Jobs
Interviews

2 Systems Administrators Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 5.0 years

3 - 6 Lacs

bengaluru, karnataka, india

On-site

1 Proficiency in one or more scripting or programming languages 2 Familiarity with penetration testing methodologies, tools (e.g., Burp Suite, Nmap, Metasploit), and scripting languages (e.g., Python, Bash, PowerShell). 3 Analyse vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. 4 Plan, execute, and report on penetration tests of applications, networks, APIs, cloud environments, and other IT assets 5 Consult with application developers, systems administrators, and management to demonstrate security testing results, explain the threat presented by the results, and consult on remediation 6 Communicate security issues to a wide variety of internal and external customers to include technical teams, executives, risk groups, vendors and regulators 7 Proactively pursue, validate and report any system security loopholes, infringements and vulnerabilities identified. 8 Conducting internal and external network assessments, exploiting infrastructure weaknesses. 9 Facilitate and coordinate vulnerability assessments and scans, review assessment results, and oversee remediation activities for network and infrastructure devices. 10 Manage and maintain up-to-date vulnerability, asset, and configuration databases. 11 Provide detailed findings, risk ratings, and remediation recommendations to technical and non-technical audiences 12 Prioritize vulnerabilities based on criticality, exploitability, and potential business impact.

Posted 1 day ago

Apply

2.0 - 5.0 years

3 - 6 Lacs

delhi, india

On-site

1 Proficiency in one or more scripting or programming languages 2 Familiarity with penetration testing methodologies, tools (e.g., Burp Suite, Nmap, Metasploit), and scripting languages (e.g., Python, Bash, PowerShell). 3 Analyse vulnerability scan results from tools like Tenable, Qualys, or Rapid7 to identify security weaknesses across infrastructure and applications. 4 Plan, execute, and report on penetration tests of applications, networks, APIs, cloud environments, and other IT assets 5 Consult with application developers, systems administrators, and management to demonstrate security testing results, explain the threat presented by the results, and consult on remediation 6 Communicate security issues to a wide variety of internal and external customers to include technical teams, executives, risk groups, vendors and regulators 7 Proactively pursue, validate and report any system security loopholes, infringements and vulnerabilities identified. 8 Conducting internal and external network assessments, exploiting infrastructure weaknesses. 9 Facilitate and coordinate vulnerability assessments and scans, review assessment results, and oversee remediation activities for network and infrastructure devices. 10 Manage and maintain up-to-date vulnerability, asset, and configuration databases. 11 Provide detailed findings, risk ratings, and remediation recommendations to technical and non-technical audiences 12 Prioritize vulnerabilities based on criticality, exploitability, and potential business impact.

Posted 1 day ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies