Home
Jobs

827 Vulnerability Assessment Jobs - Page 27

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 8.0 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Checkpoint Firewalls and VPN. Experience5-8 Years.

Posted 1 month ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Privilege Password Management CyberArk. Experience5-8 Years.

Posted 1 month ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT Mandatory Skills: Azure Cloud Workload Security. Experience3-5 Years.

Posted 1 month ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Coimbatore

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Azure B2X Security. Experience5-8 Years.

Posted 1 month ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Microsoft Entra ID. Experience5-8 Years.

Posted 1 month ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Chennai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT Mandatory Skills: SailPoint Identity Mgmt and Governance. Experience3-5 Years.

Posted 1 month ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Gurugram

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: GRC Consulting. Experience5-8 Years.

Posted 1 month ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Chennai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT Mandatory Skills: SAP GRC - Governance-Risk-Compliance. Experience3-5 Years.

Posted 1 month ago

Apply

8.0 - 10.0 years

12 - 17 Lacs

Gurugram

Work from Office

Naukri logo

Role: SharePoint Architect Do: ESSENTIAL DUTIES/RESPONSIBILITIES : - Oversee help desk support to ensure that end user problems are resolved in a timely and effective manner, enabling users to access needed information and utilize technology resources effectively. - Improve productivity at ServiceDesk by focusing on reducing incidents, use self-heal and self-help techniques to reduce call flow at SD. - Communicate effectively with customers and stakeholders to assess support needs, assist in the identification of technology needs, and respond to customer service concerns. - Train and guide support specialists to effectively utilize help desk problem-management process (the identification, prioritization, escalation and resolution of end user help requests) to ensure quick and accurate responses to all end users, while emphasizing a customer-focused attitude. - Establish and monitor service level targets/benchmarks and measure performance against those benchmarks. Establish and monitor Compliance level across the region - Patch, AV and security standards - Track and analyze support calls and information requests to identify areas of need and create strategies to enhance end-user capacity and end-user reliance on support personnel. - Develop and maintain comprehensive documentation, includingoperations guidelines and procedures, inventory checklists, deployment guides, budget information, training guides and support materials. - Measure and report on unit performance via metrics and indicators of service level activity and customer satisfaction. Provide regular helpdesk performance and utilization reports to leadership. - Manage the inventory, support and maintenance of the region/location's end user technology assets, including, but not limited todesktop and notebook computers, mobile devices (smart phones, tablets, etc.), printers and software. - Facilitate equipment, services, and software purchases and implementation; and manage inventory and licensing reconciliations. Conduct research and make recommendations on hardware and software products, services, protocols, and standards. SECONDARY DUTIES/RESPONSIBILITIES: - Recommend changes or enhancements in available information technology or equipment as prompted by feedback via the user support function. - Engage in ongoing research of emerging trends and new technologies which may benefit the corporation's goal of strategically implementing technology to enhance business performance, and specifically support the support services function. - Participate in the planning, policy and decision making discussions involving information management projects. - Provide occasional technical support and best practice advice for offsite Corporation events. - Research and implement special projects and other duties as assigned. NATURE OF WORK CONTACTS - Works closely with staff and management from other units and divisions. - Regular interactions with GNOC such as network administrators and server admi. - Periodic correspondence and interaction with vendors Management staff Mandatory Skills: Technology (Alight IT). Experience8-10 Years.

Posted 1 month ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT Mandatory Skills: Microsoft Entra ID. Experience3-5 Years.

Posted 1 month ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA’s (90-95%), response time and resolution time TAT Mandatory Skills: Checkpoint Firewalls and VPN. Experience3-5 Years.

Posted 1 month ago

Apply

8.0 - 13.0 years

3 - 7 Lacs

Pune, Bengaluru

Work from Office

Naukri logo

Job Title:DLP Lead Experience8-14 Years Location:Bangalore /Pune : Technical Skills: Experience in configuring s and creating workflows on Email DLP - Proofpoint Prior experience with CASB Netskope or similar solution Knowledge of security principles including cloud , standards and techniques Understanding of cloud principles ,cloud applications and key cloud service providers Prior experience with Data loss prevention tools, SIEM, network devices and other infrastructure Reviews violations of data security procedures to eliminate violations Strong experience on Mimecast email Security solution for threat Protection, Spoofing, Encryption, Archive, URL Defense Strong understanding of email delivery architecture, email gateway and DNS technologies Strong understanding of networking, SMTP, DNS Experience of compliance requirements for database security (e.g. SOX, HIPAA, PCI etc.) Strong verbal and written communications skills; must be able to effectively communicate technical details and thoughts in non-technical/general terminology to various levels of the organization. Work well in team environments with internal and external resources as well as work independently on tasks Strong organizational, and time management skills Process Skills: Overall management of Email DLP solution - Proofpoint Analyze blocked emails Manage CASB operations ,maintain implemented Netskope CASB solution,respond and resolve incidentsinvestigate and conduct analysis Work on email release/drop as per requests Tune/Amend email DLP policies Perform Daily DLP System Health check and publish health report Update/Add - roles modification, response rules, complex and new policies modifications Email DLP – Microsoft E4 licenses CASB –Netskope Behavioral Skills: Effective interpersonal, team building and communication skills Ability to collaborate; be able to communicate clearly and concisely both to laypeople and peers, be able to follow instructions, make a team stronger for your presence and not weaker. Ability to see the bigger picture and differing perspectives; to compromise, to balance competing priorities, and to prioritize the user. Desire for continuous improvement, of the worthy sort; always be learning and seeking improvement, avoid change aversion and excessive conservatism, equally avoid harmful perfectionism, 'not-invented-here' syndrome and damaging pursuit of the bleeding edge for its own sake. Learn things quickly, while working outside the area of expertise. Analyze a problem and realize exactly what all will be affected by even the smallest of change you make in your design Ability to communicate complex technology to no tech audience in simple and precise manner. Ownership skills. Qualification: Must have 4 Year degree (Computer Science, Information Systems or equivalent) 4+ years overall IT experience.

Posted 1 month ago

Apply

7.0 - 11.0 years

25 - 30 Lacs

Mumbai, Goregaon East

Work from Office

Naukri logo

Professional experience (6-8Y) in commercial software or corporate application Backend development Knowledge and experience in enterprise-scale, multi-tier, distributed architecture Solid experience in object-oriented design and development with languages such as Java 8.0 onwords Strong experience with React for frontend development. Solid knowledge of high-scale, multi-tenant Web service development, including REST/JSON and Microservice patterns Solid experience in Spring Boot Solid experience in Spring Data/JPA/Hibernate Exposure to multithreading and Junit is must. Proficient in database concepts and working experience with Oracle Database Proficient in performance analysis and tuning Proficiency with agile development methodologies Excellent written and verbal communication skills Good analytical and problem-solving skills Familiarity with Jenkins for CI/CD automation and pipeline configuration. Experience in VAPT issue fixes (Vulnerability Assessment and Penetration Testing). Ability to deploy source code into OpenShift Environment.

Posted 1 month ago

Apply

4.0 - 8.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Senior SOC Analyst works within the 24/7 Cyber Fusion Center (CFC). The role is responsible for monitoring, triaging, analyzing and escalating incidents and events in the technology environment. This Senior SOC Analyst will evaluate data collected from a variety of cyber operations tools (e.g., SIEM, IDS/IPS, Firewalls, network traffic logs, cloud platforms, and SOAR solutions to analyze events that occur within the environments for the purposes of detecting and mitigating threats in both structured and unstructured situations. Individuals in this role are proactive and well-versed in log, identity, cloud, network, and root cause analysis Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Senior SOC Analyst must have skills in email security, system event, network event, log analysis. Knowledge of common IT and security technology concepts with emphasis on TCP/IP network security, operating system security, modern attack and exploitation techniques is important. Experience conducting event analysis in AWS and Azure environments. Characterize and analyse alerts to understand potential and active threats. Perform event correlation using information gathered from a variety of sources within the enterprise to gain situational awareness and determine the nature and characteristics of events that could be an observed attack Preferred technical and professional experience Document and escalate events/incidents that may cause adverse impact to the environment. Provide daily summary reports of events and activity relevant to cyber operations. Perform Cyber Operations trend analysis and reporting. Perform high-quality triage and thorough analysis for all alerts. Demonstrate effective communication skills both written and verbal. Actively engage in team chats, calls, and face to face settings. Constantly contribute to SOC runbooks/playbooks Recommend improvements to automations, alert fidelity, and security controls. Preferred ExperienceExperience / Knowledge in CyberArk, Azure SSO. Knowledge of enterprise web technologies, security, and cutting-edge infrastructures

Posted 1 month ago

Apply

3.0 - 7.0 years

7 - 11 Lacs

Navi Mumbai

Work from Office

Naukri logo

Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 5 plus years of experience Application Security TestingExperience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding PracticesKnowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat ModelingAbility to conduct threat modeling sessions to identify and mitigate security risks Preferred technical and professional experience Vulnerability AssessmentExperience in conducting vulnerability assessments and penetration testing Application Security TestingExperience with static and dynamic application security testing (SAST/DAST) tools. Security ToolsProficiency in using security tools like Burp Suite, Nessus, or Fortify

Posted 1 month ago

Apply

5.0 - 8.0 years

12 - 22 Lacs

Pune

Hybrid

Naukri logo

Title: Offensive Security Engineer (Penetration Testing at system level) Location: Pune, 411045 (Hybrid) Job Details: Penetration testing experience at system level (This involves stuff like exploiting vulnerabilities, compromising accounts , gaining initial access , execution like hijacking inter process communication , persistence by locking out users by compromising the booting process of Linux operating systems , horizontal and vertical privilege escalation , etc).

Posted 1 month ago

Apply

3.0 - 8.0 years

10 - 20 Lacs

Hyderabad, Chennai, Bengaluru

Hybrid

Naukri logo

Job Title: Application Security Engineer SAST & DAST Experience Required: 3 to 8 Years Location: Hyderabad / Bangalore / Chennai / Mumbai / Pune / Kolkata / Gurgaon Mode of Interview: MS Teams (12 rounds) Notice Period: 0 to 30 Days Job Overview: We are looking for an experienced Application Security Engineer specializing in SAST & DAST to join our growing team. The ideal candidate will be responsible for integrating security throughout the software development lifecycle (SDLC), implementing and managing security tools, and driving security best practices across the organization. Key Responsibilities: Implement and manage application security testing activities throughout the development, deployment, and maintenance phases. Perform Static Application Security Testing (SAST) using tools like Checkmarx and Fortify . Execute and manage Dynamic Application Security Testing (DAST) tools such as AppScan and WebInspect . Conduct secure code reviews in languages including Java, .NET, Swift, Objective-C . Integrate security tools in DevOps pipelines and CI/CD environments (e.g., Jenkins, TeamCity, Bamboo, Chef, Puppet). Apply OWASP Top 10 , SANS Secure Coding Practices , and Security Engineering Principles during development and assessment. Analyze, triage, and report vulnerabilities using CVSS scoring and determine business impact. Perform penetration testing for web, mobile, and desktop applications. Implement mobile security testing techniques, including bypassing SSL pinning , root detection , reverse engineering , and manifest analysis . Work with containerized environments such as Docker and Kubernetes . Utilize at least one scripting language (e.g., Python, Bash, PowerShell) for automation or security tooling. Required Skills & Experience: Strong experience with SAST and DAST tools (Checkmarx, Fortify, AppScan, WebInspect) Familiarity with OWASP Top 10 , secure coding practices, and vulnerability remediation Proficient in secure code review for Java, .NET, Swift, Objective-C Solid understanding of DevSecOps practices and security toolchain integration Hands-on experience with CI/CD tools (Jenkins, TeamCity, Bamboo, etc.) Experience with container security in Docker/Kubernetes environments Knowledge of CVSS scoring and vulnerability risk assessment Understanding of mobile application security techniques and concepts Experience with scripting in Python, Bash, or equivalent Preferred Qualifications: Security certifications (e.g., CEH, OSCP, GWEB, GWAPT, Security+ ) Exposure to cloud environments (AWS, Azure, GCP) from a security standpoint Familiarity with automated testing tools like Selenium Experience working in Agile and DevOps environments Interested Candidates can share your updated resume to subashini.gopalan@kiya.ai

Posted 1 month ago

Apply

1.0 - 5.0 years

11 - 15 Lacs

Gurugram

Work from Office

Naukri logo

Looking for challenging role? If you really want to make a difference - make it with us Can we energize society and fight climate change at the same time? At Siemens Energy, we can. Our technology is key, but our people make the difference. Brilliant minds innovate. They connect, create, and keep us on track towards changing the world's energy systems. Their spirit fuels our mission. Our culture is defined by caring, agile, respectful, and accountable individuals. We value excellence of any kind. Sounds like you? TitleAgentic AI and Domain-Specific LLM Developer We are seeking talented and passionate developers with experience in developing customized solutions based on the NVIDIA Morpheus Cyber AI framework to join our team. In this role, you will be instrumental in the development of a state-of-the-art Grid Cybersecurity software platform designed to safeguard electric sector critical infrastructure from emerging cyber threats. Your new role "“ challenging and future- oriented Design, develop, and implement cybersecurity solutions using NVIDIA Morpheus Cyber AI framework, NVIDIA AgentIQ toolkit, NVIDIA Blue Field, Domain-Specific LLM, Open API, and OpenUSD. Collaborate with cross-functional teams to integrate AI-driven security features into the Grid Cybersecurity platform. Analyze and process large datasets to identify and mitigate potential published and zero-day OT/ICS vulnerabilities. Develop and maintain robust, scalable, and secure software CI/CD processes and have experience with DevSecOps software composition analysis tools. Troubleshoot, debug, and optimize existing software for improved performance and security. Stay up to date with the latest advancements in AI and cybersecurity to ensure our platform remains at the forefront of innovation. We don't need superheroes, just super minds Bachelor master's degree in Artificial Intelligence, OT/ICS Cybersecurity, Computer Science, Embedded Device Engineering, or a related field. Proven experience with NVIDIA Morpheus Cyber AI framework and comparable AI frameworks. Experience with operational technology (OT)/industrial control systems (ICS) critical infrastructure cybersecurity technologies. Strong programming skills in Python. Additional languages such as C++ or Java is a plus. Commercial product experience with AI, machine learning, and customizing common AI frameworks for specific use cases. Strong experience with DevOps, DevSecOps, AIOps/AI Governance, and MLOps. Stay up to date on new developments in AI for Cybersecurity. Experience presenting at technical conferences is a plus. Experience with AI trust documentation projects. Ability to work collaboratively in a fast-paced, dynamic environment. Excellent innovation, problem-solving, and communication skills. Familiarity with project management systems, including Jira or Trello. Familiarity with Software Bill of Materials (SBOM) for vulnerability management. Experience with grid computing and large-scale distributed data processing. Knowledge of private cloud platforms such as AWS, Azure, or Google Cloud. Understanding of networking protocols and security measures. Experience with digital twins for cybersecurity.

Posted 1 month ago

Apply

8.0 - 12.0 years

19 - 21 Lacs

Bengaluru

Work from Office

Naukri logo

Responsibilities: * Design, implement, and maintain secure solutions on AWS cloud platform using IAM and security architecture principles.

Posted 1 month ago

Apply

5.0 - 9.0 years

17 - 20 Lacs

Noida

Work from Office

Naukri logo

Key Responsibilities: - Act as a strategic advisor to the CEO, providing insights and recommendations on key decisions. - Oversee the execution of strategic initiatives, including planning, monitoring progress, and ensuring deliverables are met. - Conduct research and analysis on technology trends and policies for informed decision-making. - Manage cross-functional coordination for high-impact projects and organizational goals. - Prepare detailed reports, presentations, and briefings for internal and external stakeholders. - Serve as a liaison between the CEO and internal teams, streamlining communication and ensuring alignment with organizational priorities. - Build and maintain relationships with industry stakeholders, government bodies, and partner organizations. Core Competencies: Industry Awareness: - Keeps abreast of developments in the technology sector and government policies. Evaluates the consequences of changes in the business environment. Problem Solving: - Leverages past problem-solving experiences to anticipate and proactively prevent future issues. Demonstrates technical acumen in addressing and solving complex issues. Team Collaboration: - Collaborate effectively within the team to builds and fosters a team-based approach to achieving goals and objectives. - Maintains a regular and relevant flow of information up and down the organization. Communication Skills: - Excellent verbal and written communication skills for clear coordination with stakeholders.- Listens and checks understanding to interpret information and create significance.Qualifications:- Bachelor's degree in Technology, Business Administration, or a related field; a Master's degree (MBA/Technology) from premier B School is preferred.- Minimum 3-7 years of experience in a similar role. - Strong understanding of cyber security trends, emerging technologies, and government policies.- Proven ability to handle complex projects, manage multiple priorities, and work under tight deadlines.- Exceptional interpersonal, written, and verbal communication skills.- Demonstrated analytical and problem-solving abilities with a strategic mindset.- Proficiency in using project management tools and technology platforms.- Strong organizational skills with meticulous attention to detail.ApplySaveSaveProInsights

Posted 1 month ago

Apply

4.0 - 7.0 years

11 - 16 Lacs

Bengaluru

Hybrid

Naukri logo

Role & responsibilities Strong knowledge on manual secure code review against common programming languages (Java, C#) Minimum three (3) years of recent experience working with application tools to perform security tests: AppScan, NetsSparker, Acunetix, Checkmarx, Veracode, BurpSuite, OWASP ZAP, Kali Linux, or equivalent. Minimum three (3) years of performing manual penetration testing and code review against web apps, mobile apps, and APIs Minimum three (3) years of working with technical and non-technical audiences in reporting results and lead remediation conversations. Preferred one year of experience in development of web applications and/or APIs. should be able to identify and work with new tools / technologies to plug and play on client projects as needed to solve the problem at hand. One or more major ethical hacking certifications not required but preferred; GWAPT, CREST, OSCP, OSWE, OSWA Preferred candidate profile •Perform manual application penetration tests on one or more of the following to discover and exploit vulnerabilities: web applications, internal applications, APIs, internal and external networks, and mobile applications •Perform manual security code review against common programming languages (Java, CSharp). •Perform automated testing of running applications and static code (SAST, DAST). •Experience in one or more of the following a plus: AI pen testing. •Need to work on application tools to perform security tests: AppScan, NetsSparker, Acunetix, Checkmarx, Veracode, BurpSuite, OWASP ZAP, Kali Linux. •Able to explain IDOR, Second Order SQL Injection, CSRF Vulnerability, Root cause, Remediation

Posted 1 month ago

Apply

2.0 - 6.0 years

35 - 40 Lacs

Pune

Work from Office

Naukri logo

Job Title: Vulnerability Management Engineer II Reporting To: Manager, Threat & Vulnerability Management (Pune) Location: Pune Summary: The Vulnerability Management Engineer II is responsible for managing the identification, assessment, reporting, and mitigation of infrastructure and cloud vulnerabilities. A candidate for this role will have a mindset of a defender and be able to operate in a fast-paced environment working closely with our infrastructure team that includes Network, Firewall, Hypervisors, Servers, and business application teams. Key Serve in a contributing role that requires frequent interaction with IT and Infosec managers, engineers and developers. Provide vulnerability remediation governance and operational support. Perform vulnerability metrics reporting for ad-hoc and scheduled metrics report for various KPIs (Key Performance Indicators) around vulnerability management activities. Drive and track remediation initiatives across multiple support teams. Respond to questions from stakeholders about remediation and vulnerability assessment results and actions. Collaborate with support groups/stakeholders on details about identified vulnerabilities. EXPERIENCE AND EDUCATIONAL REQUIREMENTS: Bachelor s degree in Computer Science, Cybersecurity or other related field, or equivalent work experience. Proficient in various vulnerability assessment tools such as Qualys, Armis, Microsoft Defender for Endpoint/Cloud. Ability to analyze vulnerability metrics using Microsoft Excel advanced techniques. 4-6 years of combined IT and security work experience with a broad range of exposure to cybersecurity, systems analysis, application development and/or systems administration and 2+ years of vulnerability management experience. Requires Security Certification(s) (i.e., Certified Information Systems Security Professional (CISSP), or Certified Information Security Manage (CISM), Certificate of Cloud Security Knowledge (CCSK), Offensive Security Certified Professional (OSCP) or other equivalent recognized security certifications. Good understanding of industry standard regulations and risk management frameworks and standards (e.g., ISO, PCI, NIST, COBIT, GAPP, HIPAA, GDPR). Familiarity with SANS Top 25 controls, OWASP Top 10 and/or MITRE ATT&CK framework Excellent communication skills: able to explain complex concepts clearly to both technical and non-technical stakeholders. Skills Desired: Exposure or knowledge of cloud architectures, services, and vulnerabilities. Understanding of risk assessment methodologies. Proficiency in using vulnerability scanning tools such as Qualys, Armis, MS Defender, etc. Ability to interpret vulnerability data from multiple sources. Reporting and metrics expertise with platforms such as ServiceNow (SecOps), PowerBI, etc. Job Title: Vulnerability Management Engineer II Reporting To: Manager, Threat & Vulnerability Management (Pune) Location: Pune Summary: The Vulnerability Management Engineer II is responsible for managing the identification, assessment, reporting, and mitigation of infrastructure and cloud vulnerabilities. A candidate for this role will have a mindset of a defender and be able to operate in a fast-paced environment working closely with our infrastructure team that includes Network, Firewall, Hypervisors, Servers, and business application teams. Key Serve in a contributing role that requires frequent interaction with IT and Infosec managers, engineers and developers. Provide vulnerability remediation governance and operational support. Perform vulnerability metrics reporting for ad-hoc and scheduled metrics report for various KPIs (Key Performance Indicators) around vulnerability management activities. Drive and track remediation initiatives across multiple support teams. Respond to questions from stakeholders about remediation and vulnerability assessment results and actions. Collaborate with support groups/stakeholders on details about identified vulnerabilities. EXPERIENCE AND EDUCATIONAL REQUIREMENTS: Bachelor s degree in Computer Science, Cybersecurity or other related field, or equivalent work experience. Proficient in various vulnerability assessment tools such as Qualys, Armis, Microsoft Defender for Endpoint/Cloud. Ability to analyze vulnerability metrics using Microsoft Excel advanced techniques. 4-6 years of combined IT and security work experience with a broad range of exposure to cybersecurity, systems analysis, application development and/or systems administration and 2+ years of vulnerability management experience. Requires Security Certification(s) (i.e., Certified Information Systems Security Professional (CISSP), or Certified Information Security Manage (CISM), Certificate of Cloud Security Knowledge (CCSK), Offensive Security Certified Professional (OSCP) or other equivalent recognized security certifications. Good understanding of industry standard regulations and risk management frameworks and standards (e.g., ISO, PCI, NIST, COBIT, GAPP, HIPAA, GDPR). Familiarity with SANS Top 25 controls, OWASP Top 10 and/or MITRE ATT&CK framework Excellent communication skills: able to explain complex concepts clearly to both technical and non-technical stakeholders. Skills Desired: Exposure or knowledge of cloud architectures, services, and vulnerabilities. Understanding of risk assessment methodologies. Proficiency in using vulnerability scanning tools such as Qualys, Armis, MS Defender, etc. Ability to interpret vulnerability data from multiple sources. Reporting and metrics expertise with platforms such as ServiceNow (SecOps), PowerBI, etc.

Posted 1 month ago

Apply

4.0 - 9.0 years

3 - 7 Lacs

Patancheru

Work from Office

Naukri logo

Security engineer Protect our users and their data. 4+ years in security engineering. Encryption expertise. Threat modeling experience.

Posted 1 month ago

Apply

8.0 - 13.0 years

25 - 30 Lacs

Bengaluru

Work from Office

Naukri logo

Product Overview Outseer Fraud Manager is an advanced, omnichannel fraud detection hub that provides risk-based, multi-factor authentication for organizations seeking to protect their consumers from fraud across digital channels. Powered by the AI/ML based Risk Engine, Outseer Fraud Manager is designed to measure the risk associated with a users login and post-login activities by evaluating a variety of risk indicators. Using powerful machine learning and fine-grained policy controls, this anti-fraud hub only requires additional assurance, such as out-of-band authentication and transaction signing, for scenarios that are elevated risk and/or violate rules established by an organization. This methodology provides transparent authentication for most of the users, ensuring a frictionless end user experience and high fraud detection rates. What youll achieve: As a Senior Application Security Engineer, you will take ownership of securing our applications throughout the software development lifecycle and provide strategic guidance to ensure the highest level of security across our organization. With your expertise, you will mentor and collaborate with cross-functional teams, drive the adoption of best practices, and implement robust security measures to protect our critical assets, data, and customer information from security threats and vulnerabilities. Essential Duties Drive the application security program, establishing strategic goals, objectives, and initiatives to enhance the overall security posture of our applications. Conduct comprehensive application security assessments, including manual penetration testing, code reviews, architecture reviews and vulnerability scanning, to identify and mitigate risks and vulnerabilities. Provide technical leadership and guidance to development teams, architects, and stakeholders on secure coding practices, security requirements, and the integration of security controls into the software development lifecycle. Develop and maintain application security policies, standards, and guidelines to ensure compliance with regulatory requirements and industry best practices. Collaborate with development teams to perform threat modeling, identify security design gaps, and recommend appropriate security controls and countermeasures. Conduct security reviews of third-party applications and vendors to assess their security posture and ensure compliance with our security standards. Lead incident response efforts for application security incidents, coordinating with cross-functional teams to investigate, contain, and remediate security breaches or vulnerabilities. Stay up to date with emerging threats, vulnerabilities, and industry trends, and provide recommendations for proactive security enhancements. Mentor and train junior members of the application security team, providing guidance and knowledge transfer to develop their skills and expertise. Evaluate and recommend security tools, technologies, and frameworks to enhance application security capabilities and automate security processes. Desired Requirements Bachelors degree in computer science, Information Security, or a related field - or equivalent work experience. 8+ years of professional experience working as an Application Security Engineer or in a similar role, with a focus on securing web and mobile applications. In-depth knowledge of application security concepts, including secure coding practices, authentication and authorization mechanisms, encryption, and vulnerability assessment. Demonstrated experience conducting manual application penetration testing, code reviews, and vulnerability assessments. Strong understanding of web and mobile application frameworks, languages, and technologies (e.g., Java, JavaScript, Python). Proficiency in application security tools such as static code analysis (SAST), dynamic application security testing (DAST), and penetration testing frameworks. Expertise in cloud security concepts and practices, particularly in cloud-native environments (e.g., AWS, Azure, GCP). Deep knowledge of web application security vulnerabilities (OWASP Top Ten), attack vectors, and mitigation techniques. Strong scripting or programming skills for automation and tooling (e.g., Python, Bash, PowerShell). Professional certifications in application security (e.g., CSSLP, GWAPT, CISSP) are highly desirable. Administration of security tools such as: Anti DDoS WAF, SAST and DAST. Secure software development lifecycle (SSDLC) and DevSecOps practices. Leader that can influence, motivate, and direct a workgroup to achieve results. Excellent communication skills both verbal and written. Project leadership with the ability to prioritize multiple assignments and / or deliverables. Desired Behaviors Adaptability: Demonstrates flexibility and openness to change. Actively seeks and adopts improved approaches and processes. Proactive Action: Takes initiative and is driven by results. Takes ownership of actions and outcomes, meeting commitments and striving for high performance. Effective Workload Management: Makes timely decisions, prioritizes tasks effectively, solves problems, monitors results, and takes corrective action when necessary. Technical Proficiency : Possesses a solid understanding of their role and responsibilities, demonstrating competence in performing tasks and utilizing relevant technical skills. Continuous Learning : Takes personal responsibility for learning and development. Recognizes personal strengths and areas for improvement, actively seeks feedback, and embraces opportunities to learn. Effective Communication : Demonstrates strong facilitation and written communication skills. Clearly articulates ideas and proposals, actively listens to colleagues perspectives, and values diverse viewpoints. Collaboration: Shares information, fosters teamwork, and contributes to a positive work environment. Actively collaborates with others and encourages a sense of unity and cooperation among team members. Ethical Conduct and Competence : Acts with integrity and intent, displaying ethical character in all actions. Takes accountability for ones own behavior and aligns actions with the companys values and principles. Good Citizenship : Represents the values and interests of Outseer. Acts as a positive ambassador for the company and contributes to the overall well-being and success of the organization.

Posted 1 month ago

Apply

1.0 - 3.0 years

0 - 3 Lacs

Gurgaon/Gurugram

Work from Office

Naukri logo

What you'll do We are seeking candidates with 1 to 3 years of experience in information security to join our team. The ideal candidate will have a solid understanding of the Microsoft Office environment and a keen interest in pursuing a career in information security. Key Responsibilities: -Assist in monitoring and maintaining security systems and tools. -Support the implementation of security measures to protect sensitive data and systems. -Conduct regular security audits and assessments. -Help in identifying and mitigating potential security threats. -Collaborate with team members to develop and enhance security policies and procedures. -Stay updated with the latest trends and advancements in information security. Qualifications: -Bachelor's degree in Information Technology, Computer Science, or a related field. -Up to 1-3 years of experience in information security . -Proficiency in Microsoft Office tools (Word, Excel, PowerPoint, Outlook). -Strong analytical and problem-solving skills. -Excellent communication and teamwork abilities. -Basic understanding of cybersecurity principles and practices. Location: This position is based in our office in Gurugram, Haryana.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies