Jobs
Interviews

2727 Vulnerability Assessment Jobs - Page 10

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 8.0 years

4 - 8 Lacs

bengaluru

Work from Office

https://zrec.in/fzrVM?source=CareerSite

Posted 1 week ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 week ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 week ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 week ago

Apply

3.0 - 6.0 years

8 - 13 Lacs

hyderabad

Work from Office

Cigna TTK Health Insurance Company Limited is looking for Cyber Security Lead Analyst to join our dynamic team and embark on a rewarding career journey Design and implement security measures to protect systems, networks, and data from cyber threats. Perform vulnerability assessments, penetration tests, and security audits to identify risks. Monitor security systems for suspicious activity and respond to incidents promptly. Develop and enforce security policies, procedures, and standards. Collaborate with IT and development teams to integrate security into software development lifecycle (SDLC). Stay updated on emerging cybersecurity threats and mitigation techniques. Disclaimer: This job desc...

Posted 1 week ago

Apply

4.0 - 8.0 years

11 - 15 Lacs

hyderabad

Work from Office

Cigna Medical Group is looking for Cyber Security Lead Analyst to join our dynamic team and embark on a rewarding career journey Threat Detection and Analysis: Monitor network traffic, system logs, and security alerts to detect and analyze potential security threats, such as malware, intrusions, and unauthorized access Incident Response: Develop and execute incident response plans to address and mitigate security incidents and breaches Vulnerability Assessment: Identify vulnerabilities in software, hardware, and network configurations, and recommend patches and security updates Security Monitoring: Continuously monitor and analyze security events, assess system vulnerabilities, and recommend...

Posted 1 week ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

chennai

Work from Office

The vision for Books org is to make every book ever published, in any language, available for every customer in less than 60 seconds. The Books shopping Experience team plays a key role in making this vision happen by providing shopping experiences that helps customers discover their next book to read. Customers shop for Kindle books from a variety of surfaces including desktops/laptops, Kindle E-ink devices, Fire Tablets and mobile browser on their phones and tablets. We provide shopping experiences for customers no matter where they are and what device they have. We are looking for a strong Software Development Engineer in Test to help us deliver high quality products with great efficiency...

Posted 1 week ago

Apply

5.0 - 9.0 years

7 - 11 Lacs

hyderabad

Work from Office

Job Description (Summary) The primary responsibilities include managing vulnerability assessments using the Qualys tool, creating detailed metrics and reports, and collaborating with relevant teams to ensure timely remediation of identified vulnerabilities. To ensure the organizations IT infrastructure remains secure by proactively identifying, assessing, and mitigating vulnerabilities through effective use of the Qualys tool and coordinated efforts with cross-functional teams. The basic purpose of this position is to safeguard the organizations digital assets by maintaining a robust vulnerability management program that prioritizes risk reduction and compliance with security policies. Perfo...

Posted 1 week ago

Apply

1.0 - 3.0 years

3 - 5 Lacs

bengaluru

Work from Office

We are looking for a Cyber Security Analyst to be a part of the CloudSEK Cyber-Security team. An ideal candidate will demonstrate an aptitude for learning new technologies, evidenced by the ability to expand upon core knowledge. She/he should be highly analytical with the ability to derive facts quickly, methodically, and accurately. This is a technical role with partial customer-facing responsibility to solve product and cybersecurity-related problems of low to high complexity. You will also act as a focal point for customer problem resolution. We will rely on you to provide timely and accurate analysis for the security incidents tagged on XVigil (CloudSEKs proprietary digital risk monitori...

Posted 1 week ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

hyderabad

Work from Office

The Cyber Security Senior Analyst - Penetration Testing, is responsible for conducting vulnerability assessments, threat modeling, penetration tests of Cigna s IT infrastructure and applications. This role will work closely with the Information Protection Senior Manager to identify, evaluate, and remediate potential weaknesses in Cigna s systems, using both manual and automated methods. Responsibilities Execute internal and external penetration tests against corporate web applications, APIs, networks, infrastructure and operating systems in order to discover vulnerabilities. Execute mobile application penetration tests for both Android and iOS based devices. Execute penetration tests in clou...

Posted 1 week ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

lucknow

Work from Office

We are seeking a highly skilled and experienced Senior Project Owner- Security Officer to join our team. This critical role will be instrumental in strengthening our organization s security posture, ensuring compliance with global standards, and serving as a key liaison with clients regarding our security protocols. Responsibilities As our Lead Security Officer, you will be responsible for: Security Program Implementation: Leading the development and execution of security controls, procedures, and protocols across the organization. Compliance Oversight: Ensuring ongoing compliance with relevant frameworks and regulations including ISO 27001, HIPAA, GDPR, and others as applicable. Internal Au...

Posted 1 week ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

pune

Work from Office

We are looking for a seasoned Network Security Engineer to lead the deployment and management of a Cisco Identity Services Engine (ISE) environment within our AWS infrastructure. This role demands deep expertise in cloud-based network security, ISE architecture, and secure integration practices. Key Responsibilities: Architect and deploy Cisco ISE within AWS cloud environments. Design secure VPC architectures and configure routing, subnets, and security controls. Implement and manage AWS security services (e.g., IAM, Security Groups, NACLs, GuardDuty, etc.). Integrate ISE with AWS services and on-prem systems for identity and access control. Conduct vulnerability assessments and ensure compl...

Posted 1 week ago

Apply

4.0 - 7.0 years

9 - 13 Lacs

pune

Work from Office

Person can support the following CI/CD operations with multiple working Pipelines. Work expertise and familiarity with the DevOps catalog, libraries, and environment using Salesforce Commerce Cloud (SFCC) Expertise in Azure CI/CD pipelines in everyday activities consist of Support build and release were developed to facilitate the deployment of SFCC operations, including Versace and MK, in CAPRI. Expert in writing build pipelines using YAML Script Previous working knowledge with bitbucket connecting with Azure Manually trigger pipelines in response to ad hoc requests from development teams multiple times a day. Pipelines have multiple stages and branches, Based on needs support and adjust th...

Posted 1 week ago

Apply

4.0 - 8.0 years

5 - 8 Lacs

noida, delhi / ncr

Work from Office

Job Summary: The Cybersecurity Engineer focuses on vulnerability assessments and penetration testing (VAPT), identifying risks and developing strategies to secure critical systems. Key Responsibilities: Conduct penetration testing on IT infrastructure and applications. Identify and exploit vulnerabilities in systems and applications. Collaborate with development teams to remediate security issues. Experience on vulnerability assessments to identify and address system weaknesses and potential risks. Maintain up-to-date knowledge of emerging cybersecurity threats and tools. Qualifications: Bachelors degree in Computer Science, IT, or related field. 5+ years of experience in cybersecurity with ...

Posted 1 week ago

Apply

1.0 - 2.0 years

4 - 5 Lacs

navi mumbai, mumbai (all areas)

Work from Office

Candidates having 1+ years of experience can apply Experience in VAPT and AppSec can apply Candidates Having Audit Gaps closing Experience will be an added advantage

Posted 1 week ago

Apply

3.0 - 8.0 years

5 - 12 Lacs

hyderabad, chennai, mumbai (all areas)

Work from Office

Roles & Responsibilities - Coordinate with GRC teams to ensure security controls related to vulnerability and configuration management are implemented and monitored effectively. Develop and maintain policy and process documentation to support audit readiness and regulatory inspections. Support internal and external audits by providing evidence of VA/CA processes, results, and risk treatment plans. Track and document remediation activities related to audit and compliance findings. Ensure VA and CA programs align with organizational compliance requirements (ISO 27001, PCI-DSS, NIST, etc.) Proficiency in VA tools (Qualys, Tenable, Nessus, Rapid7). Hands-on with container security scanning tools...

Posted 1 week ago

Apply

5.0 - 8.0 years

10 - 14 Lacs

bengaluru

Work from Office

About The Role Project Role : Application Lead Project Role Description : Lead the effort to design, build and configure applications, acting as the primary point of contact. Must have skills : Splunk Security Information and Event Management (SIEM) Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As an Application Lead, you will lead the effort to design, build, and configure applications, acting as the primary point of contact. Your typical day will involve collaborating with various teams to ensure that application requirements are met, overseeing the development process, and providing guidance to team m...

Posted 1 week ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

gurugram

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Operational Technology (OT) Security Good to have skills : Platform Engineering Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :Skilled and detail-oriented IT/OT Security Engineer with hands-on experience in Dispel or similar SRA tools for OT Secure Remote Access and Armis or similar tools for asset visibilit...

Posted 1 week ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

kolkata

Work from Office

About The Role Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : One Identity Manager Good to have skills : NA Minimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various team...

Posted 1 week ago

Apply

7.0 - 12.0 years

20 - 35 Lacs

hyderabad

Work from Office

10+ years of IT/cybersecurity experience with 4+ years as a Security Architect . Strong knowledge of security frameworks and standards (NIST CSF, ISO 27001, TOGAF, SABSA, MITRE ATT&CK). Expertise in cloud security (Azure, AWS, GCP) and cloud-native security controls. Solid understanding of SIEM, SOC, IAM, PAM, DLP, EDR, IDS/IPS, WAF, PKI, and encryption technologies . Hands-on experience with threat modeling, risk assessment, penetration testing methodologies. Knowledge of DevSecOps, CI/CD pipeline security, and secure software development lifecycle (SSDLC) . Experience in regulatory compliance and audit requirements (GDPR, HIPAA, PCI-DSS, SOX). Excellent communication skills to influence st...

Posted 1 week ago

Apply

10.0 - 15.0 years

13 - 18 Lacs

bengaluru

Work from Office

Identify & capitalize on new opportunities, expanding the service portfolio & client base. Lead presales activities, crafting compelling proposals & securing new deals. Develop & implement effective sales strategies & GTM plans. Lead the presales process, identifying client needs & presenting customized TVM solutions. Manage key client relationships, ensuring their satisfaction & driving long-term loyalty. Manage relationships with key 3rd parties, ensuring they support practice goals & build new opportunities. Collaborate with internal teams to ensure seamless service delivery & client satisfaction. Contribute to Blogs, Whitepapers, POV. 10-15 years of experience in Application Security Pre...

Posted 1 week ago

Apply

2.0 - 7.0 years

7 - 11 Lacs

pune

Work from Office

IT Security Engineer Location: Pune-Hybrid working Status: Permanent, Full Time Package: Competitive Salary (fixed), 5 Day Working Week, Flexible Working (with one-off allowance and 2 Days in the office), Development & Opportunity (Personal & Technical), Group Medical Policy, Group OPD Cover, Personal Accident Cover, Term Life Cover, 26 Days Leave + 9 Public Holidays + Buy & Sell Scheme, Referral Scheme. Why were hiring a IT Security Engineer? Were on the hunt for a IT Security Engineer as part of our companys growth. The IT Security Engineer handles security incidents and alerts, prioritizing and implementing remediation actions. They design and maintain security controls, enhance monitorin...

Posted 1 week ago

Apply

3.0 - 8.0 years

18 - 20 Lacs

gurugram

Hybrid

As a Security Engineer specializing in Threat Correlation and Tool Optimization, you will serve as the technical subject matter expert for improving the fidelity, prioritization, and integration of vulnerability data across a multi-cloud and hybrid enterprise environment. This role is focused on optimizing inputs from a wide range of scanning and detection tools including endpoint, network, and cloud-native platformsand enriching them with contextual data such as threat intelligence, asset criticality, and exploitability indicators. You will work across industry standard tools and technologies, and external threat/risk platforms (e.g., BitSight, Recorded Future), as well as integrate finding...

Posted 1 week ago

Apply

3.0 - 5.0 years

4 - 6 Lacs

bengaluru

Work from Office

Responsibilities: Execute shell scripts for seamless automation and system management. Implement infrastructure as code using Terraform for AWS, Kubernetes, Helm, kustomize, and kubectl. Oversee AWS security groups, VPC configurations, and utilize Aviatrix for efficient network orchestration. Contribute to Opentelemetry Collector for enhanced observability. Implement microsegmentation using AWS native resources and Aviatrix for commercial routes. Enforce policies through Open Policy Agent (OPA) integration. Develop and maintain comprehensive runbooks for standard operating procedures. Utilize packet tracing for network analysis and security optimization. Apply OWASP tools and practices for r...

Posted 1 week ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies