823 Vulnerability Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

4 - 7 Lacs

bengaluru

Work from Office

As a Sr Advanced Cyb Sec Archt/Engr here at Honeywe'll, you will play a pivotal role in designing, implementing, and maintaining advanced cybersecurity solutions to protect our critical assets. You will collaborate with cross-functional teams to develop and execute robust cybersecurity strategies, ensuring the security and resilience of our digital infrastructure. In this role, you will impact the security posture of our organization by developing and implementing cutting-edge cybersecurity solutions. Your expertise will help safeguard our digital assets, ensuring compliance with industry standards and regulations, and mitigating potential security risks. YOU MUST HAVE 5+ years of experience...

Posted 1 day ago

AI Match Score
Apply

5.0 - 10.0 years

12 - 16 Lacs

gurugram

Work from Office

Looking for a highly motivated, self-starter with excellent communication and interpersonal skills to join our sales team. The Enterprise Partner Account Manager will focus on maintaining and strengthening relationships with our existing customers, while expanding product footprint throughout the lifecycle of a customer ideal candidate has a history of exceeding sales targets and managing enterprise customers. Responsibilities Focus on driving expansion within existing accounts. Meet and exceed quarterly and annual sales quotas. Develop strong relationships with multiple stakeholders within a company. Conduct online and one to one presentations and demonstrations. Rapidly learn about securit...

Posted 1 day ago

AI Match Score
Apply

10.0 - 18.0 years

30 - 37 Lacs

bengaluru

Work from Office

Application Security Engineer responsible for AppSec tools, vulnerability triage, and secure architecture guidance. Works with engineers on assessments, remediation, and best-practice security across SDLC.

Posted 1 day ago

AI Match Score
Apply

3.0 - 8.0 years

8 - 18 Lacs

kolkata, bengaluru, delhi / ncr

Work from Office

Role & Responsibilities Implement, configure, and optimize ServiceNow SecOps Vulnerability Response module Design, develop, and maintain integrations with enterprise vulnerability and security tools Build and manage workflows using Flow Designer, Orchestration, and IntegrationHub Handle data imports, transformations, and vulnerability lifecycle management Perform customization using JavaScript and Glide APIs Collaborate with security teams and business stakeholders to translate requirements into technical solutions Support testing, deployment, and post-implementation enhancements Preferred Candidate Profile 38 years of experience in ServiceNow Security Operations with strong focus on Vulnera...

Posted 1 day ago

AI Match Score
Apply

5.0 - 10.0 years

4 - 7 Lacs

ahmedabad

Work from Office

Application Engineer India #1 - Remote, IND Apply Job Type Full-time Description Job Summary: We seek a highly skilled Application Engineer to provide advanced support for eDiscovery applications. This role involves complex problem-solving, SQL script development, comprehensive documentation, and mentoring of junior staff. The ideal candidate will have a deep understanding of IT systems, particularly in eDiscovery environments, with certifications in relevant eDiscovery applications and a strong background in application troubleshooting and SQL scripting. The role is hands-on and will require an individual with the ability to learn and adapt to new technologies. You will be expected to under...

Posted 1 day ago

AI Match Score
Apply

1.0 - 3.0 years

2 - 6 Lacs

gurugram

Work from Office

Xiarch is a decade old company founded by the alumni of IVY league universities. It is a CERT-IN Impaneled & ISO 9001-2015, 27001-2013 certified Global Consulting firm and is an acronym for Xtreme InfoSec Auditors, Researchers, Consultants and Hackers. Headquartered in New Delhi, we have our delivery centers at Gurugram (Haryana) and Mumbai (Maharashtra)in India. Our vast clientele includes 2000+ customers. Spanning across Asia, India, North America, Africa, and Middle East regions around the globe and many fortune 500 customers. We provide pure-play cybersecurity services in all major domains which includes VAPT, Vulnerability assessments, Penetration Testing, Red Teaming, Cloud Security, S...

Posted 1 day ago

AI Match Score
Apply

1.0 - 6.0 years

8 Lacs

gurugram

Work from Office

Xiarch is a decade old company founded by the alumni of IVY league universities. It is a CERT-IN Impaneled & ISO 9001-2015, 27001-2013 certified Global Consulting firm and is an acronym for Xtreme InfoSec Auditors, Researchers, Consultants and Hackers. Headquartered in New Delhi, we have our delivery centers at Gurugram (Haryana) and Mumbai (Maharashtra)in India. Our vast clientele includes 2000+ customers. Spanning across Asia, India, North America, Africa, and Middle East regions around the globe and many fortune 500 customers. We provide pure-play cybersecurity services in all major domains which includes VAPT, Vulnerability assessments, Penetration Testing, Red Teaming, Cloud Security, S...

Posted 1 day ago

AI Match Score
Apply

2.0 - 5.0 years

4 - 8 Lacs

gurugram

Work from Office

Xiarch is a decade old company founded by the alumni of IVY league universities. It is a CERT-IN Impaneled & ISO 9001-2015, 27001-2013 certified Global Consulting firm and is an acronym for Xtreme InfoSec Auditors, Researchers, Consultants and Hackers. Headquartered in New Delhi, we have our delivery centers at Gurugram (Haryana) and Mumbai (Maharashtra)in India. Our vast clientele includes 2000+ customers. Spanning across Asia, India, North America, Africa, and Middle East regions around the globe and many fortune 500 customers. We provide pure-play cybersecurity services in all major domains which includes VAPT, Vulnerability assessments, Penetration Testing, Red Teaming, Cloud Security, S...

Posted 1 day ago

AI Match Score
Apply

2.0 - 7.0 years

3 - 6 Lacs

noida

Work from Office

Key Responsibilities Maintain the day to day health of all security tools including endpoint security, MDM, logging agents, cloud connectors, vulnerability scanners, and identity tooling. Ensure agent coverage is complete and functioning across endpoints, servers, and cloud workloads. Monitor dashboards and systems for gaps, misconfigurations, outdated versions, or broken integrations. Work with SecOps to build, adjust, and tune alerts that identify suspicious behavior without creating excessive noise. Develop and maintain SIEM rules, saved searches, dashboards, and baseline checks. Review false positives and help refine logic, thresholds, and detection patterns. Ensure logs from endpoints, ...

Posted 2 days ago

AI Match Score
Apply

2.0 - 7.0 years

12 - 16 Lacs

bengaluru

Work from Office

What You'll Own Security Strategy & Architecture Define and evolve Sarvam AI s end-to-end security strategy Design secure architectures for Sarvam s products and API platform. Apply BFSI-grade threat modeling and controls to AI infrastructure Make pragmatic risk decisions balancing research velocity and security Product & Application Security Lead threat modeling for AI Products, APIs and Data Systems Own application and API security, including auth, access control and data isolation Drive vulnerability discovery, remediation and verification Systems and Processes Setup systems and process to proactively find and validate vulnerabilities across products and infrastructure Perform targeted ad...

Posted 2 days ago

AI Match Score
Apply

5.0 - 10.0 years

6 - 11 Lacs

bengaluru

Work from Office

Responsibilities: Develop and enforce cloud security policies and standards. Implement IAM, encryption, and monitoring solutions. Collaborate with DevOps teams to integrate security into CI/CD pipelines. Conduct vulnerability assessments and manage remediation plans. Required Qualifications: Bachelor s degree in Computer Science or related field. 5+ years of experience in cloud security (AWS). Expertise in IAM, encryption, network security, and compliance frameworks (ISO 27001, SOC2). Hands-on experience with AWS Security Hub, GuardDuty, SIEM tools. Preferred Certification: AWS Security Specialty, CISSP, or equivalent certifications.

Posted 2 days ago

AI Match Score
Apply

8.0 - 13.0 years

35 - 40 Lacs

hyderabad

Work from Office

Responsibilities Provide clear guidance and mentorship to ensure software and test engineers understand secure software development practices and how to identify insecure code. Leverage data to regularly monitor the effectiveness of these practices and update as needed. Drive the use of threat modeling for the products in scope. Review threat models for identified products and provide guidance on appropriate threat modelling tools and techniques. Create or contribute to system level threat models. Review determinations of security findings and serve as primary approver for determination of Not Exploitable for Critical and High severity Findings for assigned products. Monitor status of vulner...

Posted 2 days ago

AI Match Score
Apply

4.0 - 9.0 years

16 - 18 Lacs

bengaluru

Work from Office

Role Mission The Service Area Manager - IT Operations is accountable for leading and developing a team of service leaders, each responsible for a specific operational domain. This role acts as the primary business-side interface with HCL Tech, ensuring that all domains are managed effectively and that HCL delivers according to contractual commitments, operational excellence standards, and Volvo s strategic objectives. The SAM also ensures strong cross-functional collaboration with BIS and AS organizations, driving process maturity, operational performance, and continual improvement across all IT operations. Key Responsibilities -Lead, develop, and coach a team of service leaders, each respon...

Posted 2 days ago

AI Match Score
Apply

14.0 - 22.0 years

20 - 30 Lacs

ahmedabad

Remote

Role & responsibilities We are seeking a highly skilled Technical Project Manager with strong experience in Cybersecurity Operations , Vulnerability Management , and Security Operations Center (SOC) environments. The ideal candidate will bridge the gap between technical teams and business stakeholders, driving the execution of cybersecurity projects while ensuring operational Key Responsibilities: Manage end-to-end delivery of cybersecurity initiatives, with a focus on vulnerability management , incident response , and SOC operations . Collaborate with security engineers, analysts, and cross-functional teams to track remediation efforts and threat mitigation. Lead project planning, execution...

Posted 2 days ago

AI Match Score
Apply

1.0 - 5.0 years

3 - 7 Lacs

gurugram

Work from Office

Xiarch is a decade old company founded by the alumni of IVY league universities. It is a CERT-IN Impaneled & ISO 9001-2015, 27001-2013 certified Global Consulting firm and is an acronym for Xtreme InfoSec Auditors, Researchers, Consultants and Hackers. Headquartered in New Delhi, we have our delivery centers at Gurugram (Haryana) and Mumbai (Maharashtra)in India. Our vast clientele includes 2000+ customers. Spanning across Asia, India, North America, Africa, and Middle East regions around the globe and many fortune 500 customers. We provide pure-play cybersecurity services in all major domains which includes VAPT, Vulnerability assessments, Penetration Testing, Red Teaming, Cloud Security, S...

Posted 2 days ago

AI Match Score
Apply

5.0 - 6.0 years

7 - 8 Lacs

chennai

Work from Office

Why You ll Love This Role Impact: Your work will directly safeguard critical infrastructure and sensitive information across global operations. Innovation: Work with cutting-edge security tools and technologies in a multi-sourcing environment. Growth: Continuous learning, certifications, and career advancement opportunities. Global Exposure: Collaborate with teams across Americas, EMEA, and APAC , with opportunities for travel and interaction with diverse cultures. Latest Technology: Be part of a forward-thinking organization leveraging modern security frameworks. What We re Looking For As a Senior Security Engineer , you will be responsible for designing, implementing, and maintaining Globa...

Posted 2 days ago

AI Match Score
Apply

8.0 - 10.0 years

10 - 15 Lacs

chennai

Work from Office

Position: Senior DevOps / Cloud Infrastructure (CE100SF RM 3797) Responsibilities Architect and manage secure, scalable cloud infrastructure on AWS (multi-tenant, multi-environment setup). Define and maintain Infrastructure as Code (IaC) using Terraform and reusable module design. Set up and manage CI/CD pipelines for microservices and AI/LLM-based components using GitHub Actions or equivalent. Automate deployments, enforce security controls, and manage secrets, IAM policies, and runtime compliance. Implement and tune monitoring, logging, tracing, and alerting (e.g., CloudWatch, Prometheus, Grafana, ELK). Collaborate with backend and AI engineers to ensure efficient orchestration of compute,...

Posted 2 days ago

AI Match Score
Apply

2.0 - 6.0 years

9 - 10 Lacs

bengaluru

Work from Office

The primary role is to make immediate, direct contributions to enhancing our clients competitive position and performance in ways that are distinctive, innovative, and sustainable. To do this, one must perform the following activities within the firm: SAP Basis with security Professional should have: Perform BASIS activities, including installations, upgrades, and system copies The candi should have a minimum 2-3 end to end Implementation project experience. Configure and maintain security settings for S/4 HANA systems Design and implement role-based access control and authorization concepts Manage user administration, role design, and segregation of duties Implement security best practices ...

Posted 3 days ago

AI Match Score
Apply

1.0 - 4.0 years

8 - 12 Lacs

noida, bengaluru

Work from Office

Experience 1-4 Location Bengaluru or Noida Description We are seeking a detail-oriented and analytically minded early-career professional to join our Adaptation and Risk Analysis Group. The ideal candidate will help translate climate science into actionable insights through rigorous review of risk and vulnerability assessments, spatial analysis, and research writing that supports evidence-based adaptation strategies across diverse landscapes and communities. Responsibilities Undertake systematic literature reviews, metadata analysis, and gap assessments by coding national and regional research, reports, and case studies, contributing to the development and upkeep of a comprehensive climate v...

Posted 3 days ago

AI Match Score
Apply

4.0 - 9.0 years

8 - 12 Lacs

bengaluru

Work from Office

Security Engineer - EG Cyber and Information Security At EG, we develop software for our customers so they can focus on their profession. Our industry-specific software is built by peers from the industry, and backed by the scale of EG for stability, innovation, and security. We are committed to advancing industries by tackling big challenges such as resource use, efficiency, and sustainability. We are a thriving global workforce of 3000+ employees, with a 850+ strong team based in Mangaluru, India. We have a people first culture fostering innovation, collaboration and continuous learning Join us in creating software that works for people, not software that makes people work. Visit our caree...

Posted 3 days ago

AI Match Score
Apply

8.0 - 13.0 years

25 - 30 Lacs

hyderabad

Work from Office

Job Description: Experience Level: 8+ years Location: Hyderabad Roles and Responsibilities: Understand and summarize deep technical analysis of suspicious activity using internal and external collection platforms, including but not limited to review of intelligence platforms, case management systems, technical analysis reports, darkweb chatter, metadata and intelligence sources. Use proprietary and open-source intelligence sources to interpret and summarize telemetry, produce informative products, briefs, and reports. Understand and review internal and external threat monitoring systems to increase AT&Ts intelligence holdings to maintain a high standard of quality of reporting products for c...

Posted 3 days ago

AI Match Score
Apply

3.0 - 8.0 years

8 - 18 Lacs

kolkata, bengaluru, delhi / ncr

Work from Office

Role & Responsibilities Implement, configure, and optimize ServiceNow SecOps Vulnerability Response module Design, develop, and maintain integrations with enterprise vulnerability and security tools Build and manage workflows using Flow Designer, Orchestration, and IntegrationHub Handle data imports, transformations, and vulnerability lifecycle management Perform customization using JavaScript and Glide APIs Collaborate with security teams and business stakeholders to translate requirements into technical solutions Support testing, deployment, and post-implementation enhancements Preferred Candidate Profile 38 years of experience in ServiceNow Security Operations with strong focus on Vulnera...

Posted 3 days ago

AI Match Score
Apply

2.0 - 3.0 years

5 - 8 Lacs

coimbatore

Work from Office

Name of the position: IT Operations Technician (CI/CD & DevOps Engineer) Location: UK (Berkshire/ Central London) No.of resources needed for this position: 01 Mode : Full-Time Years of experience: 2 to 3 Years Role Overview We are seeking an experienced IT Operations Technician with CI/CD and DevOps expertise to deliver consulting and operational services to enterprise end clients. The role focuses on designing, implementing, and operating automated delivery pipelines, infrastructure, and operational tooling to enable reliable, secure, and scalable software delivery. The successful candidate will work closely with development, security, and operations teams, contributing to high-quality serv...

Posted 3 days ago

AI Match Score
Apply

4.0 - 8.0 years

8 - 12 Lacs

miraj

Work from Office

Job Description We are seeking a skilled Cloud / Infrastructure & Security Specialist to manage cloud hosting, ensure system uptime, and implement robust security measures for critical applications. The ideal candidate will have expertise in cloud platforms, containerization, security protocols and disaster recovery planning. Key Responsibilities Manage cloud infrastructure on MeghRaj Cloud and AWS (EC2, S3) to ensure high availability and reliability. Implement containerization and orchestration using Docker and Kubernetes for scalable deployments. Configure and manage network security, including firewalls, VPC, IAM policies and TLS 1.3 encryption. Conduct security audits, vulnerability ass...

Posted 3 days ago

AI Match Score
Apply

4.0 - 7.0 years

20 - 25 Lacs

bengaluru

Work from Office

As a Product Security Engineer within FICO s Cybersecurity organization, you will contribute your assistance and innovative ideas to the Security Tools Development team. This role provides the opportunity to develop a deep understanding of our business, work closely with security, product management, and development engineers to architect, design, select, and deploy the appropriate automated application security testing tools in the DevSecOps process " - Sr. Manager, Cyber Security What You ll Contribute Help Lead Engineers integrate Application and DevSecOps processes with CI/CD pipelines from early stages of the lifecycle. Assists in development, implementation, and analysis of technical s...

Posted 3 days ago

AI Match Score
Apply

Exploring Vulnerability Jobs in India

The vulnerability job market in India is growing rapidly as organizations prioritize cybersecurity to protect their data and systems. Vulnerability professionals play a crucial role in identifying and addressing weaknesses in IT infrastructure to prevent cyber attacks and data breaches.

Top Hiring Locations in India

  1. Bangalore
  2. Pune
  3. Hyderabad
  4. Mumbai
  5. Delhi

Average Salary Range

The average salary range for vulnerability professionals in India varies based on experience and location. Entry-level positions may start at around INR 3-5 lakhs per annum, while experienced professionals can earn upwards of INR 10-15 lakhs per annum.

Career Path

In the field of vulnerability, a typical career path may include roles such as: - Junior Security Analyst - Security Engineer - Vulnerability Manager - Chief Information Security Officer

Related Skills

In addition to expertise in vulnerability assessment and management, professionals in this field may also benefit from skills in: - Penetration testing - Network security - Incident response - Risk management

Interview Questions

  • What is the difference between a vulnerability and an exploit? (basic)
  • How do you prioritize vulnerabilities for remediation? (medium)
  • Can you explain the Common Vulnerability Scoring System (CVSS)? (medium)
  • How do you stay updated on the latest security vulnerabilities and threats? (basic)
  • Describe a time when you identified a critical vulnerability and how you resolved it. (advanced)
  • What tools do you use for vulnerability scanning and assessment? (medium)
  • How do you communicate vulnerability findings to non-technical stakeholders? (medium)
  • What are the common challenges faced by vulnerability management teams? (basic)
  • Explain the concept of zero-day vulnerability. (advanced)
  • How does patch management contribute to vulnerability management? (medium)
  • What steps would you take to secure a web application from vulnerabilities? (medium)
  • How do you conduct a security risk assessment? (medium)
  • Can you discuss the importance of compliance in vulnerability management? (basic)
  • What are the key components of a vulnerability management program? (medium)
  • Describe the process of remediating a vulnerability in a production environment. (advanced)
  • How do you handle false positives in vulnerability scanning? (medium)
  • Have you ever dealt with a data breach? How did you respond to it? (advanced)
  • What is the role of a Security Information and Event Management (SIEM) system in vulnerability management? (medium)
  • How do you ensure that vulnerabilities are patched without causing system downtime? (medium)
  • Explain the concept of privilege escalation in the context of vulnerability management. (advanced)
  • What are the best practices for secure coding to prevent vulnerabilities? (medium)
  • How do you assess the security posture of a third-party vendor? (medium)
  • Describe a time when you had to coordinate a response to a security incident. (advanced)
  • How do you approach vulnerability testing in a cloud environment? (medium)

Closing Remark

As you prepare for interviews in the vulnerability field, remember to showcase your technical skills, problem-solving abilities, and knowledge of cybersecurity best practices. Stay updated on industry trends and be confident in your expertise as you pursue opportunities in this dynamic and rewarding field. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies