Jobs
Interviews

2727 Vulnerability Assessment Jobs - Page 34

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 5.0 years

7 - 11 Lacs

hyderabad

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 month ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 month ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 month ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 month ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

hyderabad

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 month ago

Apply

7.0 - 11.0 years

16 - 20 Lacs

bengaluru

Work from Office

This Position reports to: IS Service Owner You will be mainly accountable for: Ensures that the IS solutions/services provides the required functionality, meet the expectations of business and are reliable, maintainable, compliant, and auditable. Manages/monitors software development and analyses data to continually improve solution. Collaborates with and contributes to project setup and delivery and to service operations optimization. Accountable to approve, sign-off, and build any solution to be implemented on ABB production environment, within the respective service line, ensuring required quality and safety standards. Defines the technical IS solution and ensures alignment with other mod...

Posted 1 month ago

Apply

5.0 - 6.0 years

6 - 8 Lacs

lucknow

Work from Office

Reporting to Programme Specialist (Resilience), the GIS and Spatial Modelling Analyst will provide advanced geospatial and analytical support to strengthen disaster risk reduction (DRR), planning, and decision-making efforts in the state. The role involves developing and managing geospatial databases, conducting spatial risk assessments, supporting HRVA and Disaster Management Plan (DMP) preparation, and facilitating integration with the states disaster MIS. The expert will work closely with UPSDMA, UPDESCO, RAHAT , and technical specialists to ensure the use of cutting-edge geospatial tools, models, and data for effective planning, monitoring, and response. Duties and Responsibilities: (A) ...

Posted 1 month ago

Apply

6.0 - 11.0 years

30 - 35 Lacs

noida, chennai

Work from Office

HCL Tech uses Qualys tools for various roles, including those in security, infrastructure management, and penetration testing. Job descriptions often specify experience with Qualys tools, such as vulnerability scanning and configuration management , and may also require proficiency in other security technologies and certifications like CEH. 1. Security Roles: Vulnerability Assessment and Penetration Testing (VAPT): HCL Tech uses Qualys tools for identifying vulnerabilities in systems and applications. VAPT Testers need experience with Qualys and other penetration testing tools. Security Operations Engineer: This role involves implementing and managing security measures, including those relat...

Posted 1 month ago

Apply

3.0 - 5.0 years

4 - 8 Lacs

bengaluru

Work from Office

We are looking for a skilled PHP ReactJS Engineer with 6 to 10 years of experience to join our team at Wipro Limited, located in Bengaluru. The ideal candidate will have expertise in software services and proficiency in PHP and ReactJS. Roles and Responsibility Design, develop, and maintain high-quality software applications using PHP and ReactJS. Collaborate with cross-functional teams to identify and prioritize project requirements. Develop and implement new features and functionalities in existing software applications. Troubleshoot and resolve technical issues efficiently. Participate in code reviews and contribute to improving overall code quality. Stay updated with industry trends and ...

Posted 1 month ago

Apply

4.0 - 8.0 years

20 - 25 Lacs

bengaluru

Work from Office

This Position reports to: BU Digital Leader Your role and responsibilities: In this role, you will have the opportunity to define and implement ABBs cybersecurity strategy aligned with the overall strategy and business needs. Each day, you will manage cybersecurity risks that could affect the ABB brand and customer base for all ABB offerings, in a cost-effective way. You will also showcase your expertise by collaborating with businesses to protect and grow revenue by effectively addressing customer cybersecurity expectations and actively driving cybersecurity opportunities and demand. The work model for the role is: #LI-Onsite This role is contributing to the Motion Business in Service divis...

Posted 1 month ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

hyderabad

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 month ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

bengaluru

Work from Office

Shift Time : Regular Shift. ( 8AM to 5:30 PM) Support Engineer SailPoint L2,L3 support roles involve tackling the most intricate issues within the Identity and Access Management (IAM) domain, particularly concerning SailPoint IdentityIQ. Deep understanding of SailPoint's functionality, including its integrations with systems such as Active Directory, LDAP, and various applications. Should take responsibility for resolving escalated technical problems, conducting root cause analysis, and collaborating with development and engineering teams for the fixes and enhancements. Key Responsibilities Advanced troubleshooting and issue resolution. In-depth root cause analysis. Collaborating with develo...

Posted 1 month ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

bengaluru

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 month ago

Apply

6.0 - 10.0 years

8 - 12 Lacs

telangana

Work from Office

Apenetration testing (PenTest) and disaster recovery (DR) test job description typically requires candidates to have expertise in both cybersecurity and business continuity. The role involves conducting authorized simulated attacks to identify vulnerabilities in systems and infrastructure, developing and testing DR plans, and providing recommendations for improvement. Penetration Testing (PenTest) Responsibilities : Vulnerability Assessment: Identify weaknesses in computer systems, networks, and applications. Simulated Attacks: Perform ethical hacking exercises to mimic real-world attacks. Reporting and Recommendations: Document findings and provide actionable recommendations for remediation...

Posted 1 month ago

Apply

9.0 - 12.0 years

27 - 35 Lacs

telangana

Work from Office

Secondary skill Experience with security tools and technologies (e.g., SIEM, IDS/IPS, firewalls). Familiarity with DevSecOps practices. Missions We are seeking a skilled Cloud Security Analyst to join our team. The ideal candidate will have extensive experience in cloud security, particularly with Azure, AWS, and Microsoft 365 (M365). This role involves ensuring the security of our cloud infrastructure, identifying and mitigating risks, and implementing best practices to protect our data and systems Design, implement, and manage security measures for cloud environments (Azure, AWS, M365). Monitor cloud infrastructure for security breaches and respond to incidents. Conduct regular security as...

Posted 1 month ago

Apply

6.0 - 11.0 years

8 - 14 Lacs

hyderabad

Work from Office

Experience 6+ Years Skill SIEM Notice Period Immediate Employment Type Contract Work Mode WFO/Hybrid 6 years of SIEM, or SOC experience Strong communication, written, and verbal skills Experience with writing/creation of formal documentation such as reports, slide decks, and architecture diagrams Customer service/support experience Ability to conduct in-depth forensic analytical studies and investigations Role Preferences Splunk certification Coding or scripting experience Strong knowledge of Unix/Linux Security+, GIAC, SSGB, ITIL, or similar certification Working knowledge of applicable industry controls such as NIST 800-536 or Mitre Attack Framework

Posted 1 month ago

Apply

10.0 - 15.0 years

5 - 8 Lacs

hyderabad

Work from Office

We have Immediate Openings on VulnerabilityManagement Contract to Hire role for multiple clients. Job Details Skills VulnerabilityManagement JD Primary & Secondary Skills Vulneribility ManagementQualys GuardQualys AgentPolicy ComplianceVulneribilty Scanning RESPONSIBILITIES Perform vulnerability assessment using leading Vulnerability Scanning solutions like Qualys, Microsoft Defender, etc. Perform vulnerability assessments on On-prem, Cloud hosted systems, container (like Docker & Kubernetes), databases, web services and other widely deployed infrastructure components. Perform false positive validation and ensure delivery of quality reports. Act as a technical SME to analyse the vulnerabilit...

Posted 1 month ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

gurugram

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Operation Automation Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to as...

Posted 1 month ago

Apply

2.0 - 6.0 years

4 - 8 Lacs

bengaluru

Work from Office

Wipro Limited (NYSE:WIT, BSE:507685, NSE:WIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role : Role Purpose The purpose of this rol...

Posted 1 month ago

Apply

3.0 - 5.0 years

7 - 11 Lacs

pune

Work from Office

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is ...

Posted 1 month ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

mumbai

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 month ago

Apply

2.0 - 6.0 years

4 - 8 Lacs

hyderabad

Work from Office

About The Role : Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of se...

Posted 1 month ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

pune

Work from Office

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents ...

Posted 1 month ago

Apply

3.0 - 6.0 years

8 - 12 Lacs

gurugram

Work from Office

This role is responsible for analyzing activities relating to monitoring and responding to security events. This role receives, researches, triages and documents all security events and alerts as they are received. This individual supports multiple security-related platforms and technologies, interfacing with others within the IT organization, as well as other internal business units and external customers/partners. Events will be generated from endpoints, networks, security information and event management (SIEM) systems, threat intelligence platforms, employees, third-parties and other sources. This role also receives information sharing and analysis center (ISAC) information and is expect...

Posted 1 month ago

Apply

1.0 - 4.0 years

5 - 9 Lacs

gurugram

Work from Office

Bill Gosling Outsourcing is looking for Executive Information Security to join our dynamic team and embark on a rewarding career journey Assisting with the preparation of operating budgets, financial statements, and reports. Processing requisition and other business forms, checking account balances, and approving purchases. Advising other departments on best practices related to fiscal procedures. Managing account records, issuing invoices, and handling payments. Collaborating with internal departments to reconcile any accounting discrepancies. Analyzing financial data and assisting with audits, reviews, and tax preparations. Updating financial spreadsheets and reports with the latest availa...

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies