do And value each other’s technical competence deeply. You will Daily operations and maintenance of vulnerability scanning tools and Supporting infrastructure Register the assets in the scanning tool and perform scanning as per the agreed schedule. Perform Vulnerability Management, including but not limited to: Supporting scan tools, executing vulnerability scans, performing analysis, recommending / tracking mitigations Periodic validation of assets through Central depository. Register assets in scanning tool and perform periodic scans. Perform, review and analyze security vulnerability data & CIS Hardening data to identify applicability and false positives, recommend corrective actions for mitigation Publish report as per the defined schedule on identified security vulnerabilities & CIS Hardening as well the Control gaps identified during security Control review. Overall responsible for governance and tracking of Vulnerability Remediation action Plan Maintain risk register for exploitable Vulnerability & discuss remediation with stakeholders Act on after hours (on-Call Support) for IT security incidents as required Analyze results of Web application assessment and provide executive reports with recommendations for mitigation. Perform, review and analyze security vulnerability data to identify applicability and false positives, recommend corrective actions for mitigation publish report as per the defined schedule on identified security vulnerabilities as well the Control gaps identified during security Control review. Manage tracking and remediation of vulnerabilities by leveraging agreed-upon action plans and timelines with responsible technology developers and Support teams. Assist in metrics development and reporting. Devise methods to automate testing activities and Streamline testing processes Provide oral briefings to leadership and technical Staff, as necessary. Support and run vulnerability management scans of the customer systems (using tools like Tenable nessus, qualys, etc.) Plan and handshake Vulnerability schedule with customer & stakeholders. You must have Solid understanding of security controls (e.g. Access Control, auditing, authentication, encryption, integrity, physical security, and application security). Working knowledge of scanning tools (nessus, qualys, netsparker, Fortify, etc.) Strong understanding of enterprise, network, system and application level security issues Understanding of enterprise Computing environments, distributed applications, and a Strong understanding of TCP/IP networks also with available security Control (technical & process Control) for respective layers Experience writing technical reports and executive summaries. The ability to provide Support after normal business hours The ability to work constructively under pressure Ability to work both in a team as well as individually Participate in the out-of-hours on Call rotation, providing technical Support to the business for major and critical incidents Knowledge Sharing and Collaboration skills Deliver results and meet customer expectations Excellent communication skills; English is a must Key qualifications: Bachelor's Degree (B.E./B.tech) in Computer science or related field. Experience: 8-10 years What’s in it for you? Here at Ericsson, our Culture is built on over a Century of courageous decisions. With us, you will no longer be dreaming of what the future holds – you will be redefining it. You won’t develop for the status quo, but will build what replaces it. Joining us is a way To move your Career in any direction you want; with hundreds of Career opportunities in locations all over the world, in a place where Co-Creation and Collaboration are embedded into the walls. You will find yourself in a Speak-up environment where empathy and humanness Serve as cornerstones for how we work, and where work-life Balance is a priority. Welcome to an inclusive, global Company where your opportunity to make an impact is endless. What happens once you apply? To prepare yourself for next steps, please explore here: https://www.ericsson.Com/en/careers/job-opportunities/hiring-process Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply?

Posted 1 week ago

Apply

8.0 - 12.0 years

0 Lacs

karnataka

On-site

As a Threat and Vulnerability Management professional, you will utilize your 8 years of experience in the field to strengthen the security posture of the organization. This role is based in Bangalore and follows a hybrid mode of work under Full-Time Employment. Your primary responsibility will be to effectively manage threats and vulnerabilities by leveraging tools such as Qualys and applying your expertise in Vulnerability Management. You will work closely with various operating systems, focusing on operational improvement and implementing ITIL processes to ensure a robust security framework. Your contributions will play a crucial role in identifying and mitigating potential risks, thereby safeguarding the organization's assets and data. Strong attention to detail, analytical skills, and the ability to work collaboratively across teams will be essential for success in this role.,

Posted 1 week ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Job Description (Summary) The primary responsibilities include managing vulnerability assessments using the Qualys tool, creating detailed metrics and reports, and collaborating with relevant teams to ensure timely remediation of identified vulnerabilities. To ensure the organization's IT infrastructure remains secure by proactively identifying, assessing, and mitigating vulnerabilities through effective use of the Qualys tool and coordinated efforts with cross-functional teams. The basic purpose of this position is to safeguard the organization's digital assets by maintaining a robust vulnerability management program that prioritizes risk reduction and compliance with security policies. Perform daily vulnerability assessments, create weekly metrics and reports, and handle ad-hoc requests as they arise. Work on analytical projects to enhance the vulnerability management process and develop strategies to address identified security issues. Prepare and present metrics and reports to senior leadership, showcasing trends in vulnerabilities over the year and how they are being addressed. Produce reports daily, weekly, and as needed on vulnerability assessments and remediation efforts. Responsible for training new hires and occasionally participating in candidate interviews. Technical/Job Specific Knowledge Vulnerability Management: In-depth knowledge of vulnerability assessment, prioritization, and remediation processes. Qualys: Proficiency in using Qualys for scanning, identifying, and managing vulnerabilities across various environments. Security Frameworks: Familiarity with industry standards and frameworks such as OWASP, NIST, and CIS. Network Security: Understanding of network protocols, firewalls, and intrusion detection/prevention systems. Skills Analytical Skills: Strong analytical abilities to identify and assess vulnerabilities and their potential impact. Technical Aptitude: Competence in using security tools and technologies to perform thorough assessments. Problem-Solving: Effective problem-solving skills to develop and implement remediation plans. Communication: Clear and concise communication skills to report findings and collaborate with different teams. Attention to Detail: High level of attention

Posted 1 week ago

Apply

5.0 - 6.0 years

10 - 12 Lacs

Pune

Work from Office

Critical Skills to Possess: 5–6 years of experience in IT infrastructure, cybersecurity, or systems engineering with a strong specialization in patch management . Deep technical knowledge of Windows Server/Desktop and Linux environments , including patching methods, registry/system configurations, and troubleshooting. Hands-on expertise with one or more enterprise patching tools : SCCM/MECM, Ivanti, Tanium, BigFix, WSUS, ManageEngine, etc. Strong understanding of vulnerability scanning tools like Qualys, Tenable, or Rapid7 , and how they integrate with patching workflows. Excellent command of scripting (PowerShell, Bash, Python) for automation and reporting tasks. Experience working in or alongside a Security Operations Center or IT Security team. Strong analytical skills, attention to detail, and the ability to handle high-stakes environments with minimal supervision. Excellent communication skills with the ability to interact effectively with technical and non-technical stakeholders. Preferred Qualifications: BS degree in Computer Science or Engineering or equivalent experience Roles and Responsibilities Lead the end-to-end patch management process across Windows, Linux, and third-party applications in a multi-platform environment. Act as the technical SME (Subject Matter Expert) for patching within the SOC, mentoring junior team members and defining best practices. Collaborate with vulnerability management, threat intelligence, and infrastructure teams to prioritize patching based on business risk and threat exposure. Own and optimize patching tools and platforms such as SCCM, BigFix, Ivanti, Tanium, or ManageEngine , including tool maintenance, policy creation, and automation scripts. Design and implement scalable patch deployment strategies that minimize system downtime and align with SLAs. Generate detailed patch compliance reports , conduct risk-based exception handling, and support internal/external audits. Contribute to security governance by aligning patching activities with ISO 27001, NIST, CIS , and other regulatory standards. Conduct root cause analysis on patching failures and recurring vulnerabilities, proposing long-term mitigation strategies. Coordinate and lead patch management review meetings with stakeholders and IT leadership.

Posted 1 week ago

Apply

0 years

0 Lacs

India

On-site

About Allica Bank Allica is the UK’s fastest growing company - and the fastest-growing financial technology (Fintech) firm ever. Our purpose is to help established SMEs, one of the last major underserved opportunities in Fintech. Established SMEs are the backbone of local communities - representing over a third of our economy - yet have been largely neglected both by traditional high street banks and modern fintech providers. Department Description The Allica Security team play a key role in protecting the bank and are responsible for all aspects of security surrounding Applications, Infrastructure and Security Operational Policy. Our mission is to provide the best-in-class security to protect the bank. We live and breathe the Allica values and deliver services intelligently using automation, intelligence, and innovation. Role Description We are seeking a highly skilled and hands-on Security Operations Engineer to oversee security incident response, threat intelligence, and cloud security operations. This role requires deep technical expertise and a proactive mindset to defend against evolving cyber threats. The ideal candidate will also collaborate closely with DevOps and infrastructure teams to ensure security is embedded across all layers of our environment. Principal Accountabilities . Design, implement, and manage SIEM and EDR/XDR solutions to enhance detection and response capabilities. Conduct in-depth threat intelligence analysis, threat hunting activities, and digital forensics investigations. Ensure robust security posture across cloud platforms including Azure and GCP. Collaborate with DevOps teams to integrate security controls and testing into CI/CD pipelines. Develop automation scripts and detection rules using Python, PowerShell, or Bash. Support red teaming, adversary simulations, and penetration testing exercises. Drive compliance initiatives aligned with ISO 27001, NIST, and other recognized frameworks. Personal Attributes & Experience Expertise in Security Operations, Incident Response, or Threat Hunting. Strong hands-on expertise with SIEM, EDR/XDR, and threat intelligence platforms. Proven experience in securing cloud environments (Azure, GCP). Scripting and automation proficiency in Python, PowerShell, or Bash. Strong understanding of MITRE ATT&CK, OWASP Top 10, and cloud security architecture. Ability to work independently and lead initiatives in a dynamic, fast-paced environment. Experience with M365/O365 security. Experience with AAD Conditional Access, risky sign-ins, and MFA. Experience in Netskope DLP in the data protection and monitoring M365/O365 Data Loss Prevention experience desirable. Azure Cloud Security experience desirable. Strong sense of ownership, urgency, and drive. Ability to build partnerships. Interest in continuous learning. Preferred Tools & Platforms Experience Experience with the following tools will be considered an added advantage. Security & Threat Detection: CrowdStrike, Abnormal, ZeroFox, KnowBe4, RiskSmart Cloud & Endpoint Security: Azure, Intune, Netskope, Microsoft Purview, Gatekeeper Vulnerability & Risk Management: Qualys, RiskLedger, Easy DMARC Data Protection & Monitoring: Varonis Working at Allica Bank At Allica Bank we want to ensure our employees have the right tools and environment in which to succeed in their role and in support of our customers. Our employees are at the heart of everything we do, so our benefits are designed with you in mind: Full onboarding support and continued development opportunities Options for flexible working Regular social activities Pension contributions Discretionary bonus scheme Private health cover Life assurance Family friendly policies including enhanced Maternity & Paternity leave Don’t tick every box? Don’t worry if you don’t have all the skills or requirements listed on the job description. If you think you’ll be a good fit, we’d still love to hear from you! Flexible working We know the ‘9-to-5’ isn’t right for everyone. That’s why Allica Bank is fully committed to flexible and hybrid working. Please let us know what is best for you and, if we can, we will do our best to accommodate. Diversity We’re a diverse bunch here at Allica, with all kinds of experiences, backgrounds and lifestyles. Our openness and differences make us stronger, and we want everybody to feel comfortable bringing as much of themselves to work with them as they like.

Posted 1 week ago

Apply

3.0 - 8.0 years

9 - 19 Lacs

Noida, Gurugram

Work from Office

Airtel Business is looking for IT Security Analyst / L2 operation support for Security Services center Location : Noida Job Summary: This is an opportunity for a highly motivated individual to join a high energy team of security administrators responsible for managing global security infrastructure. This position is to be part of a global team, reporting to the Sr. Security Delivery Manager in Gurgaon. Responsibilities: As a member of the Security Operations Team Should have experience in Vulnerability Assessment and Penetration testing across Infra and Applications Hand-on experience with VA/ PT tools like Tenable etc. Perform asset and network discovery activities; infrastructure vulnerability testing, helping to ensure full coverage of the Epsilon environment Prioritizing remediation activities with operational teams through risk ratings of vulnerabilities and assets Vulnerability Analysis Creation. Produce vulnerability reports providing a highly timely; accurate; and actionable assessment of new vulnerabilities as they are discovered. Recommend security patches and any other measures; produce operations reports Support vulnerability scanning activities, interprets the results, and validates potential exposures; Collate security incident and event data to produce monthly exception and management reports Keep the Vulnerability Management Program in compliance with security policy and with published SLAs Leverage CMDB inventory and patch management systems to provide reporting and governance for vulnerability impact and remediation progress Monitor security vulnerability information from vendors, and third parties Assist in maintaining technical support documentation. Collaborate with Information Technology and Business Departments to implement or coordinate remediation required by audits, and document exceptions as necessary Skills/ Experience expected Ability to demonstrate knowledge with prioritizing remediation activities with operational teams through risk ratings of vulnerabilities and assets Experience in deploying, operating, and maintaining vulnerability scanning infrastructure and services Strong knowledge industry standards regarding vulnerability management including Common Vulnerabilities and Exposures (CVE), Common Vulnerability Scoring System (CVSS) and Open Web Application Security Project (OWASP) Perform initial analysis, identification, remediation, and documentation of network intrusions and computer system compromises Technical Skills: 3 to 5 years of experience Security Operations experience Ability to read, write and modify scripts for automation of vulnerability management tasks using Python, PowerShell, Ruby on Rails, and/ or Bash Good knowledge of packet filtering, stateful packet inspection and the differences between them Good knowledge of fundamental networking/distributed computing environment concepts; routing, switching, VLANs, VPNS, NIS, NFS. Intermediate to advanced understanding of packet capture and analysis using snoop, tcpdump and Ethereal or similar tools. Experience with host security (e.g., passwords, uids/gids, SIDs, file permissions, ACLs, filesystem integrity, use of security packages, IPTables). Familiarity with incident response techniques, intrusion prevention systems, information security methodologies, authentication protocols and different IT Security threat mechanisms. Knowledge of IT Security Standards (ISMS / ISO 27001, PCI-DSS etc.)

Posted 1 week ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Job Summary We are looking for a highly skilled DevOps Engineer with proven experience in managing cloud infrastructure, automation, and deployment pipelines. The ideal candidate will have hands-on expertise with AWS, Terraform, Ansible, GitHub Actions, Docker, and Kubernetes, along with strong foundational skills in systems administration and networking. You will play a key role in designing and maintaining scalable, secure, and highly available infrastructure for our applications, while driving automation and best practices across the organization. Key Responsibilities Design, implement, and manage cloud infrastructure on AWS. Automate infrastructure provisioning using Terraform and Ansible Build and maintain CI/CD pipelines using GitHub Actions Containerize applications using Docker and manage orchestration with Kubernetes and ECS Perform system administration on Linux or Windows servers Monitor infrastructure health and performance using tools like Site24x7, Dynatrace, New Relic, or PRTG Implement and maintain networking and security best practices (DNS, firewalls, SSL/TLS) Support vulnerability management using tools such as Qualys or Tenable Manage password vaults and access control using 1Password or Delinea/Thycotic Write and maintain basic Shell and Python scripts for automation tasks Must-Have Skills proficiency in AWS. Strong hands-on experience with Terraform and Ansible Experience with GitHub Actions Proficiency with Docker, Kubernetes, and ECS Good Linux or Windows administration skills Strong understanding of networking concepts (DNS, firewall, SSL, etc.)

Posted 1 week ago

Apply

5.0 years

0 Lacs

Uttar Pradesh, India

On-site

Job Description Be part of the solution at Technip Energies and embark on a one-of-a-kind journey. You will be helping to develop cutting-edge solutions to solve real-world energy problems. We are currently seeking Cybersecurity Risk Analyst to join our team based in Noida. The IT Risk Analyst reports directly to the IT Risk Manager and is in charge for Risk identification, assessment, mitigation and follow-up processes for both IT and OT environments. About us: Technip Energies is a global technology and engineering powerhouse. With leadership positions in LNG, hydrogen, ethylene, sustainable chemistry, and CO2 management, we are contributing to the development of critical markets such as energy, energy derivatives, decarbonization, and circularity. Our complementary business segments, Technology, Products and Services (TPS) and Project Delivery, turn innovation into scalable and industrial reality. Through collaboration and excellence in execution, our 17,000+ employees across 34 countries are fully committed to bridging prosperity with sustainability for a world designed to last. Global Business Services India At Technip Energies, we are continually looking for ways to become more efficient, and ways to improve our quality, customer focus and cost competitiveness. The Global Business Services (GBS) organization is key to executing this strategy, by standardizing our processes and centralizing our services. Our Vision : A customer-focused, cost-efficient, innovative, and high performing organization that drives functional excellence. GBS provide streamlined and consistent services to our internal customers in the domain of Finance and Accounting, Human Resources, Business Functional Support, Procurement and Legal. Our services fit our global organization and allow us to focus on business strategy and priorities. GBS also maintains continuous improvement plans to enhance our customer-oriented service culture. Responsibilities: Responsible for Digiteam and cybersecurity risk identification, assessment, mitigation and follow-up Maintains the documentation relating to risk management processes. Responsible for maintaining a Risk Register at group level Responsible for risk management Indicators (KRI) calculation and communication relating to the whole cybersecurity department. Collaborate with Security Operations Center (SOC) teams to analyze incident trends and integrate findings into risk assessments. Support the development and implementation of risk treatment plans, including technical controls and compensating measures About You At least 5 years of experience in IT Risk Management Certifications (preferred but not mandatory): ITIL, CRISC (Certified in Risk and Information Systems Control), CISM (Certified Information Security Manager), ISO 27005 Risk Manager Certification or equivalent on filed experience. Hands-on experience conducting cybersecurity risk assessments in hybrid environments (on-premises and cloud). Experience working with DevSecOps teams to integrate risk management into CI/CD pipelines. Familiarity with incident response processes and post-incident risk re-evaluation. Technical Skills Strong understanding of cyber threat intelligence and its application in risk management. Familiarity with GRC platforms (e.g., SureCloud, ServiceNow GRC) for risk tracking and reporting. Experience with vulnerability management tools (e.g., Tenable, Qualys, Rapid7) and interpreting scan results. Knowledge of cloud security frameworks (e.g., CSA CCM, Azure Security Benchmark, AWS Well-Architected Framework). Understanding secure architecture principles and ability to review system designs for risk exposure. Familiarity with compliance frameworks such as GDPR, SOX, and industry-specific standards (e.g., IEC 62443 for OT). Familiarity with ISO2700x, NIST, CIS frameworks. Your career with us: Working at Technip Energies is an inspiring journey, filled with groundbreaking projects and dynamic collaborations. Surrounded by diverse and talented individuals, you will feel welcomed, respected, and engaged. Enjoy a safe, caring environment where you can spark new ideas, reimagine the future, and lead change. As your career grows, you will benefit from learning opportunities at T.EN University, such as The Future Ready Program, and from the support of your manager through check-in moments like the Mid-Year Development Review, fostering continuous growth and development What’s next? Once receiving your application, our Talent Acquisition professionals will screen and match your profile against the role requirements. We ask for your patience as the team completes the volume of applications with reasonable timeframe. Check your application progress periodically via personal account from created candidate profile during your application. We invite you to get to know more about our company by visiting and follow us on LinkedIn, Instagram, Facebook, X and YouTube for company updates.

Posted 1 week ago

Apply

3.0 years

0 Lacs

Bengaluru

On-site

Company Description We are a consulting company with a bunch of technology-interested and happy people! We love technology, we love design and we love quality. Our diversity makes us unique and creates an inclusive and welcoming workplace where each individual is highly valued. With us, each individual is her/himself and respects others for who they are and we believe that when a fantastic mix of people gather and share their knowledge, experiences and ideas, we can help our customers on a completely different level. We are looking for you who is immediate joiner and want to grow with us! With us, you have great opportunities to take real steps in your career and the opportunity to take great responsibility. Job Summary: We are seeking a skilled and experienced Attack Surface Reduction Analyst with a strong foundation in penetration testing and vulnerability management to join our dynamic cybersecurity team. In this role, you will be instrumental in identifying and mitigating security risks across our systems, applications, and network infrastructure. You will also lead internal and third-party penetration testing initiatives and work closely with cross-functional teams to strengthen our overall security posture. Key Responsibilities Conduct comprehensive vulnerability assessments (VA) and penetration tests (PT) on systems, applications, and networks. Identify and assess security vulnerabilities using industry-standard tools and methodologies . Design and manage vulnerability management processes and drive effective remediation strategies. Coordinate and manage third-party penetration testing engagements and ensure alignment with security goals. Collaborate with IT and business teams to prioritize and remediate identified risks. Contribute to the development and maintenance of security policies, procedures, and standards . Continuously monitor systems for unauthorized access, suspicious activities, and emerging threats. Stay abreast of evolving cybersecurity trends , threat landscapes, and best practices in attack surface reduction . Required Qualifications Bachelors degree in Computer Science, Information Security, or related field. 3 to 5 years of hands-on experience in vulnerability scanning , penetration testing , and vulnerability management . In-depth knowledge of common vulnerabilities and exposures (CVEs) and attack vectors. Proficiency with tools such as Kali Linux, Qualys, Burp Suite , and other VA/PT platforms. Familiarity with security frameworks and standards (e.g., NIST, OWASP Top 10, CIS Controls). Strong analytical and problem-solving skills . Excellent written and verbal communication skills , including the ability to explain technical issues to non-technical stakeholders. Preferred Certifications (Certifications are a plus but not mandatory) OSCP , OSEP , SANS GIAC , CREST , CompTIA Security+ , or similar. Start : Immediate Location : Bangalore Form of employment: Full-time until further notice, we apply 6 months probationary employment. We interview candidates on an ongoing basis, do not wait to submit your application.

Posted 1 week ago

Apply

2.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Employment Type: Full-Time Experience: 2-3 Years Certifications: Qualys Certified Specialist (Preferred) Role Overview We are seeking a motivated and detail-oriented L1 Support Engineer to join our cybersecurity team with a focus on Qualys VMDR. The role involves monitoring, ticketing, and basic troubleshooting to ensure secure operations for enterprise environments. Key Responsibilities – Monitor VMDR dashboards and alerts for vulnerability detection and response. – Perform basic troubleshooting and escalate unresolved issues to L2 support. – Manage tickets and documentation using ITSM tools like ServiceNow or Jira. – Assist with configuration, scheduling, and scanning of assets. – Maintain accurate technical documentation and SOPs. Required Skills – Familiarity with Qualys VMDR and basic security tools. – Understanding of networking fundamentals (TCP/IP, ports, firewalls). – Experience with vulnerability scanning and remediation basics. – Excellent communication and documentation skills. – Willingness to work in shifts (24×7 support model if applicable). Preferred Certifications Qualys Certified Specialist (QCS), CompTIA Security+, or equivalent. Job Category: Security Support L1 Job Type: Full Time Job Location: Mumbai

Posted 1 week ago

Apply

0.0 years

0 Lacs

Hyderabad, Telangana

On-site

Category IT Security / Cyber Security Location Hyderabad, Telangana Job family IT Security Shift Evening Employee type Regular Full-Time Job Description (Summary) The primary responsibilities include managing vulnerability assessments using the Qualys tool, creating detailed metrics and reports, and collaborating with relevant teams to ensure timely remediation of identified vulnerabilities. To ensure the organization's IT infrastructure remains secure by proactively identifying, assessing, and mitigating vulnerabilities through effective use of the Qualys tool and coordinated efforts with cross-functional teams. The basic purpose of this position is to safeguard the organization's digital assets by maintaining a robust vulnerability management program that prioritizes risk reduction and compliance with security policies. Perform daily vulnerability assessments, create weekly metrics and reports, and handle ad-hoc requests as they arise. Work on analytical projects to enhance the vulnerability management process and develop strategies to address identified security issues. Prepare and present metrics and reports to senior leadership, showcasing trends in vulnerabilities over the year and how they are being addressed. Produce reports daily, weekly, and as needed on vulnerability assessments and remediation efforts. Responsible for training new hires and occasionally participating in candidate interviews. Technical/Job Specific Knowledge Vulnerability Management: In-depth knowledge of vulnerability assessment, prioritization, and remediation processes. Qualys: Proficiency in using Qualys for scanning, identifying, and managing vulnerabilities across various environments. Security Frameworks: Familiarity with industry standards and frameworks such as OWASP, NIST, and CIS. Network Security: Understanding of network protocols, firewalls, and intrusion detection/prevention systems. Skills Analytical Skills: Strong analytical abilities to identify and assess vulnerabilities and their potential impact. Technical Aptitude: Competence in using security tools and technologies to perform thorough assessments. Problem-Solving: Effective problem-solving skills to develop and implement remediation plans. Communication: Clear and concise communication skills to report findings and collaborate with different teams. Attention to Detail: High level of attention View more

Posted 1 week ago

Apply

6.0 years

0 Lacs

Maharashtra

Remote

Bangalore, MAHARASHTRA, India As a Senior Vulnerability Engineer at First Advantage (FA), you will be responsible for leading and evolving the organization’s vulnerability management program across cloud, on-premises, and hybrid environments. You will drive the identification, analysis, and remediation of critical security issues, while developing automated workflows and executive-level reporting to measure and improve risk posture. You will serve as a key liaison between security, infrastructure, and compliance teams, ensuring alignment with industry standards and audit requirements. This role is ideal for a technically skilled and process-oriented professional who is passionate about reducing risk, mentoring others, and strengthening enterprise security through scalable and strategic solutions. Roles and responsibilities: Lead Vulnerability Scanning Operations: Oversee and optimize vulnerability scanning across cloud, on-premises, and hybrid environments to ensure comprehensive coverage and timely detection of security risks. Coordinate Risk Analysis and Remediation: Lead the triage and risk assessment of critical vulnerabilities, coordinating remediation efforts with technical teams to reduce exposure and improve response times. Develop Dashboards and Reports: Build and maintain executive-level dashboards and reports to track key metrics such as mean time to remediation (MTTR), vulnerability trends, and risk posture. Automate and Streamline Workflows: Design and implement automated scanning and remediation workflows to enhance efficiency, consistency, and scalability of the vulnerability management program. Collaborate Across Teams: Partner with infrastructure, application, compliance, and security teams to resolve systemic issues, align on priorities, and drive continuous improvement in security posture. Support Compliance and Audit Readiness: Assist in maintaining compliance with internal policies and external frameworks (e.g., NIST, ISO), and ensure audit-ready documentation of standards and procedures. Mentor and Develop Talent: Provide guidance and mentorship to Vulnerability Engineers, contributing to team training, knowledge sharing, and process development. Enhance Program Maturity: Continuously evaluate and improve vulnerability management practices, tools, and processes to align with evolving threats and organizational goals. Skill required: Vulnerability Management Expertise: Extensive experience with enterprise vulnerability scanning platforms (e.g., Tenable, Qualys, Rapid7) and the ability to interpret and act on scan results effectively. Experience building and deploying these tools preferred. Risk Analysis and Remediation Coordination: Proven ability to assess risk, prioritize vulnerabilities, and coordinate remediation efforts across technical teams. Cloud and Infrastructure Knowledge: Familiarity with cloud platforms (e.g., AWS, Azure, GCP) and hybrid infrastructure environments, including native security tools and configurations. Reporting and Metrics Development: Experience building dashboards and reports to track key metrics like MTTR, exposure trends, and remediation progress using tools such as Power BI, Tableau, or similar. Communication and Cross-Functional Collaboration: Strong communication skills with the ability to present technical findings to both technical and executive stakeholders, and a proven track record of working collaboratively across infrastructure, application, and compliance teams to drive security improvements. Self-Starter : A self-starter with a continuous improvement mindset, demonstrating the ability to take initiative and drive projects forward in a cross-functional environment. Automation and Scripting: Proficiency in scripting languages such as Python, Bash, or PowerShell to automate scanning and remediation workflows preferred. Qualifications: Experience: 6-10+ years of experience in cybersecurity, with focus on vulnerability management and/or risk analysis Education: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field preferred; equivalent professional experience will also be considered. Certifications: Relevant certifications in cybersecurity, such as CISSP, OSCP, or GIAC preferred. Work Location: Mumbai / Bangalore Joining time needed :15 days Perks and Benefits Health & Wellness Dental Insurance Vision Insurance Health Insurance Life Insurance Paid Time Off PTO / Vacation Policy Paid Holidays Financial Benefits 401K / Retirement Plan Employee Stock Purchase Plan Tuition Reimbursement Office Perks Work From Home Policy

Posted 1 week ago

Apply

0 years

0 Lacs

Chennai

On-site

Job Applicant Privacy Notice CyberArk, Security Cloud Consultant Publication Date: Jul 16, 2025 Ref. No: 534401 Location: Chennai, IN Role of Wealth Management Operational Security Engineer, being understood this role includes delegations from APAC WM CISO. The incumbent will be responsible for managing and implementing technical access controls, privilege access management, data leakage prevention and other related technologies to ensure the confidentiality, integrity, and availability of our organization’s data and systems. Responsibilities Direct Responsibilities: ü Technical Access Management / Privilege Access Management o Manage and maintain technical/privilege access controls for production and development environments o Ensure compliance with organizational technical access control security policies and procedures o Collaborate with IT teams to implement least privilege access and resolve access-related non-compliance o Review existing CyberArk password management policies and assess the effectiveness of the enforcement through password rotation o Review technical access segregation between production and development environments with respective support teams ü Data Leakage Prevention (DLP) o Create, management and maintain DLP policies to detect and prevent data leaks o Deploy and maintain DLP infrastructure o Collaborate with IT teams to investigate and respond to data leak incidents ü Identity and Access Management (IAM) o Collaborate with IT teams to deploy and maintain data encryption solutions o IAM team to ensure seamless integration with technical access management solutions o Ensure compliance with organizational IAM policies and procedures ü Data Encryption Deployment & Monitoring o Collaborate with IT teams to deploy and maintain data encryption solutions o Ensure compliance with organizational data encryption policies and procedures ü Unstructured & Structured Data Discovery & Activity Monitoring o Collaborate with IT teams to: § Deploy and maintain unstructured & structured data discovery and activity monitoring solution § Identify and classify sensitive data § Monitor and analyse restricted and sensitive database activities § Remediate any non-compliant finding reported ü Infrastructure Vulnerability Management o Responsible to identify, classify, prioritize and remediate vulnerabilities in organization infrastructure. o Ensure the regular coverage of infrastructure assets in vulnerability assessment by service providers o Collaborate with IT Dev and Prod teams to remediate identified vulnerabilities and ensure that all remediation efforts are tracked and documented. o Provide regular reports to management on vulnerability management activities, including identified vulnerabilities, remediation efforts and compliance status. o Collaborate with IT teams, management and other stakeholders to ensure that vulnerability management efforts are aligned with business objectives. o Ensure that vulnerability assessment tools such as Rapid7 Nexpose, Tanium, Qualys are configured to meet the expected quality assessment and by fine-tuning the vulnerability assessment plugins. ü Application Security o Ensure the effective implementation of Secure SDL including the DevSecOps and Threat modelling practices. o Identify and implement the latest security standards for internet facing and internal assets o Improve the Vulnerability Management at the application level in terms of efficiency as well as effectiveness (including Static Acceptance Security Testing – SAST, Dynamic Acceptance Security Testing – DAST and Software Composition Analysis – SCA). o Perform Security risk assessments and reviews to be presented to respective committees o Ensure the adequate security level for all WM GAIM applications, whatever the IT project manager’s location and hosting provider ü Cybersecurity o Ensure the protection of WM business data with an adequate security level of WM assets based on review processes o Ensure the coordination with other IT security or other actors in the region or globally o Assist for a Risk Treatment for any APAC WM issue, based on the processes o Identify the IT security risks in advance, record and follow-up them o Define and contribute to processes from cybersecurity perspective o Periodic reporting of security status to IT Security Domain Head o Ensure the regular reporting for management follow-up o Ensure to follow-up on the DLP, Incident Management topics with by investigating and following with handlers until the issue is closed. o Ensure to onboard the Assets & Applications in SIEM and handling BAU, create / update relevant documents. ü Production Security o Ensure the effectiveness and success of vulnerability management process o Ensure the compliance level of the production environment and integrate to reporting ü IT Security Compliance (delegation on WM APAC scope) o Ensure the alignment with the Group and WM GAIM security policies, for both project and production assets o Ensure the compliance with regulatory bodies requirements, including for APAC (HKMA, MAS), EU (GDPR), Switzerland (FINMA) o Leveraging on a deep knowledge of Security standards such as NIST, CIS, ISO2700x, ensure the compliance with the IT security requirements o Ensure the compliance with the Third-party Technology risks and the Cloud security o Identify the process gaps and provide solutions ü Coordination with IT Security actors o Alignment on the objectives and means, contribution to the different global reporting (WM Cybersecurity Committee, Application Security Dashboard…) o Coordination and control of security activities performed by APAC Business Information Security and Production Security teams, including production security review, user security awareness for the WM scope. o Coordination with the global security teams concerning integration of WM assets within production sites o Keeping abreast of initiatives by the IT Security community within the Group and other IT Security stakeholders within the Group

Posted 1 week ago

Apply

8.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Job Title-Threat and Vulnerability Management Experience-8Years. Location-Bangalore. Mode Of work-Hybrid. Employment Type-FTE. Mandatory Skill Qualys, Vulnerability Management, Operating Systems, Operations Improvement, ITIL Process

Posted 1 week ago

Apply

2.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

We’re Hiring: Cybersecurity & GRC Audit (2+ Years Experience) Location: Mumbai / Gurgaon/ Bengaluru / Hybrid Experience: 3+ Years Budget: Competitive, based on experience Role: Cybersecurity Analyst / GRC Consultant / IT Risk & Compliance Specialist Are you a certified cybersecurity and GRC professional with 3+ years of experience looking to grow in a fast-paced, compliance-driven environment? We're looking for a motivated expert to support IT audits, compliance, risk assessments , and governance frameworks across leading clients and internal operations. What We’re Looking For: 3+ years of experience in Cybersecurity, IT Audit, Risk & Compliance Strong knowledge of frameworks and standards like ISO 27001:2022, GDPR, NIST, SOX, PCI-DSS, ITGC, COBIT, CIS Controls Certifications preferred: CISA, CISM, ISO 27001 LA, CRISC, or CISSP Hands-on experience with data protection , cloud security , SIEM/DLP tools , and policy documentation Ability to manage internal audits , perform gap assessments , and ensure regulatory compliance Key Responsibilities: Support implementation and audit of ISO 27001 , GDPR , NIST , and other compliance frameworks Perform risk assessments, policy reviews, and control validations Prepare audit documentation and reports for stakeholders Collaborate with IT, legal, and business teams to align security and compliance goals Monitor security events using tools like SIEM, DLP, EDR , and support in mitigation planning Nice to Have: Exposure to cloud platforms (Azure, AWS) Experience with tools like Qualys, Wireshark, ServiceNow, JIRA Strong communication and reporting skills

Posted 1 week ago

Apply

5.0 - 9.0 years

0 Lacs

bhopal, madhya pradesh

On-site

You will be joining the Vulnerability Management Services team at Atos Group, a global leader in data-driven, trusted, and sustainable digital transformation. With an annual revenue of approximately 5 billion, Atos operates as a next-generation digital business with leading positions in digital, cloud, data, advanced computing, and security across more than 47 countries. By leveraging high-end technologies and a team of 47,000 world-class talents, Atos expands the possibilities of data and technology for current and future generations. Your role will be based in Mumbai (Onsite) with a required experience of 5 to 8 years and the highest qualification of any full-time graduate. As a part of the team, you will be responsible for executing vulnerability scanning and managing VM programs for clients. It is crucial to complete projects within budgeted efforts and agreed timelines while ensuring high-quality deliverables. Key Responsibilities: - Perform vulnerability scanning using tools like SAINT, Nessus, Tenable.io, Tenable.sc, Qualys, etc. - Gain a deep understanding of client network architecture and infrastructure - Identify threats, vulnerabilities, and perform control analysis - Develop customized reports and dashboards as per client expectations - Proactively plan and execute projects - Determine likelihood, analyze impacts, and assess risks - Prioritize risks, recommend solutions, and document findings - Identify business risks associated with weaknesses identified during assessments - Collaborate with both business and technical teams for project scope definition, execution, and closure Skills Required: - 5+ years of experience in Vulnerability Scanning with expertise in tools like Qualys, Tenable, Rapid7, etc. - Ability to understand and explain vulnerabilities to stakeholders - Knowledge of various platforms such as Windows, Linux, Unix, Mac OS, Cisco, Juniper, etc. - Familiarity with standards like PCIDSS, CIS Benchmarks, etc. - Flexibility in handling challenging activities and creativity in problem-solving - Strong communication and writing skills with fluency in verbal communication If you are looking to grow and thrive in a dynamic and innovative environment, we invite you to join us on this exciting journey at Atos Group.,

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies