4006 Vulnerability Assessment Jobs - Page 26

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 7.0 years

4 - 9 Lacs

maharashtra

Work from Office

Description 1.Manage and maintain the Claroty platform. 2.Performing the Compute Service Requirements in respect of the Clatory platform 3.Perform policy configuration and tuning as directed by the Customer 4.Configure Threat Detection rule and tune alerts as per Customer requirements. 5.Firmware updates and software patching Patch cycle monthly with additional patching as required, where security/vulnerability patches to be analysed and, all patching as approved by the Customer for deployment by the Service Provider during planned downtime 6.Create and maintain all relevant design and platform management documents 7.Report any critical anomaly to Customer SOC team if identified and provide ...

Posted 3 weeks ago

AI Match Score
Apply

2.0 - 7.0 years

4 - 9 Lacs

maharashtra

Work from Office

Description Support Operational Risk by conducting a NIST benchmarking assessment of the Barclays Cyber Security function Develop and design the assessment framework in conjunction with Cyber Op Risk Conduct an assessment of our maturity based on a paper-based evidence and interviews (with limited controls testing where possible) Produce a NIST maturity score and benchmarking against FS industry peers Named Job Posting? (if Yes - needs to be approved by SCSC) Additional Details Global Grade D Level To Be Defined Named Job Posting? (if Yes - needs to be approved by SCSC) No Remote work possibility No Global Role Family To be defined Local Role Name To be defined Local Skills Cyber Security Co...

Posted 3 weeks ago

AI Match Score
Apply

2.0 - 7.0 years

4 - 9 Lacs

maharashtra

Work from Office

Description who has a more technical and practical understanding of security vulnerabilities. To help, the activities that the person in this role will performReview scan reports and alerts from monitoring tools like Qualys, Shodan and Risk Recon, perform triage on them to determine the risk level, and follow-up with the appropriate stakeholders (either internal ones or external business partners) for the remediation of those issues. Liaison with the respective stakeholders for keeping the inventory of monitored assets (IPs) up to date. Support in the scheduling, coordination, and execution of security audits. So, while vulnerability scanning is beneficial, the emphasis is more on the remedi...

Posted 3 weeks ago

AI Match Score
Apply

2.0 - 7.0 years

4 - 9 Lacs

karnataka

Work from Office

"Experience5+ Years Responsibilities Provide Level 3 engineering support for CyberArk PAM, addressing complex issues and advanced troubleshooting. Configure PAM policies, manage vault and session management setup, and maintain secure access controls. Perform system upgrades, patches, and customizations to enhance functionality. Conduct root cause analysis for high impact incidents and collaborate with IT security teams for solution enhancements. Requirements 5+ years of hands on experience with CyberArk PAM, including vault configuration, policy creation, and session management. Strong troubleshooting skills with expertise in privilege management and security practices."

Posted 3 weeks ago

AI Match Score
Apply

2.0 - 7.0 years

4 - 9 Lacs

maharashtra

Work from Office

Description ResponsibilitiesoIn depth knowledge on IBM IWA / IWS environment. oSystem administration of mainly IWS distributed network (install upgrade patching). Manage SW technical roadmap oSetup + maintain standards for the IWS network oAssist in installation, configuration and tuning of IWS distributed master(s) on AIX Linux (SA + HA) oAssist in the installation, automation, and tuning of IWS-agents on open systems (Linux, AIX, Windows) in collaboration with other teams (security, system administrators, ) oProvide own the design, deployment, automation, and scripting solutions to drive new capabilities, visibility, and efficiency oIn depth knowledge of automation frameworks - including b...

Posted 3 weeks ago

AI Match Score
Apply

6.0 - 10.0 years

12 - 20 Lacs

mumbai, bengaluru, delhi / ncr

Hybrid

Identify, close new sales in cyber security services. Build relationships with CXOs, CISOs, and IT decision-makers. Understand client challenges and map them to service offerings. Deliver customized proposals & solutions. VAPT, SOC, MSSP, Cloud.

Posted 3 weeks ago

AI Match Score
Apply

2.0 - 6.0 years

7 - 11 Lacs

pune

Work from Office

Job Description: Job Title: Information Security Specialist, Associate Location: Pune, India Role Description The Cryptography Engineering and Solutions team at Deutsche Bank, operating under the Chief Security Office (CSO), defines the banks cryptography strategy and provides expert guidance on all crypto-related matters, including audits and regulatory compliance. For the CertHub initiative, we are seeking an IT Security Developer to contribute to strategic programs within Cryptography Engineering and Solutions. Associate Information Security Specialist to support the design and maintenance of CI/CD pipelines on Google Cloud Platform (GCP), with a focus on cryptographic services and automa...

Posted 3 weeks ago

AI Match Score
Apply

9.0 - 14.0 years

9 - 13 Lacs

pune

Work from Office

Job Summary: We are seeking a highly experienced WiFiEngineer to design, implement, and manage enterprise wireless networks usingAruba Wireless LAN Controllers (WLC). The ideal candidate will have deepexpertise in wireless networking, access point management, and securityprotocols. Key Responsibilities: Wireless Network Design: Architect and optimize WiFi networks using Aruba WLC for high-performance connectivity. Access Point Management: Configure and manage Aruba APs, ensuring seamless roaming and coverage. Security & Authentication: Implement 802.1X, WPA3, and role-based access control (RBAC) for secure wireless access. Troubleshooting & Optimization: Diagnose and resolve WiFi performance...

Posted 3 weeks ago

AI Match Score
Apply

2.0 - 4.0 years

0 - 0 Lacs

gurugram

Work from Office

Role Title: Full-time Penetration Tester / SOC Analyst Nihon Cyber Defence, a leading Japanese Cyber Security company, are looking for a Penetration tester with knowledge in SOC operations to join our growing India SOC team, supporting their emerging worldwide client base. This is a dual-role : primarily focused on internal and external penetration testing projects while also supporting incident detection and response . This is a desk job, no remote work. Willing to work in 24x7 rotational shifts, including nights and weekends. Responsibilities Penetration Testing Responsibilities Plan, execute, and report on network, web application, and infrastructure penetration tests . Perform vulnerabil...

Posted 3 weeks ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

ahmedabad, gujarat

On-site

As a Senior Security Analyst specializing in Vulnerability Assessment and Penetration Testing (VAPT), your main role involves conducting thorough assessments and tests to identify and address security vulnerabilities in clients" systems, networks, and applications. You will utilize a combination of automated tools, manual testing techniques, and industry best practices to ensure comprehensive evaluations. Your responsibilities will include: - Conducting end-to-end vulnerability assessments and penetration tests across various systems, networks, and applications. - Analyzing assessment results to provide actionable recommendations for remediation and risk mitigation. - Collaborating with cros...

Posted 3 weeks ago

AI Match Score
Apply

10.0 - 15.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Digital Engineering Solution Architect at Cognizant, your role involves leading and contributing to the design, development, and implementation of technical solutions for customers. You are expected to translate customer requirements into technical solutions, choose the appropriate technology stack, and cloud features for solutioning. Additionally, you should have experience in responding to customer RFIs/RFPs, designing end-to-end cloud solutions, and understanding standard estimation methodologies for App Dev & Migration projects. Your overall experience should be within the range of 10-15 years, with a clear ability to communicate and present solutions to senior leadership. Key Respo...

Posted 3 weeks ago

AI Match Score
Apply

12.0 - 22.0 years

40 - 75 Lacs

pune

Hybrid

Role & responsibilities Define enterprise-wide cybersecurity architecture aligned with business objectives and regulatory requirements. Design and Implement cybersecurity agents based on architectures for applications, infrastructure, cloud, and data platforms. Lead threat modeling, vulnerability assessments, and security risk reviews for systems and solutions Implement enforce security reference architectures, patterns, and guardrails Understand perimeter and app security and guide engineers on implementing the cybersecurity agents Collaborate with enterprise architects, DevOps, and cloud engineering teams to embed security by design Drive Zero Trust adoption across identity, network, data,...

Posted 3 weeks ago

AI Match Score
Apply

9.0 - 13.0 years

35 - 37 Lacs

hyderabad

Work from Office

Summary This role offers an exciting opportunity to lead the development of ground breaking Transmission and Distribution applications on the innovative, cloud-native GridOS Platform, driving technological advancement in energy management. By spearheading organizational and architectural transformations in HTC, you will play a pivotal role in enhancing global energy infrastructure, fostering sustainable practices, and addressing climate challenges. Join us in shaping the future of energy distribution and making a meaningful impact on both technological evolution and environmental stewardship. Technology Responsibilities: Develop a scalable, pioneering Transmission & Distribution application ...

Posted 3 weeks ago

AI Match Score
Apply

3.0 - 5.0 years

7 - 11 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 3 weeks ago

AI Match Score
Apply

5.0 - 7.0 years

5 - 9 Lacs

bengaluru

Work from Office

Job Summary Assist in implementing, maintaining and testing SOX controls supporting the Application Managers for custom applications and 3rd party Applications, support internal and external audits, and identify potential SOX compliance risks. Key Responsibilities: Pre-Implementation Quality Check: Conduct a thorough review of controls design and implementation before product/functional go-live, based on evidence submitted by engineering and application management teams. SOX ITGC and Automated Controls Evaluation: Test and evaluate the effectiveness of SOX IT General Controls (ITGC) and automated controls using audit checklists prepared by the Controls team to: Maintain SOX controls for inte...

Posted 3 weeks ago

AI Match Score
Apply

3.0 - 5.0 years

7 - 11 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 3 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 3 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 3 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

hyderabad

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 3 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 3 weeks ago

AI Match Score
Apply

5.0 - 8.0 years

7 - 10 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 3 weeks ago

AI Match Score
Apply

3.0 - 8.0 years

6 - 11 Lacs

chennai

Work from Office

What will you do? Recommending security configuration standards for cloud services to include, specially with Azure, AWS and Office365 Conducts security risk assessments, evaluates security services and technologies, and reviews and documents information security policies and procedures as well as provides monitoring and oversight for alerts in the Cloud environment. Produce metrics and reports on the cloud security posture of organisational cloud infra What are we looking for? 3+ years of experience in IT Security & experience working in one or more of the following Cloud systems AWS, AZURE, or Google. Degree in Computing, Computer Science, Computer Engineering, Information Systems and/or t...

Posted 3 weeks ago

AI Match Score
Apply

1.0 - 2.0 years

6 - 10 Lacs

chennai

Work from Office

What are we looking for? Security operation center executive with ELK stack knowledge 1. Should have 1-2 years experience as part of SOC team 2. Working knowledge of any SIEM tool 3. Well aware of Incident response process 4. Minimum B.E./B.Tech/B.Sc.(CS)/BCA/MCA)

Posted 3 weeks ago

AI Match Score
Apply

1.0 - 6.0 years

4 - 9 Lacs

noida

Work from Office

Conduct VAPT, System Hardening & OS Security, Fuzzing Tests, Web and Network Security, Access Control & Authentication, Cryptographic Security Assurance, Audit & Logging, System Integrity Checks, Continuous testing. Contact on : npal@marquistech.com Required Candidate profile B.Tech/M.Tech/MCA/M.Sc with 1–8 yrs in VAPT, system hardening, networking. Hands-on with Burp Suite, Nessus, Wireshark. CEH/CCNA/OSCP preferred. Immediate joiners preferred.

Posted 3 weeks ago

AI Match Score
Apply

3.0 - 6.0 years

7 - 11 Lacs

bengaluru

Work from Office

We are seeking an experienced Cyber Security Consultant to join our team. The ideal candidate will have a strong background in cloud security, incident response, and vulnerability management. You will be responsible for assessing security risks, developing and implementing security measures, and responding to security incidents to protect our digital assets. Key Responsibilities : Incident Response : Lead the incident response process, including detection, analysis, containment, eradication, and recovery. Investigate security breaches and provide detailed reports on findings and recommendations. Coordinate with other IT teams to ensure timely resolution of security incidents. Participate in ...

Posted 3 weeks ago

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies