Jobs
Interviews

2727 Vulnerability Assessment Jobs - Page 2

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

1.0 - 4.0 years

2 - 5 Lacs

noida

Work from Office

Roles and Responsibility Ensure the safety and security of patients, staff, and clinic premises. Monitor and report any suspicious activity or incidents to management. Maintain a high level of visibility and presence on the clinic premises. Develop and implement effective security protocols and procedures. Collaborate with other departments to ensure seamless operations. Provide excellent customer service and respond to patient inquiries. Job Requirements Minimum 2 years of experience in a similar role, preferably in a healthcare or dermatology setting. Strong knowledge of security principles and practices. Excellent communication and interpersonal skills. Ability to work effectively in a fa...

Posted 1 day ago

Apply

3.0 - 6.0 years

7 - 11 Lacs

noida

Work from Office

Key responsibilities Lead operational security initiatives across infrastructure and cloud environments Implement and maintain network security controls, including firewalls and segmentation Conduct vulnerability assessments and manage remediation workflows Drive adoption of Zero Trust principles across systems and services Oversee access control policies and identity management practices Coordinate and respond to security incidents and investigations Perform regular security audits and configuration reviews Develop and enforce backup and recovery strategies aligned with security policies Apply security hardening techniques across endpoints, servers, and cloud assets Align operational practi...

Posted 1 day ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

chennai

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

chennai

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

chennai

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 day ago

Apply

1.0 - 6.0 years

0 - 0 Lacs

gurugram

On-site

Job Title: Functional Consultant Industry: IT Services & Consulting Department: Consulting Employment Type: Full-Time, Permanent Role Category: IT Consulting Job Overview: We are seeking a motivated individual to handle monitoring, scripting, and Linux system administration tasks. This role involves installing and configuring Linux environments for new builds, managing production, staging, and development environments on cloud platforms, and ensuring smooth patching and cluster switching processes. The candidate will also engage with customers to understand deployment, integration, and architecture requirements. Key Responsibilities: Install and configure Linux operating systems for new envi...

Posted 1 day ago

Apply

5.0 - 9.0 years

0 Lacs

thiruvananthapuram, kerala

On-site

As a Security Advisory Consultant at EY, you will play a crucial role in advising EY's Advisory and TAS service lines on security matters, including managing a global managed services platform, big data and analytics solutions, as well as individual line of business solutions. Your responsibilities will involve defining security architectures, providing security guidance, identifying security-related requirements, promoting secure designs, and facilitating the delivery of information security services throughout the system development life cycle. You will also be responsible for translating technical vulnerabilities into business risk terminology for effective communication with stakeholders...

Posted 2 days ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

As an Android Malware Analyst, your primary responsibility will be to conduct thorough analysis of Android malware by performing static and dynamic analysis. You will be required to reverse-engineer malicious APKs and SDKs to understand their behavior and intent. Identifying spyware, trojans, rootkits, and other threats will be crucial aspects of your role. Additionally, analyzing network traffic and backend systems for vulnerabilities and potential data leakage will be part of your daily tasks. It will be important for you to document your findings and present detailed reports to both technical and non-technical stakeholders. You will also have the opportunity to participate in client-facin...

Posted 2 days ago

Apply

10.0 - 14.0 years

0 Lacs

maharashtra

On-site

Role Overview: You should have a Bachelor's degree in computer science, information systems, cyber security, or a related field. With at least 10 years of relevant experience in cyber security. Your knowledge should include information technology operation such as cloud, data, system, application, and infrastructure. You should also have knowledge of cyber security assessment including security audit, vulnerability assessment, and penetration testing. Familiarity with cyber security products like End-Point Solution (EDR), WAF, DLP, SIEM, and SOAR is required. Understanding market best practices and frameworks such as ITIL, ISO, PCI-DSS, and NIST is essential. Certification in cyber security ...

Posted 2 days ago

Apply

3.0 - 6.0 years

5 - 14 Lacs

hyderabad

Work from Office

Enterprise Information Security at Providence is responsible for appropriately protecting all information relating to its caregivers and affiliates, as well as protecting its confidential business information (including information relating to its caregivers, affiliates, and patients) *Note: Please be noted this is 5-day work from office, early joiners are preferred. What will you be responsible for? Assist in the responsibility for the reviewing vulnerabilities' data from multiple sources (i.e. external / internal penetration testing, internal / external vulnerability scanning, etc.) across multiple technologies to determine risk rating of vulnerabilities to business assets. Assist in impro...

Posted 2 days ago

Apply

2.0 - 5.0 years

3 - 7 Lacs

nagpur

Work from Office

Conduct security testing, including vulnerability assessments and penetration testing Design and implement security frameworks for blockchain applications Ensure secure interactions between the blockchain platform. Required Candidate profile Experience in securing blockchain-based applications. Familiarity with decentralized identity solutions Security certifications such as CISSP, CEH, CISM, or Blockchain Security Professional (CBSP)

Posted 2 days ago

Apply

3.0 - 8.0 years

11 - 16 Lacs

bengaluru

Work from Office

Security Consultant(FTE) Location - Bangalore(Murgeshpalya) Notice Period - 0 to 15 days(max) Key Responsibilities: Process Responsibility: • Deploy companys SDL (Secure Development Lifecycle) Prepare and present FCSR for .Net based application. • Create/Maintain central repository of security artefacts, create and own security plan updates. • Act as an expert facilitator on practices such as secure design, threat modelling, and vulnerability management • Act as a point of contact for cybersecurity issues for application. • Support product owners and CS Architect in specifying security requirements and bring knowledge of relevant CS standards and regulations. • Support product teams with sec...

Posted 2 days ago

Apply

7.0 - 12.0 years

8 - 18 Lacs

bengaluru

Hybrid

Key Responsibilities: Process Responsibility: • Deploy companys SDL (Secure Development Lifecycle) Prepare and present FCSR for .Net based application. • Create/Maintain central repository of security artefacts, create and own security plan updates. • Act as an expert facilitator on practices such as secure design, threat modelling, and vulnerability management • Act as a point of contact for cybersecurity issues for application. • Support product owners and CS Architect in specifying security requirements and bring knowledge of relevant CS standards and regulations. • Support product teams with security best practices for design, automation, and tool selection. • Support site, team, and off...

Posted 2 days ago

Apply

5.0 - 10.0 years

15 - 25 Lacs

bengaluru

Remote

Experience: 5+ years with experience in SNOW Vulnerability Module. Key Responsibilities: Strong background in ServiceNow Security Operations, a deep understanding of Vulnerability Management (VM), Good experience in ServiceNow development on ITSM module Excellent experience in Integrating third party tools with ServiceNow using web services and connectors Implement and manage the Vulnerability Management module in ServiceNow. Integrate vulnerability scanners with ServiceNow. Develop and automate workflows using ServiceNow Flow Designer and Orchestration to manage vulnerabilities.. Perform regular testing and validation of vulnerability data and its accuracy in the system. Create reports and ...

Posted 2 days ago

Apply

5.0 - 10.0 years

10 - 20 Lacs

hyderabad

Remote

Experience: 5+ years (5-7 years) with experience in SNOW Vulnerability Module. Location: India ( Work From Home) Key Responsibilities: Strong background in ServiceNow Security Operations, a deep understanding of Vulnerability Management (VM), Good experience in ServiceNow development on ITSM module Excellent experience in Integrating third party tools with ServiceNow using web services and connectors Implement and manage the Vulnerability Management module in ServiceNow. Integrate vulnerability scanners with ServiceNow. Develop and automate workflows using ServiceNow Flow Designer and Orchestration to manage vulnerabilities.. Perform regular testing and validation of vulnerability data and i...

Posted 2 days ago

Apply

2.0 - 7.0 years

8 - 13 Lacs

pune

Work from Office

BMC Software is looking for a motivated and skilled individual to join the Product Security Group. This is a senior technical position in the team. The candidate will be responsible for engaging with various product teams on security architecture reviews, SaaS security, penetration testing. A penetration tester plays a crucial role in safeguarding an organization's digital assets and information by proactively identifying and addressing security weaknesses. This role requires a high level of technical expertise, ethical conduct, and a commitment to continuous improvement in the field of cybersecurity. Roles and Responsibilities: Conduct thorough vulnerability assessments of applications and ...

Posted 2 days ago

Apply

5.0 - 8.0 years

13 - 18 Lacs

bengaluru

Work from Office

Understand application and API functionality of DV core products Implement secure code and develop security vulnerability fixes mitigations and remediations across DVs applications workloads APIs etc. Work with client's security testing teams to help triage potential security issues vulnerabilities. Promote secure development best practices and assist training development and DevOps teams on secure development and secure SDLC. Be engaged in security testing processes and meetings held across DVs application development teams. Ability to apply security knowledge and experience in a DevOps development lifecycle. Drive penetration testing remediation activities for web application vulnerabiliti...

Posted 2 days ago

Apply

7.0 - 10.0 years

8 - 13 Lacs

bengaluru

Work from Office

Results-driven CyberArk PAM Specialist with 7-10 years of hands-on experience in designing, implementing, and optimizing CyberArks Privileged Access Management platform. The ideal candidate will have strong hands-on experience with CyberArk Core Privilege Access Security (PAS), including Digital Vault, Central Policy Manager (CPM), Privileged Session Manager (PSM), Privileged Vault Web Access (PVWA), Privileged Threat Analytics (PTA), and Endpoint Privilege Manager (EPM). The candidate will play a key role in securing privileged access across the enterprise, ensuring least privilege, and supporting Zero Trust initiatives. Strong analytical thinking, ability to solve complex problems, trouble...

Posted 2 days ago

Apply

2.0 - 5.0 years

4 - 9 Lacs

chennai, mumbai (all areas)

Hybrid

Role & responsibilities Servers and Endpoints VA and Configuration Review Network Security Testing, Infrastructure Penetration Testing, Network VA and Configuration Review, Vulnerability Management Tool Experience: Qualys VMDR, Nipper, BurpSuite, Nessus, Metasploit, OpenText, Vulnerability Management and Tracking Solutions Preferred candidate profile Interpersonal Skillset: Should have a client facing experience. Should have good client interaction as well. Should be confident while interacting to the client and presenting the observations.

Posted 2 days ago

Apply

3.0 - 7.0 years

7 - 11 Lacs

bengaluru

Work from Office

Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 5 plus years of experience Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding Practices: Knowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat Modeling...

Posted 2 days ago

Apply

4.0 - 6.0 years

4 - 8 Lacs

chennai

Work from Office

Implement and manage SOAR solutions to improve incident response times and efficiency. Monitor security alerts, assess potential threats, and take appropriate action to mitigate risks. Analyze complex security events and provide detailed reports and recommendations. Collaborate with IT and security teams to enhance threat detection and response strategies. Develop and maintain automation scripts and playbooks for security processes. Conduct regular reviews and updates of security protocols and procedures. Provide training and guidance to junior analysts on SOAR practices and tools. Required education Bachelor's Degree Preferred education Bachelor's Degree Required technical and professional ...

Posted 2 days ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies