Home
Jobs

740 Vulnerability Assessment Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 5.0 years

12 - 15 Lacs

Jaipur

Work from Office

Naukri logo

Sankara Eye Foundation is looking for Consultant Vitreo Retina & Paediatric Ophthalmology to join our dynamic team and embark on a rewarding career journey Diagnose and treat retina disorders in children and adults Perform surgical interventions and follow-up care Guide patients on visual rehabilitation Lead research and training initiatives

Posted 14 hours ago

Apply

0.0 - 12.0 years

8 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Description & Requirements About the Role The Application Security Expert plays a role in ensuring the security of our Software Products as we handle applications for Automotive OEMs. The Application Security Expert will perform formal vulnerability assessment and penetration tests on Cloud platforms, networks, webservices and APIs. The candidates should have knowledge of open source penetration tools and test procedures. Your Team The role APPLICATION SECURITY EXPERT will report to Alexander Ashkinazi, Head of Cyber Security for Software Products. Number of direct reporters to APPLICATION SECURITY EXPERT - 0 (zero) What You Will Do We are seeking a highly skilled Application Security Expert to join HARMAN Automotive Software Products and play a role in ensuring the security of our Software Products. Our customer security culture is of critical importance, as we are delivering software to numerous Automotive OEMs on a daily basis. The successful candidate will face a multitude of security-related challenges and will be responsible for implementing Secure Software Development Lifecycle (SSDLC) processes, owning security tasks, guiding development teams, analyzing penetration tests, and managing vulnerabilities. Additionally, the candidate shall be responsible for the application security reviews, work closely with the development teams across Software Products business unit. Candidate shall also have extensive expertise into product security solution, Application/API security, databases security, infrastructure vulnerabilities assessment and management, vulnerability assessment and penetration testing (VAPT) services for applications (white/gray/black box concept of penetration testing and corresponding tools). The job entails planning & tracking of tasks for the product and project in order to achieve the timely delivery of committed services to customer. Ready to travel approx. 15% of his work position domestically or international. What You Need Collaborate with development teams to consistently implement and enforce the Secure SDLC process, ensuring security is embedded throughout the software development lifecycle. Review the existing security measures and propose and implement enhancements to strengthen our security posture. Conduct post-event analysis of security incidents and implement necessary improvements to prevent future occurrences. Lead vulnerability management efforts, including analyzing customer penetration test reports and vulnerabilities reports, and overseeing remediation efforts. Implement, test, and operate advanced software security techniques in alignment with a technical reference architecture. Conduct ongoing security testing and code reviews to enhance the security of our software solutions. Troubleshoot and debug security-related issues that may arise during development or production phases. Provide engineering designs for new software solutions, ensuring they are fortified against security vulnerabilities. Contribute to architectural decisions with a strong focus on security considerations. Maintain comprehensive technical documentation related to security measures and processes. Offer guidance and training to team members on secure coding practices and security best practices. At least 2 years of proven experience as a software security engineer, demonstrating a strong background in application security. Profound knowledge of all stages of the Secure SDLC process. Deep expertise in authentication, authorization, applied cryptography, security vulnerabilities, and remediation techniques. Important Notice: Recruitment Scams Please be aware that HARMAN recruiters will always communicate with you from an @harman.com email address. We will never ask for payments, banking, credit card, personal financial information or access to your LinkedIn/email account during the screening, interview, or recruitment process. If you are asked for . HARMAN is proud to be an Equal Opportunity / Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, religion, color, national origin, gender (including pregnancy, childbirth, or related medical conditions), sexual orientation, gender identity, gender expression, age, status as a protected veteran, status as an individual with a disability, or other applicable legally protected characteristics. Apply

Posted 14 hours ago

Apply

2.0 - 7.0 years

6 - 10 Lacs

Chennai

Work from Office

Naukri logo

NTT DATA is looking for Security Specialist - Cloudflare to join our dynamic team and embark on a rewarding career journey Diagnosing and treating illnesses, medical conditions, and injuries. Ordering, performing, and interpreting diagnostic tests. Collecting, recording, and maintaining patients' information and histories. Prescribing and administering treatments, therapies, medications, vaccinations, and other specialized medical care. Explaining procedures and discussing test results or prescribed treatments with patients and family members. Monitoring patients' conditions and progress. Directing, coordinating, consulting with, and referring patients to nurses, students, assistants, specialists, therapists, and other medical staff. Advising patients, parents, and guardians on diets, activities, hygiene, and disease prevention. Conducting research and remaining up to date on current trends, discoveries, and developments in the field

Posted 14 hours ago

Apply

4.0 - 9.0 years

7 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

No of years experience 4+ Years Detailed job description - Skill Set: 4+ years of experience in UI development using reactjs with deep understanding of react hooks, session, cookies, state management Deep insight on UI performance, security, cross site scripting, large data handling Using GraphQL for API query Mandatory Skills React JS Work Location Bangalore, Mysore

Posted 15 hours ago

Apply

6.0 - 11.0 years

7 - 11 Lacs

Chennai

Work from Office

Naukri logo

Role Summary: Designs and implements technical solutions for protecting the confidentiality, integrity and availability of sensitive information. Provides technical evaluations of client systems and assists with making security improvements. Provides technical support in the areas of vulnerability assessment, risk assessment, network security and security implementation. Conducts testing and audit log reviews to evaluate the effectiveness of current security measures. Conducts security product evaluations, and recommends products, technologies and upgrades to improve the client s security posture. Responsibilities : Customizes, validates, administers and supports a variety of enterprise wide information security platforms, systems, frameworks and applications, based on requirements provided by management; Develops implementation plans related to information security for systems, tools, platforms, and frameworks. Conducts security assessments of systems, tools, platforms, policies, procedures and frameworks. Creates designs and diagrams related to information security for systems, tools, platforms, and frameworks. Develops standard operating procedures for information security related to systems, tools, platforms, and frameworks. Leads audits and reviews designs for information security issues. Validates vulnerabilities identified during security testing, audits, and assessments, while reviewing for false positives. Understands large scale multi-tenant software products supporting multiple government agencies. Understands large scale software integrations of multiple software products. Acts as source for direction, training and guidance for less experienced information security engineers. Works with engineering teams to define and refine information security and systems management policies and settings. Evaluates new and emerging products, technologies and make recommendations to leadership concerning introduction of new technologies. Required Skills > 6 years of information security experience for state and/or federal agencies required. > 6 years of leading information security assessments, policy development, framework implementation, and tool implementation. Must have knowledge of one or more of the following products: Broadcom Identity Manager, Identity Suite and Single Sign On. Preferred Skills Undergraduate degree Certification from Information Security Program (CISM, CompTIA, GSEC, CISSP, etc.) Preferred. Preferred knowledge of one or more of the following products: Dell Nutanix, Dell VxRail, VMware ESXi/vCenter/NSX/SRM, Microsoft Windows Server, RedHat Enterprise Linux, MS SQL Server, Nagios, NewRelic APM/Infrastructure/Browser, Octopus Deploy, Puppet, Splunk, Veracode.

Posted 15 hours ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Vulnerability Scanning. Experience5-8 Years.

Posted 15 hours ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Threat Modeling. Experience3-5 Years.

Posted 15 hours ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Chennai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Palo Alto Networks - Firewalls. Experience3-5 Years.

Posted 15 hours ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Microsoft Bitlocker. Experience5-8 Years.

Posted 15 hours ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Chennai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Trend Micro Antivirus - Deep Security. Experience3-5 Years.

Posted 15 hours ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Coimbatore

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SailPoint Identity Now. Experience3-5 Years.

Posted 15 hours ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience5-8 Years.

Posted 15 hours ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: PingFederate. Experience3-5 Years.

Posted 15 hours ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Chennai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Palo Alto Prisma Access. Experience3-5 Years.

Posted 15 hours ago

Apply

6.0 - 12.0 years

8 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

" What you need to know: Job location - Working from Bangalore office Mission: Live at the intersection of app runtime & security. Protect applications in a fundamental way so that developers can build great application services and not be constantly looking over their shoulder. BlueRock is changing the landscape of App runtime security. As a Sr. DevOps Engineer for BlueRock Security, you will: Collaborate with cross-functional teams to understand business requirements and translate them into effective cloud solutions Develop automation around git branching, build, packaging, and tracking releases Work with Dev/QA teams to understand product build requirements, setup build environment, and create CI workflows Build and implement CI workflows for development and production branches Develop tools to monitor CI health and infrastructure stack Optimize and influence our CI system Implement and maintain Infrastructure as Code (IaC) practices to ensure consistency and efficiency in infrastructure deployment processes Own AWS environments, and build reusable CloudFormation templates and Terraform modules. Troubleshoot, take ownership of, and resolve complex issues related to cloud infrastructure and services Drive security best practices and ensure compliance with infrastructure and cloud configurations You could be a great fit for this role if you have: (Must Haves) 6 to 12 years of experience working in live production systems Strong knowledge in Unix/Linux environment Experience in Linux compilation and building linux packages Experience in writing make scripts, code compilation, cross platform toolchain, and code coverage tools Experience in compiling product binaries from C/C++/Golang and Rust code Experience in setting up and maintaining SCM tools Git, GitLab or GitHub, and artifactory Experience in automating build process, Git branching, and code merge across branches Experience in any CI tools likes GitLab runner, Jenkins, Teamcity, and with setting up automated CI workflows Familiar with Docker build, environment, and Docker compose files Knowledge of best practices in Build Configurations and release process Experience in reliable build performance measurement Strong knowledge of working with DevSecOps design patterns, processes and best practices Familiar with code scanning and vulnerability assessment tools to ensure secure supply chain Familiar with scripting languages like Python and Bash Experience with CI monitoring tools Familiar with package signing tools Strong communication and collaboration skills Knowledge of leading database technologies Proven experience with AWS/Public Cloud infrastructure Strong knowledge of provisioning and configuration management systems (e.g., Terraform, Ansible, Chef, etc.) Nice to have: Experience in reproducible builds and build frameworks like Bazel/Dun

Posted 15 hours ago

Apply

2.0 - 4.0 years

3 - 4 Lacs

Noida

Work from Office

Naukri logo

Position: Cyber Security Engineer Experience: 2 to 4 Yrs Location: Noida Education: B. E. / B. Tech. MCA Candidate Profile Strong experience in Vulnerability Management - vulnerability (infra and app) scans and remediation plans Strong knowledge in CERT-based Infrastructure Vulnerability Assessment & Management Audit support - support auditors mandate on the security system and artefacts Supprt in Governance (Security Operational Tasks support & governance). Compliance and Risk Management. Willing to work in Physical Security and Human Resource Security aspects Security incident management - Managing the end-to-end security incident lifecycle with corrective measures Security Reporting, Meetings & Communication - Prepare and develop security report as contractually required, attend client and Sopra Steria meetings to provide security expertise and advice Authorisation management - should have managed the accounts & controls in the Infra scope Security Patch management - end-to-end coordination and implementation Security product management - Antivirus Management, like TrendMicro, Defender, etc. . . Certification: CISM & ISO 27001 certification is a must

Posted 17 hours ago

Apply

9.0 - 14.0 years

20 - 25 Lacs

Navi Mumbai, Bengaluru, Delhi / NCR

Work from Office

Naukri logo

Information security, Cyber Security, Data Privacy Security Analysis, Network Security , Information Security Projects, Audit assessment, GRC Security Project Audit Perform Risk Assessment .share resume info@Servingskill.com/whats app 9819832570 Required Candidate profile Information Security Project Audits, assessments appsec Perform Technology Risk Assessments for processes, technology (Information security, Cyber Security, Data Privacy) Security Analysis ISO/CEH

Posted 21 hours ago

Apply

3.0 - 5.0 years

2 - 6 Lacs

Ahmedabad

Work from Office

Naukri logo

About OPL Innovate OPL Innovate is a Fintech company incorporated with an objective to provide advanced technology-based financial innovations and solutions. We are seeking an experienced Linux - System Administrator with strong Linux and networking expertise to join our growing team. Position Overview As a Linux - System Administrator at OPL Innovate, you will be responsible for managing our Linux infrastructure, ensuring the security and stability of our financial technology platforms, and providing technical support to both internal teams and clients. You will play a crucial role in maintaining the reliability of our systems that deliver innovative financial solutions. Designation - Linux - System Administrator (Linux & Networking) Key Responsibilities Install, configure, and maintain Linux-based systems (Ubuntu, CentOS, RHEL) that support our financial technology platforms Manage and troubleshoot web applications and hosting environments to ensure optimal performance Conduct regular Vulnerability Assessment and Penetration Testing (VAPT) to identify and address security vulnerabilities Deploy and manage remote infrastructure with attention to security, scalability, and performance Diagnose and resolve complex network issues that may impact our financial services Develop and maintain technical documentation for systems and procedures Collaborate with development teams to implement security best practices Provide technical guidance and support to team members and clients Monitor system performance and implement improvements as needed Technical Skills Required Proficiency in Linux troubleshooting Web/App hosting, troubleshooting, and maintenance Vulnerability Assessment and Penetration Testing (VAPT) Remote infrastructure deployment, support, and management Strong communication skills Network troubleshooting skills Mandatory Skills Linux OS administration (Ubuntu, CentOS, RHEL) Expertise on NGINX and other proxies Web/App hosting, troubleshooting, and maintenance Vulnerability Assessment and Penetration Testing (VAPT) Strong communication skills Qualifications 3+ years of experience in Linux system administration and technical support Proven expertise in managing Ubuntu, CentOS, and RHEL environments Demonstrated experience in web/application hosting, troubleshooting, and maintenance Strong knowledge of VAPT methodologies and tools Experience with remote infrastructure deployment and management Excellent troubleshooting skills for diagnosing complex technical issues Strong communication skills with the ability to explain technical concepts clearly Experience in the financial technology sector is a plus Location Ahmedabad (Onsite)

Posted 1 day ago

Apply

12.0 - 17.0 years

40 - 50 Lacs

Hyderabad

Work from Office

Naukri logo

Job Title: Principal Engineer Security & Cloud Engineering (Product & SC) Location: Hybrid Experience: 12+ years Employment Type: Full-time We are looking for a Principal Engineer to lead Security and Cloud Engineering efforts for our enterprise Java product with both On-Prem and SaaS deployments. This is a hands-on leadership role driving secure SDLC practices, DevSecOps automation, container security, and platform hardening. You will work closely with engineering, DevOps, QA, and compliance teams to protect the product and infrastructure from vulnerabilities and ensure compliance. Responsibilities Application & Infrastructure Security - Lead secure coding practices and integrate SAST, DAST, Penetration Testing, and vulnerability scanning into the development lifecycle. - Analyze and remediate findings from tools like SpotBugs, Polaris Synopsys, Acunetix, and custom security assessments. Threat Modeling & Risk Mitigation - Perform threat modeling, assess security risks including SQL injection, XSS, CSRF, and privilege escalation. - Guide teams on secure implementation patterns and anti-patterns. Cloud & Container Security - Harden Docker, Kubernetes, and SaaS infrastructure for multi-tenant, secure-by-design deployments. - Implement policies for image scanning, secrets management, network segmentation, and runtime security. Security Automation & DevSecOps - Automate security checks in CI/CD pipelines using tools like GitLab CI, Jenkins, SonarQube, etc. - Promote Infrastructure as Code (IaC) security and integrate tools for Terraform/Helm validations. Governance & Compliance - Define and enforce security standards aligned with OWASP, CIS Benchmarks, and industry best practices. - Maintain documentation and assist with security audits and compliance requirements. Mentoring & Collaboration - Mentor engineers on secure design, coding, and deployment practices. -Collaborate with product owners and engineering managers to drive secure feature development. Qualifications Required Qualifications . 12+ years of experience in application security, DevSecOps, or cloud security within enterprise Java environments. Strong knowledge of penetration testing, static/dynamic analysis, and tools like SpotBugs, Polaris, Acunetix, OWASP ZAP, etc. Expertise in secure coding, vulnerability assessment, and remediating common issues like SQL injection, XSS, and insecure deserialization. Hands-on experience with Docker, Kubernetes, Helm, and cloud-native security tooling. Familiarity with SaaS security concerns: multi-tenancy, access isolation, data encryption, and secure APIs. Experience integrating security into CI/CD pipelines and using GitOps principles. Preferred Qualifications Certifications such as OSCP, CEH, CISSP, or CKS (Certified Kubernetes Security Specialist). Prior experience with security automation, policy-as-code, or container scanning platforms (e.g., Trivy, Aqua, Prisma). Knowledge of threat modeling frameworks (e.g., STRIDE) and secure architecture principles. Exposure to Gen AI tools for secure code analysis, vulnerability triaging, or automated documentation. What We Offer Opportunity to influence product direction and architecture. A collaborative and learning-focused environment. Access to modern tools and Gen AI platforms. Competitive salary and performance bonus Health insurance Hybrid work model Company Description At Quest, we create and manage the software that makes the benefits of new technology real. Companies turn to us to manage, modernize and secure their business, from on-prem to in-cloud, from the heart of the network to the vulnerable endpoints. From complex challenges like Active Directory management and Office 365 migration, to database and systems management, to redefining security, and hundreds of needs in between, we help you conquer your next challenge now. We re not the company that makes big promises. We re the company that fulfills them. We re Quest: Where Next Meets Now. Why work with us! -Life at Quest means collaborating with dedicated professionals with a passion for technology. -When we see something that could be improved, we get to work inventing the solution. -Our people demonstrate our winning culture through positive and meaningful relationship. -We invest in our people and offer a series of programs that enables them to pursue a career that fulfills their potential. -Our team members health and wellness is our priority as well as rewarding them for their hard work. Quest is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, political affiliation, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. Come join us. For more information, visit us on the web at Quest Careers | Where next meets now. Join Quest. Job seekers should be aware of fraudulent job offers from online scammers and only apply to roles listed on quest.com/careers using our applicant system. Note: We do not use text messaging or third-party messaging apps like Telegram to communicate with applicants, so please exercise caution if you are approached in this way and only interact with people claiming to be Quest employees if they have an email address ending in @quest.com or @oneidentity.com #LI-SR1

Posted 1 day ago

Apply

5.0 - 10.0 years

6 - 12 Lacs

Mumbai Suburban, Navi Mumbai, Mumbai (All Areas)

Work from Office

Naukri logo

Vulnerability Assessment & Penetration Testing & configuration review for network, web app, mobile app & thick-client app Configuration reviews for OS ,DB, Firewall, routers, Switches Prepare Threat Intelligence reports Cyber-attack simulations Required Candidate profile Vulnerability Assessment Penetration Testing (PT) Web App Security Knowledge of security assessment tools e.g, Nessus, Acunetix, Appscan, nmap, etc Knowledge of OS -Linux/ UNIX Perks and benefits +++ 10% Perf Bonus + Mediclaim + 30% Company Bonus

Posted 1 day ago

Apply

10.0 - 15.0 years

35 - 40 Lacs

Hyderabad, Bhimavaram, Bengaluru

Work from Office

Naukri logo

Director Product Management | Careers | Netenrich Were hiring! Director Product Management Hyderabad/Bangalore/Bhimavaram About Netenrich, Inc. Netenrich boosts the effectiveness of organizations security and digital operations so they can avoid disruption and manage risk. Resolution Intelligence Cloud is our native-cloud data analytics platform for enterprises and services providers that need highly scalable, multitenant security operations and/or digital operations management. Resolution Intelligence Cloud transforms security and operations data into intelligence that organizations can act on before critical issues occur. More than 3,000 customers and managed service providers rely on Netenrich to deliver secure operations at scale. Job Summary As a Technical Cybersecurity Product Director at Netenrich, you will play a pivotal role in planning, executing, and finalizing roadmap related to MDR and cybersecurity technology solutions. You will collaborate closely with cross-functional teams, clients, and stakeholders to deliver high-quality Product features for MDR on time. The ideal candidate will have a strong technical background in cybersecurity, exceptional Product management skills, and the ability to lead teams effectively. Key Responsibilities: Defining product vision and strategy by setting the overall vision for the product, considering market trends, customer needs, and business goals. Developing and maintaining a product roadmap that outlines the timeline, milestones, and features of the product, ensuring alignment with the overall product strategy Technical Expertise: Demonstrate a deep understanding of cybersecurity technologies, including but not limited to firewalls, intrusion detection systems, encryption, vulnerability assessment tools, and security information and event management (SIEM) & SOAR platforms. Collaborating with cross-functional teams, including stakeholders, engineering teams, product designers, marketing, and sales, to ensure effective coordination throughout the product development lifecycle and product launch Conducting market and competitive analysis by monitoring market trends, competitors, and customer feedback to identify new opportunities, anticipate market changes, and make informed product decisions Providing leadership and guidance, acting as a subject matter expert, and advocating for the products vision while making critical decisions to resolve conflicts that may arise Risk Management: Identify roadmap risks and develop mitigation strategies to minimize potential issues and ensure project success. Quality Assurance: Implement rigorous quality assurance processes to validate that product deliverables meet the highest standards of security and reliability. Documentation: Maintain comprehensive product documentation, including feature plans, technical specifications, and reports, ensuring all product details are accurately recorded. Continuous Improvement: Stay abreast of the latest cybersecurity trends, technologies, and best practices, incorporating them into project methodologies to enhance project outcomes. Requirements: Experience in product management, with a focus on cybersecurity Products and MDR. Exposure to SIEM, SOAR, GC and other security products. Professional certifications such as Certified Product Manager (CPM) or Agile Certified Project Manager (ACPM), Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM) are highly desirable. Proven experience managing complex technical products, including hands-on experience with cybersecurity technologies and tools. Strong leadership, communication, and interpersonal skills, with the ability to collaborate effectively with diverse teams and stakeholders. Exceptional problem-solving abilities and attention to detail, ensuring the successful resolution of technical challenges. Proficiency in product management software tools and techniques. Demonstrated ability to work in a fast-paced environment and manage multiple products simultaneously.

Posted 1 day ago

Apply

8.0 - 10.0 years

25 - 30 Lacs

Bengaluru

Work from Office

Naukri logo

Company Profile: Founded in 1976, CGI is among the largest independent IT and business consulting services firms in the world. With 94,000 consultants and professionals across the globe, CGI delivers an end-to-end portfolio of capabilities, from strategic IT and business consulting to systems integration, managed IT and business process services and intellectual property solutions. CGI works with clients through a local relationship model complemented by a global delivery network that helps clients digitally transform their organizations and accelerate results. CGI Fiscal 2024 reported revenue is CA$14.68 billion and CGI shares are listed on the TSX (GIB.A) and the NYSE (GIB). Learn more at cgi.com. Position: Lead Analyst/Associate Consultant Experience: 8 to 12 years Category: Software Development/ Engineering Location: Bangalore / Hyderabad / Chennai / Pune / Mumbai Position ID: J0125-0745 Employment Type: Full Time Education Qualification: Bachelors degree in Computer Science or related field or higher with minimum 8 years of relevant experience. 8+ years of penetration testing experience, preferably in highly regulated industries and for global clients Proficiency with scripting and programming languages, mainly Python Perform Penetration Testing for networks (internal & external), applications, APIs & cloud assessments Vulnerability identification and analysis Collaborate with team members and stakeholders to define project scopes, review test results, and determine remediation steps Advanced problem-solving skills Any security certifications are a plus Strong written and verbal communication skills Ability to work autonomously with little directional oversight Ability to lead a project and multiple testers Commitment to quality and on-schedule delivery; and a proven ability to establish and meet milestones and deadlines Customer-focused mentality to understand and appropriately respond to customers business needs Draft reports and communicate complex security concepts and test findings to clients and stakeholders Make expert recommendations to help clients improve their information security program Work on researching & developing utilities, toolkits, processes, tactics, and techniques Required qualifications to be successful in this role: Must to have skills-Penetration testing, DAST Testing, SAST Testing, OWASP top 10 Good to have skills- Python Skills: Java Python Vulnerability Assessment(IAVA) Vulnerability Testing (IAVT)

Posted 1 day ago

Apply

5.0 - 10.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityNow Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : BE or MCA or MSc with Good Computer Science Background with good academic record. Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Be a key player in shaping the security landscape of the organization. SailPoint IdentityIQ Roles & Responsibilities:- Expected to be an SME, collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Lead the design and implementation of security solutions.- Conduct security assessments and provide recommendations for improvements.- Develop security policies and procedures.- Stay updated on the latest security trends and technologies. Professional & Technical Skills: - Must have Skills: Proficiency in SailPoint IdentityNow.- Strong understanding of cloud security principles.- Experience with security architecture design and implementation.- Knowledge of industry standards and best practices in cloud security.- Hands-on experience with security tools and technologies.- Good To Have Skills: CISSP certification.- Experience with cloud platforms such as AWS or Azure. Additional Information:- The candidate should have a minimum of 5 years of experience in SailPoint IdentityNow.- This position is based at our Bengaluru office.- A BE or MCA or MSc with Good Computer Science Background with good academic record is required. Qualification BE or MCA or MSc with Good Computer Science Background with good academic record.

Posted 1 day ago

Apply

7.0 - 12.0 years

13 - 17 Lacs

Hyderabad

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : SailPoint IdentityIQ Good to have skills : SailPoint IdentityNowMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. You will document the implementation of the cloud security controls and transition to cloud security-managed operations. Showcasing creativity and expertise in cloud security solutions. Roles & Responsibilities:- Expected to be an SME, collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Provide solutions to problems for their immediate team and across multiple teams.- Develop and implement security architecture solutions.- Conduct security assessments and provide recommendations.- Lead security projects and initiatives.- Stay updated on the latest security trends and technologies. Professional & Technical Skills: - Must To Have Skills: Proficiency in SailPoint IdentityIQ.- Strong understanding of identity and access management concepts.- Experience in designing and implementing security solutions.- Knowledge of cloud security best practices.- Hands-on experience with SailPoint IdentityNow.- Experience in conducting security assessments and audits. Additional Information:- The candidate should have a minimum of 7.5 years of experience in SailPoint IdentityIQ.- This position is based at our Hyderabad office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 1 day ago

Apply

10.0 - 14.0 years

8 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

Skill required: Tech for Operations - Security Governance Designation: Security Delivery Associate Manager Qualifications: BE/Master of Engineering Years of Experience: 10 to 14 years About Accenture Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Technology and Operations services, and Accenture Song all powered by the worlds largest network of Advanced Technology and Intelligent Operations centers. Our 699,000 people deliver on the promise of technology and human ingenuity every day, serving clients in more than 120 countries. Visit us at www.accenture.com What would you do You will be part of the Technology for Operations team that acts as a trusted advisor and partner to Accenture Operations. The team provides innovative and secure technologies to help clients build an intelligent operating model, driving exceptional results. We work closely with the sales, offering and delivery teams to identify and build innovative solutions.The Tech For Operations (TFO) team provides innovative and secure technologies to help clients build an intelligent operating model, driving exceptional results. Works closely with the sales, offering and delivery teams to identify and build innovative solutions. Major sub deals include AHO(Application Hosting Operations), ISMT (Infrastructure Management), Intelligent AutomationA process of establishing and maintaining a security governance framework. Support management structure and processes to provide assurance that information security strategies are aligned with and support business objectives are consistent with applicable laws and regulations through adherence to policies and internal controls, and provide assignment of responsibility, metrics, reporting all in an effort to manage the risk and compliance requirements. What are we looking for Commitment to qualityExperience in research and developmentNegotiation skillsProblem-solving skillsRisk managementThe role demands Indepth knowledge in application security area. Candidate should have hands on experience in SAST, DAST, Penetration testing. DevSecOps and Software composition analysis are other areas where the candidate should have experience in.The role also demands capability of scripting using Python and other related required knowledge of database and networking.Certifications like CISSP, CCSP, CISM, CEH, ECSA etc. will be added advantage. Roles and Responsibilities: In this role you are required to do analysis and solving of moderately complex problems Typically creates new solutions, leveraging and, where needed, adapting existing methods and procedures The person requires understanding of the strategic direction set by senior management as it relates to team goals Primary upward interaction is with direct supervisor or team leads Generally interacts with peers and/or management levels at a client and/or within Accenture The person should require minimal guidance when determining methods and procedures on new assignments Decisions often impact the team in which they reside and occasionally impact other teams Individual would manage medium-small sized teams and/or work efforts (if in an individual contributor role) at a client or within Accenture Please note that this role may require you to work in rotational shifts Qualification BE,Master of Engineering

Posted 1 day ago

Apply

Exploring Vulnerability Assessment Jobs in India

Vulnerability assessment is a crucial aspect of cybersecurity, and the demand for professionals with this skill set is on the rise in India. Organizations are becoming increasingly aware of the importance of securing their systems against potential threats, making vulnerability assessment roles highly sought after in the job market.

Top Hiring Locations in India

  1. Bangalore
  2. Mumbai
  3. Delhi
  4. Hyderabad
  5. Pune

These cities are known for their thriving IT industries and are hotspots for companies looking to bolster their cybersecurity measures.

Average Salary Range

The salary range for vulnerability assessment professionals in India can vary based on experience and location. On average, entry-level professionals can expect to earn around INR 4-6 lakhs per annum, while experienced professionals with several years of experience can earn upwards of INR 12 lakhs per annum.

Career Path

In the field of vulnerability assessment, a typical career progression may look something like this: - Junior Vulnerability Analyst - Vulnerability Analyst - Senior Vulnerability Analyst - Vulnerability Assessment Team Lead - Vulnerability Assessment Manager

With each step up the ladder, professionals take on more responsibilities and lead larger projects within the organization.

Related Skills

In addition to expertise in vulnerability assessment, professionals in this field are often expected to have knowledge of: - Penetration testing - Network security - Incident response - Security compliance frameworks

Having a well-rounded skill set can make you a more attractive candidate for vulnerability assessment roles.

Interview Questions

  • What is the difference between vulnerability scanning and penetration testing? (basic)
  • How would you prioritize vulnerabilities based on severity? (medium)
  • Can you explain the concept of CVE (Common Vulnerabilities and Exposures)? (medium)
  • What tools do you use for vulnerability assessment? (basic)
  • How do you stay updated on the latest security threats and vulnerabilities? (basic)
  • Can you walk us through a recent vulnerability assessment project you worked on? (medium)
  • What is OWASP and how does it relate to vulnerability assessment? (medium)
  • How do you handle false positives in vulnerability scanning? (medium)
  • What is the difference between CVSS v2 and CVSS v3? (advanced)
  • Have you ever conducted a social engineering test as part of a vulnerability assessment? (advanced)
  • How do you ensure compliance with industry regulations during a vulnerability assessment? (medium)
  • What is the role of threat intelligence in vulnerability assessment? (medium)
  • How do you communicate vulnerabilities and risks to non-technical stakeholders? (medium)
  • Can you explain the concept of zero-day vulnerabilities? (medium)
  • How do you approach vulnerability assessment for cloud environments? (medium)
  • Have you worked with any bug bounty programs? If so, can you share your experience? (advanced)
  • What steps do you take to secure IoT devices from vulnerabilities? (medium)
  • How do you conduct a physical security assessment as part of a vulnerability assessment? (advanced)
  • Can you discuss a time when you identified a critical vulnerability that had been overlooked by others? (advanced)
  • How do you track and prioritize remediation efforts for identified vulnerabilities? (medium)
  • What role does threat modeling play in vulnerability assessment? (medium)
  • How do you assess the security posture of third-party vendors or partners? (medium)
  • Can you explain the concept of a buffer overflow vulnerability? (medium)
  • How do you ensure that vulnerability assessment tools are not impacting the performance of the systems being scanned? (basic)

Closing Remark

As you venture into the world of vulnerability assessment jobs in India, remember to continuously upskill and stay informed about the latest trends in cybersecurity. By honing your skills and preparing thoroughly for interviews, you can confidently pursue opportunities in this dynamic and rewarding field. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies