Home
Jobs
Companies
Resume

27 Sqlmap Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

130.0 years

2 - 7 Lacs

Chennai

On-site

Company Profile: Lennox (NYSE: LII) Driven by 130 years of legacy, HVAC and refrigeration success, Lennox provides our residential and commercial customers with industry-leading climate-control solutions. At Lennox, we win as a team, aiming for excellence and delivering innovative, sustainable products and services. Our culture guides us and creates a workplace where all employees feel heard and welcomed. Lennox is a global community that values each team member’s contributions and offers a supportive environment for career development. Come, stay, and grow with us. Job Description: Manage tracking and remediation of vulnerabilities. Collaborate with development and support teams to ensure timely remediation using agreed action plans and timelines . Integrate business risk understanding into security operations . Apply security expertise to assess and protect business-critical web applications . Qualifications: 0-2 years of relevant experience Master’s Degree from a reputed institute with good academics history. Experience in Web Application VAPT – DAST . Strong knowledge of the OWASP framework and methodologies . Experience with web application vulnerability scanning tools : IBM AppScan, HP WebInspect, Acunetix, Netsparker, NTO Spider, Burp Suite Pro. Proficient in Kali Linux penetration testing tools : e.g., SQLMAP, DirBuster. Understanding of web services technologies : XML, SOAP, and SAML. Good understanding of HTML and JavaScript . (Preferred) Proficiency in Front End (.NET, Java) and Back End (Oracle) technologies. (Preferred) Experience with code scanning tools : Fortify, Checkmarx, Veracode. Exposure to common vulnerabilities : SQL Injection, XSS, CSRF, and participation in bug bounty programs. Strong communication and interpersonal skills . Professional Certification : CEH (mandatory) OSCP (preferred / big plus

Posted 4 days ago

Apply

130.0 years

0 Lacs

Greater Chennai Area

On-site

Linkedin logo

Company Profile Lennox (NYSE: LII) Driven by 130 years of legacy, HVAC and refrigeration success, Lennox provides our residential and commercial customers with industry-leading climate-control solutions. At Lennox, we win as a team, aiming for excellence and delivering innovative, sustainable products and services. Our culture guides us and creates a workplace where all employees feel heard and welcomed. Lennox is a global community that values each team member’s contributions and offers a supportive environment for career development. Come, stay, and grow with us. Job Description Manage tracking and remediation of vulnerabilities. Collaborate with development and support teams to ensure timely remediation using agreed action plans and timelines. Integrate business risk understanding into security operations. Apply security expertise to assess and protect business-critical web applications. Qualifications 0-2 years of relevant experience Master’s Degree from a reputed institute with good academics history. Experience in Web Application VAPT – DAST. Strong knowledge of the OWASP framework and methodologies. Experience with web application vulnerability scanning tools: IBM AppScan, HP WebInspect, Acunetix, Netsparker, NTO Spider, Burp Suite Pro. Proficient in Kali Linux penetration testing tools: e.g., SQLMAP, DirBuster. Understanding of web services technologies: XML, SOAP, and SAML. Good understanding of HTML and JavaScript. (Preferred) Proficiency in Front End (.NET, Java) and Back End (Oracle) technologies. (Preferred) Experience with code scanning tools: Fortify, Checkmarx, Veracode. Exposure to common vulnerabilities: SQL Injection, XSS, CSRF, and participation in bug bounty programs. Strong communication and interpersonal skills. Professional Certification: CEH (mandatory) OSCP (preferred / big plus Show more Show less

Posted 5 days ago

Apply

3.0 - 7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Job Description We are seeking a skilled and experienced Cybersecurity Specialist to join our dynamic team. The ideal candidate will have 3-7 years of experience in cybersecurity roles and a strong technical background in information security. If you're passionate about protecting data, identifying vulnerabilities, and implementing robust security measures. Key Responsibilities Develop, implement, and maintain cybersecurity policies, firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint security solutions, and data encryption. Conduct regular security assessments, risk analyses, and vulnerability assessments to identify potential weaknesses and mitigate risks. Experience in Web/Mobile/Network Penetration Testing and/or Vulnerability Assessment. Experience with web application vulnerability scanner (BurpSuite, AppScan, Acunetix, Web Inspect, etc). Deep knowledge of common software vulnerabilities, such as OWASP Top 10 and CWE/SANS Top 25. Deep knowledge of HTTP protocol and the ability to construct/manipulate HTTP requests. Ability to suggest/recommend remediation to fix vulnerability. Manual Penetration Testing skills and techniques are required besides automated tools and frameworks. Knowledge on Tools: Nmap, Kali Linux, Metasploit, Maltego, Burp Suite, Nessus, nexpose, Wireshark, sqlmap etc. Proficiency in Conducting API (REST, SOAP, XML, JSON) Security testing activities to identify and mitigate security : 3-7 years of experience in cyber security or a related field. Bachelor's degree in Computer Science, Information Security, Cyber Operations, or a related field (or equivalent experience). Strong understanding of networking concepts, security principles, and cyber threats. Proven experience with vulnerability scanning and penetration testing tools. Knowledge of regulatory requirements and compliance frameworks (e.g., PCI DSS, NIST, CIS Controls). Experience in Information security controls, and doing IT audits, ISO certifications is preferred. (ref:hirist.tech) Show more Show less

Posted 6 days ago

Apply

3.0 years

3 - 3 Lacs

Bengaluru

On-site

Category: Administration Main location: India, Karnataka, Bangalore Position ID: J0625-0283 Employment Type: Full Time Position Description: Company Profile: Founded in 1976, CGI is among the largest independent IT and business consulting services firms in the world. With 94,000 consultants and professionals across the globe, CGI delivers an end-to-end portfolio of capabilities, from strategic IT and business consulting to systems integration, managed IT and business process services and intellectual property solutions. CGI works with clients through a local relationship model complemented by a global delivery network that helps clients digitally transform their organizations and accelerate results. CGI Fiscal 2024 reported revenue is CA$14.68 billion and CGI shares are listed on the TSX (GIB.A) and the NYSE (GIB). Learn more at cgi.com. Job Title: Cyber Security Engineer Position: Senior Systems Engineer/Lead Analyst Experience: 7+ yrs Category: IT Infrastructure Main location: Bangalore Position ID: J0625-0283 Employment Type: Full Time Qualification: Bachelor's degree in Computer Science or related field or higher with minimum 3 years of relevant experience. Job Description: At least 7+ years’ Experience in Vulnerability Assessment and Penetration testing of web applications, mobile applications, API and thick client applications. Good knowledge on web application security, OWASP, Application Security testing, Network Penetration testing, Code Review, Vulnerability Assessment and Appscan Experience in cyber security penetration testing (Manual, PT, VAPT, DAST, SAST, API) Hands on experience in setting up the network environment for VAPT Manual penetration testing skills and techniques are required besides automated tools and frameworks. Hands on experience in identifying false positives Hands on knowledge on tools: Burp Suite Professional, Qualys, Nmap, Kali Linux, Metasploit, Nessus, Wireshark, Sqlmap, Checkmarx etc Strong knowledge of tools for mobile application security, including but not limited to Appuse, MOBSF, Geny Motion, Kali Linux, BURP, PostMan, Appie, Mobisec, NowSecure, HP Fortify On Demand Good Understanding of OWASP Top 10 for web application security and Mobile application security. Perform mobile vulnerability assessment and Penetration testing. Good understanding of Microservice based architecture Experience working in a DevSecOps environment with knowledge of continuous integration, containers, DAST/SAST tools Good understanding of Database security requirements. Good knowledge of cloud environments and should be able to perform VAPT on AWS, Azure etc. Scripting and coding experience(good to have) Certifications: OSCP, CEH Must have Skills : Good knowledge on web application security, OWASP, Application Security testing, Network Penetration testing, Code Review, Vulnerability Assessment and Appscan Experience in cyber security penetration testing (Manual, PT, VAPT, DAST, SAST, API) Hands on experience in identifying false positives Hands on knowledge on tools: Burp Suite Professional, Qualys, Nmap, Kali Linux, Metasploit, Nessus, Wireshark, Sqlmap, Checkmarx etc Good to have Skills : Excellent customer interfacing skills. Excellent written and verbal communication skills. Participating in Daily Standups and weekly reviews Strong attention to detail and outstanding analytical and Problem-solving skills. Understanding of Business, emerging technologies in relevant industry (Banking/CIAM ) , strong understanding of trends (market and technology) in areas of specialization. CGI is an equal opportunity employer. In addition, CGI is committed to providing accommodations for people with disabilities in accordance with provincial legislation. Please let us know if you require a reasonable accommodation due to a disability during any aspect of the recruitment process and we will work with you to address your needs. Life at CGI: It is rooted in ownership, teamwork, respect and belonging. Here, you’ll reach your full potential because… You are invited to be an owner from day 1 as we work together to bring our Dream to life. That’s why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company’s strategy and direction Your work creates value. You’ll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise You’ll shape your career by joining a company built to grow and last. You’ll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons Come join our team, one of the largest IT and business consulting services firms in the world Skills: Vulnerability Assessment(IAVA) What you can expect from us: Together, as owners, let’s turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect and belonging. Here, you’ll reach your full potential because… You are invited to be an owner from day 1 as we work together to bring our Dream to life. That’s why we call ourselves CGI Partners rather than employees. We benefit from our collective success and actively shape our company’s strategy and direction. Your work creates value. You’ll develop innovative solutions and build relationships with teammates and clients while accessing global capabilities to scale your ideas, embrace new opportunities, and benefit from expansive industry and technology expertise. You’ll shape your career by joining a company built to grow and last. You’ll be supported by leaders who care about your health and well-being and provide you with opportunities to deepen your skills and broaden your horizons. Come join our team—one of the largest IT and business consulting services firms in the world.

Posted 1 week ago

Apply

8.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Role: Senior Security Specialist Location : Bangalore Working Model : Hybrid Final Round Interview : F2F Summary of essential job functions The overall responsibility of the team is to provide assurance to the management on the Information Security, Compliance and Risk Management of the organization globally. The candidate would be expected to lead security assessments of Products and Infrastructure globally. Education, Certification and Experience: Qualification Required: Bachelor/Master’s degree in Computer/ Information science, Software Engineering, Cybersecurity, or a related field Certification preferred: OSCP, OSWE, OSEP, ECSA|LPT, CPT, CEH Minimum experience: 08-10 years in Vulnerability Assessment and Penetration Testing- Thin & Thick Client, API , Infrastructure, Cloud, Mobile Competency Requirements: Performs a combination of duties in accordance with departmental guidelines: Hands-on experience in Vulnerability Assessment (VA) and Penetration Testing (PT) for Web, APIs, AI/ML models, Mobile , Network, and Infrastructure. Strong command of OWASP Top 10 with practical knowledge of attack vectors and mitigation strategies. Familiarity with industry standards and frameworks such as OSSTMM, OQASP, CESG, CREST, NIST, ISSAF, and PTES. Expertise in Secure Development Lifecycle (SDLC), including Threat Modeling, Secure Coding Practices, and Security Assessments. Proficient in both Static and Dynamic Application Security Testing (SAST, DAST, IAST), and Software Composition Analysis (SCA). Experience conducting secure code reviews and identifying logic flaws in code bases written in Java, .NET, C/C++, Python, etc. Knowledge of cryptographic protocols, secure communication, data security and key management. Hands-on with commercial and open-source tools: Burp Suite, OWASP ZAP, Acunetix, AppSpider,SQLMap, Nmap, Metasploit, Nessus, OpenVAS, Fortify, Checkmarx, Veracode, SonarQube, NexusIQ and Snyk. Proficient in assessing mobile applications (thick/hybrid clients) using tools like Dex2jar, ADB, Frida. Exposure to AuthN/AuthZ protocols such as OAuth, SAML, OIDC; ability to read, write, and interpret application logic. Familiarity with vulnerability standards: CVSS, CVE, CWE, CAPEC; and patch management lifecycle. Experience automating tasks via shell scripting and Python/Ruby/Php etc. Proficiency in secure code development and reviewing DAST/SAST reports across languages. Understanding security aspects in AWS, Azure, and GCP including IAM, VPC/VNet, S3/Blob storage, API gateway, Load Balancers, WAF, Containers (Docker), and Kubernetes. Experience in infrastructure/network penetration testing and exploitation techniques on Windows/Linux environments. Experience in mentoring, leading teams, and managing security assessments under tight deadlines. Manage third-party security assessments, including vendor risk evaluations, engagement oversight, and ensuring compliance with organizational security standards. Proven ability to provide technical oversight and drive engagement quality across security projects. Exposure to agile/scrum development methodologies and ability to work with cross-functional teams. Familiarity with security standards like PCI DSS, SOC, ISO 27001. Participation in bug bounty program and CTFs is a strong plus. Proactive learning approach, staying updated with evolving cybersecurity trends and technologies. Job Responsibilities: Plan, conduct, and close end-to-end Vulnerability Assessments and Penetration Tests for Web Applications, APIs, Mobile Apps, Thick Clients, Infrastructure, and Cloud environments. Perform both manual and automated security assessments to identify, validate, and prioritize vulnerabilities. Review application code in various programming languages and provide actionable remediation recommendations. Reproduce reported vulnerabilities with proof-of-concept (PoC) and assess associated risks. Evaluate new security tools and products for adoption and integration. Guide development teams on Secure Coding standards and OWASP-aligned practices. Lead and contribute to secure SDLC processes, threat modeling workshops, and risk reviews. Manage and triage security bugs from Bug Bounty programs, working closely with engineering teams to ensure timely resolution. Maintain and improve the security posture of applications across business units, aligning with best practices. Act as a security advisor on project teams, influencing architecture and design decisions. Drive security awareness initiatives and conduct training sessions for developers and QA teams. Update and maintain InfoSec policies and procedures in line with emerging threats, technologies, and compliance requirements; provide support to both internal and external auditors during security assessments and audits. Other Requirements: Strong ethics and understanding of ethics in business and information security. Proficiency in English (both written and oral communication skills). Ability to complete tasks and deliver professionally written reports for clients. Ability to present findings to technical staff and executives. Ability to interact with 247 internal stakeholders to review their requirements. Should be able to think “out of the box” and implement new attack vectors. Self-motivated, curious, knowledgeable pertaining to news and current events Show more Show less

Posted 1 week ago

Apply

3.0 years

18 Lacs

India

On-site

Job Summary: We are seeking a highly experienced “Senior VAPT & Penetration Testing Specialist” to lead and ensure the quality and effectiveness of our vulnerability assessment and penetration testing operations. This role involves findings, validating findings, reviewing technical reports, ensuring compliance with standards (OWASP, PTES, NIST, etc.), and improving methodologies and tools. Key Responsibilities: Conduct in-depth vulnerability assessments and penetration tests on web, mobile, network, API, and cloud infrastructure using manual and automation. Utilize industry-standard tools like SQLMap, Burp Suite, Nessus, Nmap, and custom scripts for advanced exploitation techniques. Simulate various cyber-attacks including DDoS, Brute Force, XSS, SQL Injection, DNS attacks, and Social Engineering to identify system vulnerabilities. Perform peer reviews of technical deliverables and verify accuracy of findings and recommendations. Ensure that all assessments are aligned with industry standards such as OWASP, PTES, MITRE ATT&CK, and NIST. Act as a technical lead and mentor for junior VAPT team and QA team members. Identify gaps in the current testing methodologies and implement process improvements. Prepare detailed documentation and the VA report and ensure clear, actionable, and risk-rated reporting. Collaborate with clients and internal teams to understand scope and provide post-assessment clarifications. Present the client meeting for the future VAPT assignments. Stay updated with emerging threats, tools, techniques, and frameworks. Required Skills & Qualifications: Bachelor's or Master's degree in Computer Science, Cybersecurity, or related field. 3 to 5 years of hands-on experience in VAPT and penetration testing. In-depth knowledge of web, network, mobile, cloud, and API security. Strong understanding of secure coding practices and vulnerability management. Expertise in tools like Burp Suite, Nmap, Nessus, Metasploit, Qualys, Kali Linux, Wireshark, etc. Familiarity with SIEM, IDS/IPS, EDR tools is a plus. Excellent report writing and documentation skills. Strong communication and overseas client-interaction skills. Preferred Certifications: OSCP (Offensive Security Certified Professional) – Highly preferred CEH (Certified Ethical Hacker) CREST / GPEN / GWAPT / CISSP – Optional but desirable ISO 27001 Lead Auditor or Lead Implementer – Added advantage Job Type: Full-time Pay: Up to ₹1,800,000.00 per year Schedule: Monday to Friday UK shift Work Location: In person Speak with the employer +91 9429521724

Posted 1 week ago

Apply

2.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Roles and Responsibilities: Conduct Web Application VAPT (Vulnerability Assessment and Penetration Testing), focusing on DAST. Perform vulnerability scans using tools such as IBM AppScan, HP WebInspect, Acunetix, Netsparker, NTO Spider, and Burp Suite Pro. Utilize Kali Linux penetration testing tools like SQLMAP, Dirbuster, etc. Understand and apply OWASP Top 10 frameworks and methodologies in assessments. Manage tracking and remediation of vulnerabilities , coordinating with development and support teams on timelines and action plans. Analyze and communicate security risks based on business impact and context. Collaborate with internal stakeholders to ensure vulnerabilities are mitigated efficiently. Clearly document findings, reports, and progress on identified issues. Communicate effectively with technical and non-technical audiences. Requirements: Experience : 0–2 years of relevant experience in Application Security / VAPT. Education : B.E./B.Tech or Master’s Degree from a reputed institute with a strong academic background. Technical Skills : Experience with Web Application Security Testing and DAST tools. Familiarity with web technologies (HTML, JavaScript) and web services (XML, SOAP, SAML). Knowledge of front-end (.NET, Java) and back-end (Oracle) environments is a plus. Exposure to common vulnerabilities (SQL Injection, XSS, CSRF) and bug bounty programs . Experience with SAST tools such as Fortify, Checkmarx, or Veracode is an added advantage. Soft Skills : Strong communication and interpersonal skills . Ability to understand business context and translate it into security assessments. Certifications : CEH certification is mandatory . OSCP certification is a strong plus. Show more Show less

Posted 1 week ago

Apply

5.0 - 7.0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Roles and Responsibilities: Perform Dynamic Application Security Testing (DAST) on web applications and APIs (manual and tool-based). Analyze DAST scan results, identify and prioritize vulnerabilities based on risk. Participate in triage meetings with application teams to explain and document findings. Lead deep API security testing (REST, SOAP, GraphQL), identifying flaws like BOLA, token leakage, replay attacks, etc. Conduct manual penetration testing using offensive tools and custom payloads. Craft custom exploit chains for vulnerabilities such as deserialization, command injection, and broken access controls. Maintain custom scripts, payloads, and test cases to simulate real-world attacker scenarios. Possibly perform Static Application Security Testing (SAST) and understand differences from DAST. Document testing procedures, findings, and remediation efforts. Communicate security findings to both technical and non-technical stakeholders. Collaborate with DevOps, developers, and security teams to address issues. Participate in process improvements and develop long-term testing strategies. Requirements: 5 to 7 years of hands-on experience in web application security testing. Strong knowledge in: Web & API penetration testing. DAST & SAST methodologies. API security concepts and testing. Proficiency in offensive security tools and Kali Linux tools (e.g., SQLMAP, Dirbuster). Experience in identifying and exploiting common vulnerabilities (SQL Injection, XSS, CSRF, etc.). Understanding of HTML, JavaScript . Bonus for experience with: Front-end tech: .NET, Java Back-end tech: Oracle Mobile or IoT app testing. Bug bounty programs. Familiarity with tools like: DAST: Burp Suite, NetSparker SAST: Checkmarx, Veracode, Fortify Clear written and verbal communication skills. Any relevant certifications (e.g., OSCP, OSWE, GWAPT, CREST) are a plus. Experience with Red Teaming/adversary emulation is a strong advantage. Show more Show less

Posted 1 week ago

Apply

3.0 - 5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! Responsibilities In this position, you will primarily be researching and implementing detections for vulnerabilities on all the latest web application technologies. You will also be expected to fine-tune existing logic and payloads to detect vulnerabilities and CVEs with zero false positives for the Qualys Web Application Security product. Efficient problem-solving and troubleshooting skills are necessary, as well as using the latest tools in the industry. Required Skills: 3-5 years of industry experience in web application security Create exploits, proof-of-concept for web application vulnerabilities Strong JavaScript programming skills Knowledge of HTTP protocol (Requests, responses, Cookies, etc.) Understanding of web application vulnerabilities, OWASP top 10 in Web Applications, API, and LLMs Exposure to DAST/BlackBox tools Web application security scanning tools like BURP/ZAP, SQLMap, CURL Experience with network analysis tools and analysis of packet captures. Proficient with regular expressions. System administrator experience on Windows or Unix platforms. Strong analytical and problem-solving skills Passion for web security and attention to detail Experience with scripting languages, including Python and Bash Exposure to JAVA programming Experience with selenium, postman scripting Experience with Metasploit/Nessus exploits (especially HTTP-related ) Experience with web application firewalls (WAF) rules, ModSecurity Exposure to WEB 2.0, XML/XPath, JSON, Swagger Database/SQL knowledge Experienced in the use of various scanners and open-source security tools. Experience in developing security-related tools/programs. Ability to work independently Published research Security certifications Show more Show less

Posted 1 week ago

Apply

3.0 years

6 - 9 Lacs

Hyderābād

On-site

Job Purpose: Provides hands-on technical and security support across enterprise environments, including performing manual security testing, assisting with vulnerability identification and remediation, and supporting threat response activities. Contributes to cloud security posture monitoring, participates in responsible disclosure and bug bounty processes, and supports ongoing compliance initiatives. Aids in the investigation and response to security incidents, monitors threat intelligence sources, and helps implement security controls across systems, applications, and Office365 environments. Also assists with maintaining documentation and gathering evidence for audits related to SOC 2 Type 2, PCI-DSS, and ISO 27001 frameworks. Supports sales and client teams by contributing to responses for security audits, risk assessments, and customer security questionnaires. Job Responsibilities: Essential Functions: This position operates under limited supervision with a high degree of independence in day-to-day security tasks. The Security Engineer supports enterprise security operations, infrastructure protection, and compliance efforts. Key responsibilities include: Perform manual security testing and assist with 2nd and 3rd level investigation and resolution of security-related support tickets. Participate in vulnerability management processes, including scanning, tracking, reporting, and remediation assistance. Monitor and support cloud security posture across environments (e.g., AWS, Azure), contributing to secure configuration and alerting. Support Office365 security administration and monitoring efforts Assist in monitoring threat intelligence feeds and help correlate findings with internal environments to identify potential risks. Respond to and support the triage and resolution of security incidents in coordination with internal teams and vendors to minimize business impact. Contribute to the intake and triage process for responsible disclosure reports and bug bounty submissions. Provide security support for customer audits and sales enablement activities by helping to complete security questionnaires and assessments. Assist with maintaining and collecting evidence for compliance frameworks such as SOC 2 Type 2, PCI-DSS, and ISO 27001. Help train and support internal teams in secure configurations and processes. Work with internal infrastructure, development, and compliance teams to implement and maintain security standards and controls. Research, test, and provide input on new security tools, products, and practices. Maintain accurate records of work performed, including documentation and ticketing of changes and issues. Non-Essential Functions: May be required to participate in an on-call rotation outside of normal business hours to support security incident response or high-priority investigations. May assist with ad-hoc security-related tasks or projects outside of core responsibilities Requirements: Required Education and Experience: Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent technical experience Minimum 3+ years of experience in information security, cybersecurity, or in a security engineering role Hands-on experience with manual security testing and vulnerability management practices Working knowledge of private and public cloud environments and cloud security posture management (e.g., AWS, Azure, or GCP) Familiarity with security compliance frameworks (SOC 2 Type 2, PCI-DSS, ISO 27001) Experience with MS Azure security and Office365 security tools (e.g., Microsoft Defender, Purview, Security & Compliance Center) Understanding of incident response processes and tools Exposure to responsible disclosure or bug bounty program workflows Ability to document technical findings and produce support materials for audit and remediation purposes Minimum 2+ years of experience with Penetration Testing tools such as Nmap, Burp Suite, OWASP ZAP, Nikito, SQLmap, Postman, MetaSploit, Mimikatz, Bloodhound, Maltego and others Preferred Education and Experience: Bachelor’s degree or equivalent experience. Related certifications Expected Competencies: Strong verbal and written communication skills Must be able to prioritize and take initiative Demonstrate excellent service skills Strong English communication skills, both written and verbal Work Schedule: Monday through Friday from 12 PM to 9 PM IST. This will provide healthy overlap between India team and US team and supporting both to ensure adequate collaboration. This role will be working in Hybrid Mode and will require at least 2 days’ work from office at Hyderabad or Gurugram Travel: This position may require up to 10% travel. Travel may be outside the local area and overnight EEO Statement Cendyn provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Cendyn complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Cendyn expressly prohibits any form of workplace harassment based on race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, genetic information, disability, or veteran status. Improper interference with the ability of Cendyn’s employees to perform their job duties may result in discipline up to and including discharge. Other Duties Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.

Posted 2 weeks ago

Apply

2.0 - 3.0 years

0 - 0 Lacs

Gurgaon

On-site

Conduct Web Application and API Security Testing using both Manual and Automated Penetration Testing Methodologies Conduct Vulnerability Assessments of Network Devices, DB and servers using various open source and commercial tools Map out a network, discover ports and services running on the different exposed network and security devices Conduct penetration test and launch exploits using Nessus, Metaspoilt, Core Impact, Backtrack penetration testing distribution tools sets Prepare a detailed VAPT findings manually Strong experience with performing VAPT as per OWASP Top 10, SANS Top 25, and NIST, and SANS Security Guidelines. Hands on knowledge on Tools: Nmap, Kali Linux, Metasploit, Maltego, Burp, Nessus, nexpose, wireshark, sqlmap, MobSF, burpsuite etc. Conduct android and IOS mobile application VAPT Ability to suggest remediation to vulnerabilities observed in Application and configuration. Minimum 2-3 years of work experience in the information security domain only Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹65,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Did you worked in the domains like API Testing, IOS, Android Testing, Web Application Testing, Network Penetration Testing, Mobile Application Testing? Experience: minimum: 1 year (Required) Language: English (Required) Location: Gurugram, Haryana (Required) Work Location: In person

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Purpose Provides hands-on technical and security support across enterprise environments, including performing manual security testing, assisting with vulnerability identification and remediation, and supporting threat response activities. Contributes to cloud security posture monitoring, participates in responsible disclosure and bug bounty processes, and supports ongoing compliance initiatives. Aids in the investigation and response to security incidents, monitors threat intelligence sources, and helps implement security controls across systems, applications, and Office365 environments. Also assists with maintaining documentation and gathering evidence for audits related to SOC 2 Type 2, PCI-DSS, and ISO 27001 frameworks. Supports sales and client teams by contributing to responses for security audits, risk assessments, and customer security questionnaires. Job Responsibilities Essential Functions: Responsibilities This position operates under limited supervision with a high degree of independence in day-to-day security tasks. The Security Engineer supports enterprise security operations, infrastructure protection, and compliance efforts. Key responsibilities include: Perform manual security testing and assist with 2nd and 3rd level investigation and resolution of security-related support tickets. Participate in vulnerability management processes, including scanning, tracking, reporting, and remediation assistance. Monitor and support cloud security posture across environments (e.g., AWS, Azure), contributing to secure configuration and alerting. Support Office365 security administration and monitoring efforts Assist in monitoring threat intelligence feeds and help correlate findings with internal environments to identify potential risks. Respond to and support the triage and resolution of security incidents in coordination with internal teams and vendors to minimize business impact. Contribute to the intake and triage process for responsible disclosure reports and bug bounty submissions. Provide security support for customer audits and sales enablement activities by helping to complete security questionnaires and assessments. Assist with maintaining and collecting evidence for compliance frameworks such as SOC 2 Type 2, PCI-DSS, and ISO 27001. Help train and support internal teams in secure configurations and processes. Work with internal infrastructure, development, and compliance teams to implement and maintain security standards and controls. Research, test, and provide input on new security tools, products, and practices. Maintain accurate records of work performed, including documentation and ticketing of changes and issues. Non-Essential Functions May be required to participate in an on-call rotation outside of normal business hours to support security incident response or high-priority investigations. May assist with ad-hoc security-related tasks or projects outside of core responsibilities Requirements Required Education and Experience: Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent technical experience Minimum 3+ years of experience in information security, cybersecurity, or in a security engineering role Hands-on experience with manual security testing and vulnerability management practices Working knowledge of private and public cloud environments and cloud security posture management (e.g., AWS, Azure, or GCP) Familiarity with security compliance frameworks (SOC 2 Type 2, PCI-DSS, ISO 27001) Experience with MS Azure security and Office365 security tools (e.g., Microsoft Defender, Purview, Security & Compliance Center) Understanding of incident response processes and tools Exposure to responsible disclosure or bug bounty program workflows Ability to document technical findings and produce support materials for audit and remediation purposes Minimum 2+ years of experience with Penetration Testing tools such as Nmap, Burp Suite, OWASP ZAP, Nikito, SQLmap, Postman, MetaSploit, Mimikatz, Bloodhound, Maltego and others Preferred Education And Experience Bachelor’s degree or equivalent experience. Related certifications Expected Competencies Strong verbal and written communication skills Must be able to prioritize and take initiative Demonstrate excellent service skills Strong English communication skills, both written and verbal Work Schedule Monday through Friday from 12 PM to 9 PM IST. This will provide healthy overlap between India team and US team and supporting both to ensure adequate collaboration. This role will be working in Hybrid Mode and will require at least 2 days’ work from office at Hyderabad or Gurugram Travel This position may require up to 10% travel. Travel may be outside the local area and overnight EEO Statement Cendyn provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Cendyn complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Cendyn expressly prohibits any form of workplace harassment based on race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, genetic information, disability, or veteran status. Improper interference with the ability of Cendyn’s employees to perform their job duties may result in discipline up to and including discharge. Other Duties Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice. Show more Show less

Posted 2 weeks ago

Apply

0.0 - 1.0 years

0 Lacs

Gurugram, Haryana

On-site

Indeed logo

Conduct Web Application and API Security Testing using both Manual and Automated Penetration Testing Methodologies Conduct Vulnerability Assessments of Network Devices, DB and servers using various open source and commercial tools Map out a network, discover ports and services running on the different exposed network and security devices Conduct penetration test and launch exploits using Nessus, Metaspoilt, Core Impact, Backtrack penetration testing distribution tools sets Prepare a detailed VAPT findings manually Strong experience with performing VAPT as per OWASP Top 10, SANS Top 25, and NIST, and SANS Security Guidelines. Hands on knowledge on Tools: Nmap, Kali Linux, Metasploit, Maltego, Burp, Nessus, nexpose, wireshark, sqlmap, MobSF, burpsuite etc. Conduct android and IOS mobile application VAPT Ability to suggest remediation to vulnerabilities observed in Application and configuration. Minimum 2-3 years of work experience in the information security domain only Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹65,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Did you worked in the domains like API Testing, IOS, Android Testing, Web Application Testing, Network Penetration Testing, Mobile Application Testing? Experience: minimum: 1 year (Required) Language: English (Required) Location: Gurugram, Haryana (Required) Work Location: In person

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! Appsec team in Qualys looking for web application security to be part of Application Security team which provides state-of-art automated web app security scanning for customers. You will test vulnerable web applications, API, develop, deploy vulnerable web applications, analyze vulnerability reports to verify false positives and false negatives. The position is a Pune based position and will require working with a team of engineers in Pune and the US. Responsibilities Solid working knowledge of DAST tools. Understanding of UNIX environment, and UNIX command line. Analyze web application security scanner reports and validate false positives and false negatives Understanding of OWASP top 10 vulnerabilities. Develop scripts to automate manual tasks in python, shell as required. Analyze server logs Analyze requests and responses in TCP/UDP protocols. Strong network layer understanding. Use of Burp, Kali or other security tools. Understanding of working with APIs and experience with Postman tool. Installation, configuration of web servers, Kubernetes and Docker systems. Knowledge of PCI DSS preferred. Required skills 3+ years of experience in web applications security Hands on experience with web applications security scanning tools like Burp/Zap, SQLMap, curl/wget, HTTP Proxy Knowledge of HTTP protocol (Requests, responses, Cookies etc) Experience with network analysis tools, analysis of packet capture Understanding and crafting of regular expressions Exposure and understanding around selenium scripts Understanding of web application vulnerabilities, OWASP top Strong analytical and problem-solving skills. Understanding of HTML/DOM, XML, CSS, Javascript and Javascript frameworks like JQuery, Ajax Database/SQL knowledge. Strong attention to details Passion for web security Strong communication and team-work skills Ability to work independently and self-learner Show more Show less

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Greater Kolkata Area

On-site

Linkedin logo

Responsibilities : Founded in 1991, Lexmark is recognized as a global leader in imaging and output technology solutions and managed print services by many of the technology industry’s leading market analyst firms. Lexmark sells its products and services in more than 170 countries and has its headquarters in Lexington, Kentucky. Lexmark India, located in Kolkata, is one of the research and development centers of Lexmark International Inc. Our diverse workforce collaborates their skills and ideas to build, deliver, and support first-class products and solutions for our customers. This job is for a strong technical person in Security Testing role. Candidate should be a B.E./B.Tech. or higher from a reputed Engineering College/University with around 3 to 5 years of hands-on application security testing experience. If you are a self-starter and have the aptitude, analytical skills and passion for technology then you will fit right into our Software Security testing team. You’re having prior experience of working in an agile/scrum environment will prove to be an added advantage. Development experience will be a plus. Your Tasks include: Conduct web application security assessments and penetration tests. Assess applications for issues surrounding Authentication, Authorization, User management, Session management, Data validation, including all common attacks such as SQL injection, Cross-site scripting, Command injection, Error handling, Auditing and logging. Assess the security aspects of Web Services design and implementation, including confidentiality, integrity, trust relationships, and authentication using security standards like XML signatures, XML encryption, SAML, and WS-Security. Thick client assessment experience Write formal security assessment reports for each application, using Foundstone reporting format. Participate in conference calls with clients to perform initial data gathering and a follow-up advisory for technical issues. Vulnerability and network penetration assessments Mobile applications security testing Publish whitepapers, tools and deliver presentations. Cloud application Security testing Required skills include: Knowledge of tools such as Fiddler, Paros, Burp, Sqlmap, Nikto, Nmap, Openssl, Mallory, Wireshark etc. Mobile application development, assessment (iOS, Android, Windows) experience Web application development experience in any of the major languages such as C#, Java, PHP, ASP.NET etc. is a plus Knowledge of scripting languages such as Python, JavaScript, Ruby, SQL etc. is a plus Experience reviewing code in C, C++, Java, PHP, C#, ASP.NET, Go etc. Familiarity with automated source code analysis tools such as Acunetix , Appscan etc. Certifications such as OSCP or CEH is a plus Working knowledge of version control software like git and Subversion. Can demonstrate Lexmark core values: Innovation, Excellence, Agility, Integrity, Community, and Respect. How to Apply ? Are you an innovator? Here is your chance to make your mark with a global technology leader. Apply now! Global Privacy Notice Lexmark is committed to appropriately protecting and managing any personal information you share with us. Click here to view Lexmark's Privacy Notice. Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Kanpur, Uttar Pradesh, India

Remote

Linkedin logo

Description As an IT/OT Vulnerability Assessment and Penetration Testing (VAPT) Engineer, you will be engaged in identifying and mitigating security vulnerabilities across IT systems, Industrial Control Systems (ICS), and Industrial Internet of Things (IIoT) environments. Your work will involve rigorous security assessments of critical infrastructure, SCADA systems, PLCs, field devices, gateways, and cloud-connected IIoT platforms. You will simulate advanced adversary tactics to expose vulnerabilities and provide strategic remediation guidance. The role is suited for professionals with a deep understanding of both enterprise IT security and industrial/embedded system ecosystems. Responsibilities 1-Vulnerability Assessment & Penetration Testing (IT + ICS/IIoT): Perform black-box, grey-box, and white-box VAPT on: Enterprise IT assets (servers, databases, web/mobile apps, Active Directory, cloud) OT/ICS assets (PLCs, RTUs, HMIs, engineering workstations, protocol gateways) IIoT platforms (MQTT/CoAP-based telemetry, edge gateways, cloud dashboards) Emulate APT-level attacks across air-gapped, segmented, or hybrid IT-OT architectures. Execute Red Team scenarios to simulate insider threats or supply chain compromise. 2- ICS Protocol & Field Device Security Testing: Analyze and exploit vulnerabilities in ICS protocols: Modbus TCP, DNP3, IEC 104, OPC-UA, S7comm, Profinet, BACnet, CIP (EtherNet/IP), MQTT, CoAP Perform live traffic analysis, packet manipulation, and protocol fuzzing to test resilience. Evaluate control logic vulnerabilities in ladder logic, structured text, and function blocks. 3- Firmware & Hardware Exploitation (IIoT/ICS Devices): Extract and analyze firmware from industrial devices using JTAG, UART, SPI interfaces. Perform static and dynamic analysis using Ghidra, Binwalk, Radare2, or IDA Pro. Reverse engineer file systems (e.g., squashfs, cramfs) and analyze web interfaces or CLI backdoors. Exploit misconfigured bootloaders, insecure firmware upgrade mechanisms, or exposed debug ports. 4- Network Architecture & Segmentation Testing: Review and test IT-OT segmentation via firewall ACLs, VLANs, DMZ configurations. Assess trust relationships, weak credential policies, and insecure remote access (e.g., exposed VNC, Telnet, RDP). Identify unauthorized bridging of air-gapped networks or misconfigured routing/switching. 5- Cloud & IIoT Platform Security: Evaluate MQTT brokers, edge-to-cloud telemetry, and analytics pipelines. Test REST APIs, insecure mobile app integrations, and cloud misconfigurations (S3, IAM, IoT Core). Identify insecure certificate handling, default API tokens, and lack of encryption at rest/in transit. Reporting & Mitigation Develop technical and executive-level reports with CVSS scoring, attack paths, and exploitation evidence. Recommend hardening measures for both IT (patches, SIEM, EDR) and OT (control policy tuning, physical zoning, least privilege for operators). Coordinate with ICS engineers, IT admins, and SOC teams for patch validation and monitoring upgrades. Compliance & Framework Alignment Ensure assessments comply with industry and regulatory frameworks: NIST SP 800-82, ISA/IEC 62443, ISO 27001, NERC CIP, SANS ICS Top 20 Map findings to MITRE ATT&CK for ICS and monitor emerging CVEs relevant to industrial products. Eligibility Educational Background: Bachelor’s or Master’s in Cybersecurity, Computer Science, Industrial Automation, Electronics, or a related field. Technical Skills: Deep knowledge of ICS/SCADA systems, embedded architectures, and real-time OS (VxWorks, QNX, FreeRTOS). Hands-on experience with tools: VAPT Tools: Nessus, Burp Suite, Metasploit, Nmap, Nikto, SQLMap ICS Tools: Wireshark, Scapy, PLCScan, ICSFuzz, S7comm Tools, Conpot, ModScan Firmware Tools: Binwalk, Ghidra, Radare2, OpenOCD, Logic Analyzers IIoT Security: Shodan, Censys, MQTTX, Postman, OWASP ZAP Certifications (Preferred): OSCP, GRID, GICSP, CRT, CRTP, CEH, CISSP, or equivalent. Participation in ICS/IoT-focused CTFs or open-source contributions is a plus. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less

Posted 2 weeks ago

Apply

3.0 - 5.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

Job title : Security Tester (Core Backend) Vacancy Position : 02 Experience Maximum Budget for 3-5 Years : 10-15% hike or Upto 12 LPA whichever is lower About company The National e-Governance Division has been set up by the Ministry of Electronics & Information Technology as an Independent Business Division under the Digital India Corporation {erstwhile Media Lab Asia}. Since 2009, NeGD has been playing a pivotal role in supporting MeitY in Programme Management and implementation of the e-Governance Projects; providing technical and advisory support to Ministries/ Departments, both at Central and State levels along with other Government organizations. NeGDs major operational areas include programme management, project development, technology management, capacity building, awareness and communications-related activities under the flagship Digital India Programme. NeGD has developed and is managing several National Public Digital Platforms such as DigiLocker, UMANG, Rapid Assessment System, OpenForge, API Setu, Poshan Tracker, Academic Bank of Credits, National Academic Depositories, National AI Portal, MyScheme, India Stack Global, Meri Pehchaan, etc. More details can be seen at https://negd.gov.in Overview The job holder will be designing and implementing security measures to protect computer systems, networks, and data from unauthorized access, attacks, and other security threats, as well as conducting security assessments of existing systems and identifying vulnerabilities or weaknesses that need to be addressed. He/ She may be used in other projects of Digital India as well, whenever required. Roles and Responsibilities The security test engineer will be part of the audit team that shall conduct security audits for web-application security, mobile app security, Network security and IT infrastructure security. Shall be responsible for the development and execution of the individual audit tasks assigned to them and prepares a detailed report in its regards as desired. Conduct post-release/ post-implementation testing. Shall prepare VAPT (Vulnerability Assessment & Penetration Testing) reports using defined templates and assist the management for finalization of audit reports. Shall prepare the audit plans, test cases, and test scenarios to perform the security audit. Create logs to document testing phases and defects. Essential Qualification Graduation/B.E/B. Tech./ MCA or equivalent. Qualification can be relaxed in the case of exceptional candidates. Experience & Skill Experience in Vulnerability Assessment and Penetration testing. Experience in project management and QA methodology. Experience in analysing and in identifying vulnerabilities manually. Experience in web application, MobileApp and network Vulnerability Assessment & Penetration Testing. Experience in Vulnerability Assessment and Penetration testing using industry standard tools such as Vulnerability Scanners for e.g. OWASP ZAP, Nessus, Sqlmap, Acunetix, Nmap, Burp Suite Pro, Netsparker etc. Experience and knowledge of Web Application Security standards such as OWASP/SANS etc. Show more Show less

Posted 3 weeks ago

Apply

2.0 years

0 Lacs

Mumbai Metropolitan Region

On-site

Linkedin logo

Position: VAPT Specialist Experience: 2+ Years Location: Mumbai/ Thane Notice Period: Immediate Joiners Primary Skills: VAPT, CEH Certification, Metasploit, Penetration Testing, Linux Key Responsibilities: Perform Web Application Vulnerability Assessments and Penetration Testing to identify and exploit vulnerabilities in web applications. Conduct Mobile Application Vulnerability Assessments and Penetration Testing on Android and iOS platforms, identifying weaknesses and suggesting appropriate fixes. Lead Network Penetration Testing to evaluate the security posture of internal and external networks. Reverse engineer malware, analyze data obfuscation techniques, and work with cryptographic ciphers to detect and mitigate threats. Utilize industry-leading penetration testing tools such as Metasploit, BurpSuite, w3af, Kali Linux, SQLMap, Skipfish, MObSF, Androbugs, Nessus, and others to automate and perform testing. Leverage Linux/UNIX environments, including proficiency in Bash and PowerShell scripting, to perform testing and automate tasks. Document findings, provide detailed reports, and assist in remediation by working closely with internal teams. Stay up-to-date with emerging threats, vulnerabilities, and penetration testing methodologies. Qualifications & Requirements: 2-4 years of hands-on experience in performing web application, mobile application, and network penetration testing. Strong expertise in Web Application Vulnerability Assessment & Penetration Testing. Hands-on experience with Mobile Application Vulnerability Assessment & Penetration Testing (Android and iOS). Proficient in Network Penetration Testing and Security Assessment techniques. Experience with reverse engineering malware, analyzing obfuscated data, and cryptographic analysis. Strong command of penetration testing tools such as Metasploit, BurpSuite, w3af, Kali Linux, SQLMap, Skipfish, MObSF, Androbugs, Nessus, and others. CEH (Certified Ethical Hacker) certification is mandatory. Knowledge of Linux/UNIX operating systems and Bash or PowerShell scripting. Excellent problem-solving skills and the ability to think creatively in assessing security weaknesses. Strong communication skills for writing technical reports and working with cross-functional teams. Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

Navi Mumbai, Maharashtra, India

On-site

Linkedin logo

Job Title: Vulnerability Assessment and Penetration Testing Internship for Technical services - (Performance based conversion to full-time Role) Job Location: Mumbai (On-site) Duration: 6 Months Note: Looking only for Immediate joiners (5 Days) Qualifications: BE/B. Tech with specialization in cyber security, MCA, M. Tech / Master’s in Information security, or Forensics Analysis Knowledge. Mandatory Certifications: CEH-EC-council / EJPT / PNPT / EWPT / CRTP Role and Responsibility: • Conduct Network/ System Vulnerability Assessments, Penetration Testing using tools to evaluate attack vectors, identify system vulnerabilities, and provide appropriate remediation plans for mitigation of the identified vulnerabilities. • Conduct Application vulnerability assessments, Penetration Testing for web applications, identify and report vulnerabilities, provide recommendations, and track closure of identified vulnerabilities. • Perform Configuration compliance assessments for Endpoints / Assets /network devices and help maintain the security settings at compliant level with Specific Security Standards. • Perform regular monitoring of patch compliance of the assets in the network, Analyze Patch Advisories and provide remediation steps for the stakeholders. • Performing comprehensive review and threat adversary modeling for web applications. • Conduct Vulnerability Assessments, Penetration Testing, Device Hardening, Application Security Assessments, Log Review, Review of Documents, Network Monitoring and Reporting • Conduct and compile findings on new vulnerabilities, new tools for departmental use. • Create project deliverables / reports and assist the client with remediations and discussions. • Abide by the project timelines and maintain project discipline. Technical Skills Required: • Hands-on Experience in performing Network Security Assessment and vulnerability Assessment. • Good understanding of OSI layers and fundamental Operating system concepts, security settings for various flavors of Windows and Linux platforms. • Sound knowledge about Application vulnerability assessments and relevant knowledge of OWASP top 10 vulnerabilities and SANS. • Hands on knowledge on Tools: Nmap, Kali Linux, Metasploit, Armitage, Maltego, Burp Suite, Paros Proxy Nessus, nexpose, Wireshark, sqlmap etc. • Manual Penetration Testing skills and techniques are required besides automated tools and frameworks. • Familiar working with Publicly available exploits codes. • Sound knowledge about infrastructure vulnerability scans, identifying security vulnerabilities, weaknesses, threats, and assessing related risks that exists within an IT Infrastructure or business processes. • Good understanding of firewalls, Switches, and Router’s configuration settings and policies, relevant experience in performing rule base reviews and configuration reviews for network devices. Show more Show less

Posted 3 weeks ago

Apply

3.0 years

0 Lacs

New Delhi, Delhi, India

On-site

Linkedin logo

Job Title : Ethical Hacking Trainer (Full-Time/Part-Time) Location : Greater Kailash 2, South Delhi Company : DizitalAdda – A Leading Digital & Professional Education Institute About Us : DizitalAdda is a premier digital marketing and professional skills training institute located in the heart of South Delhi. With an established presence in digital education, we are now expanding into the Cyber Security and Ethical Hacking domain. We are currently seeking a skilled and passionate Ethical Hacking Trainer to join our team and deliver hands-on, industry-relevant training to aspiring cybersecurity professionals. Roles & Responsibilities : Deliver engaging, practical, and real-world-based training in Ethical Hacking. Teach topics like: Vulnerability Assessment Penetration Testing Network & Web Application Security Social Engineering Wi-Fi Hacking Cryptography Tools like Kali Linux, Wireshark, Nmap, SQLMap, Metasploit, etc. Create training content, assignments, and live labs for learners. Prepare students for certifications like CEH, OSCP, or CompTIA Security+. Maintain course quality and student satisfaction. Conduct doubt sessions and assessments regularly. Required Skills : Strong knowledge of Ethical Hacking, Cybersecurity, and Penetration Testing. Hands-on experience with real-world attack & defense scenarios. Good communication and presentation skills. Familiarity with Linux OS, Networking basics, and scripting (Python preferred). Previous training experience (offline/online) preferred. Qualifications : Bachelor's in Computer Science/IT/Cyber Security or equivalent. Certifications like CEH / OSCP / Security+ (preferred but not mandatory). 1–3 years of experience in cybersecurity training or real-world cybersecurity projects. Employment Type : Full-Time / Part-Time / Weekend Batch Trainer (Flexible Options Available) Salary : ₹20,000 – ₹50,000 per month (Based on experience & expertise) Why Join Us ? Prime Location: South Delhi (Greater Kailash 2) Modern classrooms & lab setup Freedom to design practical sessions Exposure to corporate clients and real projects Growth opportunities in a fast-growing education brand How to Apply: Send your resume and any certification proof to: 📩 hr@dizitaladda.com 📞 +91-9555393551 🌐 www.dizitaladda.com Show more Show less

Posted 3 weeks ago

Apply

0.0 - 3.0 years

0 Lacs

Greater Kailash II, Delhi, Delhi

On-site

Indeed logo

Job Title: Ethical Hacking Trainer (Full-Time/Part-Time) Location: Greater Kailash 2, South Delhi Company: DizitalAdda – A Leading Digital & Professional Education Institute About Us: DizitalAdda is a premier digital marketing and professional skills training institute located in the heart of South Delhi. With an established presence in digital education, we are now expanding into the Cyber Security and Ethical Hacking domain. We are currently seeking a skilled and passionate Ethical Hacking Trainer to join our team and deliver hands-on, industry-relevant training to aspiring cybersecurity professionals. Roles & Responsibilities: Deliver engaging, practical, and real-world-based training in Ethical Hacking . Teach topics like: Vulnerability Assessment Penetration Testing Network & Web Application Security Social Engineering Wi-Fi Hacking Cryptography Tools like Kali Linux, Wireshark, Nmap, SQLMap, Metasploit, etc. Create training content, assignments, and live labs for learners. Prepare students for certifications like CEH, OSCP, or CompTIA Security+ . Maintain course quality and student satisfaction. Conduct doubt sessions and assessments regularly. Required Skills: Strong knowledge of Ethical Hacking, Cybersecurity, and Penetration Testing . Hands-on experience with real-world attack & defense scenarios. Good communication and presentation skills. Familiarity with Linux OS, Networking basics, and scripting (Python preferred). Previous training experience (offline/online) preferred. Qualifications: Bachelor's in Computer Science/IT/Cyber Security or equivalent. Certifications like CEH / OSCP / Security+ (preferred but not mandatory). 1–3 years of experience in cybersecurity training or real-world cybersecurity projects. Employment Type: Full-Time / Part-Time / Weekend Batch Trainer (Flexible Options Available) Salary: ₹20,000 – ₹50,000 per month (Based on experience & expertise) Why Join Us? Prime Location: South Delhi (Greater Kailash 2) Modern classrooms & lab setup Freedom to design practical sessions Exposure to corporate clients and real projects Growth opportunities in a fast-growing education brand How to Apply: Send your resume and any certification proof to: ✅ hr@dizitaladda.com ✅ +91-9555393551 ✅ www.dizitaladda.com Job Types: Full-time, Permanent Pay: ₹11,340.58 - ₹45,000.00 per month Benefits: Health insurance Paid sick time Provident Fund Schedule: Day shift Evening shift Morning shift Rotational shift Weekend availability Supplemental Pay: Commission pay Performance bonus Yearly bonus Language: English (Preferred) Work Location: In person

Posted 3 weeks ago

Apply

1.0 years

0 Lacs

Ahmedabad, Gujarat

On-site

Indeed logo

Red & White Education Pvt Ltd , founded in 2008, is Gujarat's leading educational institute. Accredited by NSDC and ISO, we focus on Integrity, Student-Centricity, Innovation, and Unity. Our goal is to equip students with industry-relevant skills and ensure they are employable globally. Join us for a successful career path. Job Description: Faculties guide students, deliver course materials, conduct lectures, assess performance, and provide mentorship. Strong communication skills and a commitment to supporting students are essential. Key Responsibilities: Deliver lectures and practical sessions on various cyber security topics. Design curriculum and assessments based on industry standards. Guide students through hands-on labs and projects. Stay updated with current cybersecurity trends, tools, and practices. Mentor students on ethical practices and real-world case studies. Participate in academic meetings, workshops, and faculty development. Required Skills: Strong knowledge of Computer Basics, OS, DBMS, Ethical Hacking, Network & System Security, Web/API/Mobile Security, Digital Forensics, and SOC operations. Hands-on experience with tools like Kali Linux, Metasploit, Nmap, Wireshark, Burp Suite, OWASP ZAP, SQLmap, Postman, MobSF, Frida, Xcode, Autopsy, FTK Imager, Splunk, ELK Stack, AlienVault, and TheHive. Education & Experience Requirements: Bachelor’s or Master’s degree in Computer Science, IT, Cybersecurity, or related field Minimum 1 year of teaching or industry experience in cybersecurity or networking Practical knowledge of cybersecurity tools and technologies Strong communication and presentation skills Relevant certifications (CEH, OSCP, CompTIA Security+, etc.) preferred For further information, please feel free to contact 7862813693 us via email at career@rnwmultimedia.edu.in Job Types: Full-time, Permanent, Fresher Pay: ₹25,000.00 - ₹35,000.00 per month Benefits: Cell phone reimbursement Flexible schedule Leave encashment Paid sick time Paid time off Schedule: Day shift Morning shift Supplemental Pay: Performance bonus Yearly bonus Application Question(s): Current Salary? Experience: Teaching / Mentoring: 1 year (Preferred) Cybersecurity: 1 year (Preferred) Location: Ahmedabad, Gujarat (Preferred) Work Location: In person

Posted 3 weeks ago

Apply

0 - 6 years

6 - 9 Lacs

Jaipur

Work from Office

Naukri logo

AM Enterprise is hiring a remote Red Team Security Specialist to simulate cyberattacks, perform penetration tests, and collaborate with Blue Team members to enhance cybersecurity defenses. Requires expertise in penetration testing tools, scripting. Health insurance Annual bonus Office cab/shuttle

Posted 2 months ago

Apply

9 - 12 years

37 - 40 Lacs

Ahmedabad, Noida, Kolkata

Work from Office

Naukri logo

Dear Candidate, We are looking for a skilled Penetration Tester to identify and exploit vulnerabilities in systems, networks, and applications. If you have expertise in ethical hacking, red teaming, and security assessments, we'd love to hear from you! Key Responsibilities: Perform penetration testing and ethical hacking on web applications, networks, and systems. Identify security vulnerabilities and provide remediation recommendations. Simulate real-world cyber attacks to test security controls. Utilize tools like Burp Suite, Metasploit, and Kali Linux for security assessments. Document findings in detailed security reports. Collaborate with development and security teams to enhance security measures. Stay updated with the latest hacking techniques, threats, and vulnerabilities. Required Skills & Qualifications: Strong knowledge of penetration testing methodologies (OWASP, OSSTMM). Hands-on experience with security tools like Nmap, Nessus, and Wireshark. Proficiency in scripting for automation (Python, Bash, PowerShell). Knowledge of web security vulnerabilities (XSS, SQL Injection, CSRF). Familiarity with cloud security testing (AWS, Azure, GCP). Soft Skills: Strong problem-solving and analytical skills. Excellent communication skills to work with cross-functional teams. Ability to work independently and as part of a team. Detail-oriented with a focus on delivering high-quality solutions. Note: If you are interested, please share your updated resume and suggest the best number & time to connect with you. If your resume is shortlisted, one of the HR from my team will contact you as soon as possible. Srinivasa Reddy Kandi Delivery Manager Integra Technologies

Posted 2 months ago

Apply

4 - 9 years

6 - 11 Lacs

Hyderabad

Work from Office

Naukri logo

What youll be doing... Verizon Cyber Security Team is looking for a Penetration Tester to join our Application Pen Test team. Youll be joining a group of talented, creative thinkers who "act like the enemy" to focus on ensuring that infrastructure and applications (web, mobile, and API) are secure by performing penetration testing from both inside and outside of Verizon. . This team isnt a "copy and paste from a scan tool" reporting team, or a cookie cutter just scanning with tools team, or a team that just monitors and supports security scanning tools used by developers. This team is an enterprise-recognized and supported group of skilled, experienced and certified ethical hacking Verizon employees who are trusted to direct themselves with a lot of unknowns. The successful candidate will possess an effective aptitude in thinking like an adversary, security of Web applications, Infrastructure, APIs and Mobile Applications, mentoring and leading junior pen testers and effectively translating highly technical information to internal customers in a way that supports Cyber Security Team and broader Verizon goals. The ability to lead and perform full scope penetration testing on complex web applications, Infrastructure, APIs and Mobile applications. Configuring and safely utilizing attacker tools, tactics, and procedures for Verizon environments. Developing comprehensive and accurate reports and presentations for both technical and executive audiences. The ability to make collaborative decisions on the impact of an exposure to Verizon. Acting as a SME and guide, advising on security vulnerability impact, ratings and remediation recommendations across the organization as needed. Helping define the Pen Test strategy and standards to further enhance the companys security posture. Effectively communicating findings and strategy to client stakeholders including technical staff, executive leadership, and legal counsel. Working closely with stakeholders and developers providing risk-appropriate and pragmatic recommendations to correct found vulnerabilities. Developing scripts, tools, or methodologies to enhance Verizons pen testing processes and effectiveness. Driving technical oversight and mentoring junior pen testers on pen test engagements, vulnerability impact and ratings and remediation recommendations. Providing leadership and guidance to advance the offensive capabilities of the team and its subsequent ability to defend the Verizon Enterprise. What were looking for... Youll need to have: Bachelor's degree and four or more years of work experience. Four or more years of relevant work experience. Relevant pen testing or security experience. Deep understanding of OWASP Top 10, OWASP API Top 10, MASVS. Even better if you have one or more of the following: Strong knowledge of tools used for API, infrastructure, web application, mobile, and network security testing, such as Kali Linux, Metasploit, Wireshark, Burp suite, Cobalt Strike, Nessus, Web Inspect, SQLMap. Knowledge of secure software deployment methodologies, tools, and practices. Experience with application security risk procedures, security patterns, authentication technologies and security attack pathologies. Certifications such as: GXPN, GPEN, eWPT, GCIH, GWAPT, OSCP, OSWA, OSCE, OSWE. Service Delivery/Governance: ITILv2/3. Solid understanding of common hosting environments such as containerization platforms (e.g., Docker and Kubernetes) and virtual machines running under hypervisors. An implementation level familiarity with all common classes of modern exploitation. Mastery of Unix/Linux/Mac/Windows operating systems, including bash and Powershell. Programming skills preferred and encouraged, as well as the ability to read and assess applications written multiple languages, such as Python, JAVA, .NET, C#, or others. Experience with system and application security threats and vulnerabilities and secure configuration management techniques, software debugging principles, software design tools, methods, and techniques, software development models (e.g., Waterfall Model, Spiral Model). Knowledge of secure coding techniques. Some experience with software related information technology (IT) security principles and methods (e.g., modularization, layering, abstraction, data hiding, and simplicity/minimization). Knowledge of secure software deployment methodologies, tools, and practices. Knowledge in discerning the protection needs (i.e., security controls) of information systems and networks.

Posted 3 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies