Home
Jobs
Companies
Resume

296 Vulnerability Jobs - Page 2

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 - 8.0 years

6 - 10 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

Bachelor s degree in computer science, Information Security, orrelated field 7+ years of experience in security engineering, cloud security, or compliance Strong knowledge of cloud security concepts, principles, and practices Familiarity with cloud security best practices and frameworks (e.g., CISv8, NIST, ISO, CSA) Experience in creating and maintaining security documentation, such as policies, standards, procedures, and guidelines. Experience with tool sets relevant to modern cloud operations like SIEM, WAF, vulnerability scans, pen tests, CIS benchmarking, etc. Working knowledge of OWASP Web/API vulnerabilities (CSRF, XSS, SQLI, etc.) and compensating controls. Knowledge of Web/API security architecture common authentication and authorization technologies (OIDC, OAuth2, Spring Security, HMAC, WS-Security, WS-Trust). Solid understanding of applied cryptography fundamentals (Encryption, Authentication, Symmetric Cryptography, Asymmetric Cryptography etc.). Ability to translate complex technical concepts into clear and concise language for diverse audiences and Attention to detail with quality assurance. Hands-on experience with security tools, frameworks for cloud platforms (e.g., AWS, Azure, GCP) and technologies (e.g., firewalls, encryption, identity and access management, vulnerability scanning, penetration testing) Experience with security standards and regulations for cloud environments (e.g., ISO 27001, SOC 2, PCI DSS, HIPAA, GDPR) Experience with scripting languages (e.g., Python, Bash, PowerShell) Excellent communication, collaboration, and problem-solving skills Certifications in cloud security or compliance (e.g., AWS Certified Security Specialty, Azure Security Engineer, CCSK, CCSP) are Mandatory. Basic Requirements - Effective verbal and non-verbal communication skills at all levels of the organization - Leadership teamwork and collaboration - Discretion - Problem solving - Critical Thinking - Self-initiated/sufficient - Motivated

Posted 1 week ago

Apply

2.0 - 6.0 years

3 - 7 Lacs

Pune

Work from Office

Naukri logo

Job_Description":" Job Title: Senior Embedded Engineer \u2013 IoT/RTOS/Cybersecurity Company: Silicon Stack Location: Pune (On-site) Employment Type: Full-Time Employee (FTE) Experience: 7+ Years Job Description: Silicon Stack is looking for a Senior Embedded Engineer with over 7 years of experience in developing robust IoT solutions. This role is ideal for professionals who have hands-on expertise in RTOS-based development, BLE Mesh protocols, and embedded cybersecurity practices. Candidates with experience on the Nordic SDK, especially NRF54L15, will be highly preferred. Key Responsibilities: - Design and develop embedded firmware for IoT devices using RTOS. - Work extensively with Nordic Semiconductor platforms, specifically the NRF54L15. - Develop and maintain BLE Mesh-based communication protocols. - Implement and maintain secure bootloaders and other cybersecurity features. - Conduct and respond to cybersecurity scans and assessments. - Collaborate with hardware, software, and QA teams to ensure end-to-end product delivery. - Troubleshoot, debug, and optimize embedded systems for performance and reliability. Required Skills: - Strong experience with Nordic SDK and NRF series SoCs (especially NRF54L15). - Proficient in RTOS concepts and development. - Deep understanding of BLE Mesh Protocols. - Knowledge of Secure Bootloaders and Embedded Cybersecurity best practices . - Hands-on experience with C/C++, embedded toolchains, and debugging tools. - Familiarity with cybersecurity compliance and vulnerability scanning tools. Preferred Qualifications: - Experience in IoT product development lifecycle. - Exposure to OTA (Over-The-Air) firmware updates. - Knowledge of secure communication proto ","

Posted 1 week ago

Apply

6.0 - 8.0 years

3 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

SUMMARY The Security Engineer GSOC is responsible for all aspects of onboarding and troubleshooting for SentinelOne and AlienVault for all MDR engagements. The Security Engineer GSOC provides onboarding support, SentinelOne agent installation, troubleshooting the issues if any, sensor deployments in AlienVault and deployment of other components in SIEM solutions, log source onboarding in SIEM, and related activities for all active engagements. The Security Engineer GSOC supports overall implementation by providing necessary support for current matters. The Security Engineer GSOC role takes direction on what is needed regarding all aspects of SentinelOne and AlienVault for the engagements. The Security Engineer GSOC works with the MDR team to support SentinelOne installations, interoperability issues, exclusions, whitelisting, and overall troubleshooting. The Security Engineer GSOC ensures that SentinelOne is deployed to a client s environment they are fully protected by it and clients opting for SIEM solutions are aptly covered from security standpoint. ROLES & RESPONSIBILITIES Communicates with the client to initiate the onboarding. Prepares and shares the network prerequisites and SentinelOne packages Ensures all required details are in place before an activity is started Handles all SentinelOne-related inquiries and tasks for their assigned projects Documents SOP and procedures related to common client inquiries related to SentinelOne deployment, support, and troubleshooting Provides resolution for onboarding/performance-related issues to MDR team or engages directly with the client with guidance Provides daily reports on SentinelOne deployment status Provides technical training and acclimation for clients to familiarize themselves with the S1 interface and functionalities Drives all AlienVault deployments with customers Understands the architecture, deploys the sensors, and prepares the log baseline for assets in scope for log collection Ensures ingested logs are parsed properly and alarms are getting triggered as expected Develops custom parsers for applications to onboard them to SIEM solutions May perform other duties as assigned by management SKILLS AND KNOWLEDGE Working understanding of API queries Working understanding of scripting Working understanding of developing PowerShell scripts and writing batch files for ad hoc requirements General understanding of Windows and Unix Intervals Working understanding of information security. Thorough understanding of analysis techniques for reviewing large datasets Working understanding of TCP/IP and OSI Model Thorough understanding of the Incident Response Life Cycle (Preparation, Identification, Containment, Eradication, Recovery, Lesson Learned) Working understanding of the MITRE ATT&CK framework Ability to communicate in both technical and non-technical terms both oral and written General understanding of: o Network Security Monitoring (NSM), network traffic analysis, and log analysis o Penetration Testing / Vulnerability Scanning Thorough understanding of enterprise security controls in Active Directory / Windows environments Experience with hands-on penetration testing against Windows, Unix, or web application targets JOB REQUIREMENTS Associates degree and 6-8 years of IT security-related experience or Bachelors degree and 2-5 years related experience Current or previous experience with Endpoint Detection and Response (EDR) toolsets SOC/CIRT team experience Applied knowledge in at least one scripting or development language (such as Python), preferred DISCLAIMER The above statements are intended to describe the general nature and level of work being performed. They are not intended to be an exhaustive list of all responsibilities, duties and skills required personnel so classified. WORK ENVIRONMENT While performing the responsibilities of this position, the work environment characteristics listed below are representative of the environment the employee will encounter: Usual office working conditions. Reasonable accommodation may be made to enable people with disabilities to perform the essential functions of this job. PHYSICAL DEMANDS No physical exertion required Travel within or outside of the state Light work: Exerting up to 20 pounds of force occasionally, and/or up to 10 pounds of force as frequently as needed to move objects TERMS OF EMPLOYMENT Salary and benefits shall be paid consistent with Arete salary and benefit policy. FLSA OVERTIME CATEGORY Job is exempt from the overtime provisions of the Fair Labor Standards Act. DECLARATION The Arete Incident Response Human Resources Department retains the sole right and discretion to make changes to this job description.

Posted 1 week ago

Apply

2.0 - 3.0 years

4 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

Company Overview Interactive Brokers Group, Inc. (Nasdaq: IBKR) is a global financial services company headquartered in Greenwich, CT, USA, with offices in over 15 countries. We have been at the forefront of financial innovation for over four decades, known for our cutting-edge technology and client commitment. IBKR affiliates provide global electronic brokerage services around the clock on stocks, options, futures, currencies, bonds, and funds to clients in over 200 countries and territories. We serve individual investors and institutions, including financial advisors, hedge funds and introducing brokers. Our advanced technology, competitive pricing, and global market help our clients to make the most of their investments. Barrons has recognized Interactive Brokers as the #1 online broker for six consecutive years. Join our dynamic, multi-national team and be a part of a company that simplifies and enhances financial opportunities using state-of-the-art technology. Position Overview: Seeking a Security Analyst to join our Security Operations Center (SOC), focusing on incident response and threat detection. This role involves working with enterprise SIEM platforms, EDR solutions, and incident management tools to protect IBKRs global trading infrastructure. Key Responsibilities: Triage and investigate security alerts using SIEM/EDR tools Execute incident response playbooks Perform malware analysis and IOC identification Create incident tickets and maintain documentation Conduct initial forensic data collection Support security event correlation and analysis Monitor suspicious endpoint activities Participate in 24x7 incident response coverage Required Technical Skills: Experience with SIEM (Splunk/QRadar) EDR platforms (CrowdStrike/Carbon Black) Incident ticketing systems (ServiceNow/JIRA) Windows/Linux log analysis Network traffic analysis Malware detection tools IOC collection and analysis Basic forensic tools Required Experience: 2-3 years SOC/IR experience L1/L2 alert analysis background Experience with incident playbooks Exposure to MITRE ATT&CK framework Understanding of kill chain methodology Basic threat intelligence usage Technical Environment: SIEM platforms EDR solutions TIP platforms Forensic tools Network monitoring tools Vulnerability scanners Incident management systems Work Requirements: Rotating shifts (24x7 SOC) Incident response handling Alert triage and escalation Documentation and reporting Team collaboration Growth Path: Advanced IR certification support Threat hunting training Digital forensics exposure Technical skill development Senior analyst progression Company Benefits & Perks: Competitive salary package. Performance-based annual bonus ( cash and stocks ). Hybrid working model ( 3 days office/week ). Group Medical & Life Insurance. Modern offices with free amenities & fully stocked cafeterias. Monthly food card & company-paid snacks. Hardship/shift allowance with company-provided pickup & drop facility* Attractive employee referral bonus. Frequent company-sponsored team-building events and outings. * Depending upon the shifts. ** The benefits package is subject to change at the managements discretion.

Posted 1 week ago

Apply

4.0 - 8.0 years

8 - 12 Lacs

Noida

Work from Office

Naukri logo

7+ years of dev experience Java, Springboot and SQL Experience on Vulnerability remediation Mandatory Competencies Java - Core JAVA Fundamental Technical Skills - Spring Framework/Hibernate/Junit etc. Database - SQL Beh - Communication At Iris Software, we offer world-class benefits designed to support the financial, health and well-being needs of our associates to help achieve harmony between their professional and personal growth. From comprehensive health insurance and competitive salaries to flexible work arrangements and ongoing learning opportunities, were committed to providing a supportive and rewarding work environment. Join us and experience the difference of working at a company that values its employees success and happiness.

Posted 1 week ago

Apply

0.0 - 6.0 years

9 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

Take on a crucial role where youll be a key part of a high-performing team delivering secure software solutions. Make a real impact as you help shape the future of software security at one of the worlds largest and most influential companies. As a Lead Security Engineer at JPMorgan Chase within the Cybersecurity Tech controls team , you are an integral part of team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. As a core technical contributor, you are responsible for carrying out critical technology solutions with tamper-proof, audit defensible methods across multiple technical areas within various business functions. Job responsibilities Executes creative security solutions, design, development, and technical troubleshooting with the ability to think beyond routine or conventional approaches to build solutions and break down technical problems Develops secure and high-quality production code and reviews and debugs code written by others Minimizes security vulnerabilities by following industry insights and governmental regulations to continuously evolve security protocols, including creating processes to determine the effectiveness of current controls Works with stakeholders and business leaders to understand security needs and recommend business modifications during periods of vulnerability Conducts discovery, vulnerability, penetration testing, and threat scenarios on multiple organizational assets to identify and assess if vulnerabilities are present, and executes threat modeling for multiple applications including external applications interacting with the internal JPMorgan Chase network Adds to team culture of diversity, equity, inclusion, and respect Required qualifications, capabilities, and skills Formal training or certification on security engineering concepts and 5+ years applied experience Skilled in planning, designing, and implementing enterprise level security solutions Advanced in one or more programming languages Proficient in all aspects of the Software Development Life Cycle Advanced understanding of agile methodologies such as CI/CD, Application Resiliency, and Security Experience with threat modeling, discovery, vulnerability, and penetration testing In-depth knowledge of the financial services industry and their IT systems Preferred qualifications, capabilities, and skills Experience effectively communicating with senior business leaders

Posted 1 week ago

Apply

10.0 - 15.0 years

10 - 14 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

Job Title: Cyber Organization alignment Compliance Location: Remote Experience: 10 -15 Years Job Description: The Information Security Cyber Organization Alignment role is focused on the strategic alignment of information security practices with the bank s overall risk management strategy, compliance requirements, and governance frameworks. The role focuses on driving Information Security Governance, Risk, and Compliance (GRC) initiatives to strengthen the bank s security posture while ensuring alignment with regulatory and business objectives. through effective processes i.e., risk tracking, compliance monitoring, RCSA, evaluating exceptions, and ensuring accurate reporting. The role ensures the right level of governance is in place and drives continuous improvement in risk management processes. The role leverages automation to streamline processes and enhance risk visibility across Information Security Group through managing GRC solutions Key Responsibilites: Essential knowledge Have around 10+ years of experience in a Banking environment and over 3 years of experience in information security. Familiarity with information security technologies, risk, threat and vulnerability assessments, and security measures. Experience with governance, risk management, and compliance frameworks (e.g., ISO 27001, NIST, GDPR, PDPL). Hold professional certifications (e.g., CISA, CISM, CISSP, CRISC) Skills and Application Strong communication and interpersonal skills. Ability to manage multiple projects and priorities. Proficiency in security tools and technologies. Strategic Insight Foster a culture of security awareness and compliance within the organization. Continuously improve the information security posture of the organization. Ensure that information security risks are effectively managed and mitigated

Posted 1 week ago

Apply

10.0 - 15.0 years

9 - 13 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

Job Title: Cyber Awareness Specialist Location: Remote Experience: 10 -15 Years Job Description: The Cyber Security Awareness Specialist plays a critical role in maturing cyber security awareness program. The specialist is responsible for fostering a culture where Cybersecurity is embedded in their roles in protecting the Bank s assets and information and integrating cybersecurity awareness into the banks broader security strategy, ensuring a proactive and informed workforce that upholds the bank s commitment to data protection and risk management . Key Responsibilities : Develop and deliver a Cybersecurity Training program. Plan and execute Cybersecurity Awareness Campaigns to promote cybersecurity. Advocate for cybersecurity policies and best practices. Monitor training effectiveness and report on progress Essential knowledge: Have a minimum of 10 years of experience in cybersecurity awareness, training, or related roles preferably within the banking or financial services industry. Strong knowledge of cybersecurity principles, threats, and best practices. Excellent communication, presentation, and interpersonal skills. Proficiency in using tools for creating digital training materials (e.g., e-learning platforms, video editing software). Familiarity with phishing simulation tools, wargaming tools (e.g., Defender, Conductrr etc.) and methodologies. Experience managing relationships with senior and executives. Familiarity with information security technologies, risk, threat and vulnerability assessments, and security measures. Knowledge of information security regulatory and compliance requirements. Skills and Application: Support in the development and implementation of comprehensive information security awareness program in alignment with the Information Security Group strategy. Oversees awareness program and ensuring key metrics are managed within risk appetite level. Strategic Insight: Cultivates an organizational culture inside that prioritizes and encourages proactive information security practices and continuous improvement across all departments. Integrate information security considerations into ISG strategies, recognizing the importance of information security in achieving ISG objectives and competitive advantage. Communicates the strategic value of Information Security and Data to executive leadership and key stakeholders, advocating for resources and support to strengthen the banks capabilities. Key Competencies: Creativity and ability to craft engaging, informative materials for diverse audiences. Analytical skills to assess training effectiveness and identify risks. Strong organizational and project management skills. A proactive mindset and enthusiasm for fostering a culture of cybersecurity awareness. Professional certifications: CISA, CISM, CISSP, CRISC, ISO27001 LA/LI etc.

Posted 1 week ago

Apply

6.0 - 11.0 years

15 - 16 Lacs

Pune

Work from Office

Naukri logo

We are looking forward to hire Go LANG Professionals in the following areas : : Backend Software Engineer - GoLang | Experience - 6+ years Special Knowledge and Skills: Must-haves: Develop and implement micro services in Go (Must-have) Experience with containerization technologies (e.g., Docker, Kubernetes) Experience with any of the public cloud environment (GCP, AWS, Azure) Strong work experience on Go [ min 2 years] Strong work experience in NoSQL Databases Knowledge of REST Web API [ min 3 years] Knowledge of Restful architecture, application networking and troubleshooting Experience of application profiling and bottleneck analysis Hands-on in the Continuous Integration and Delivery arena. Experience working with Agile methodologies (SCRUM in particular) Reactive programming and functional programing techniques Experience creating automated tests using unit testing frameworks Nice-to-have: Oil Gas domain knowledge Knowledge of tradeoffs among PaaS, CaaS and IaaS cloud-based solutions Knowledge of site reliability management (operational readiness in particular) Experience resolving code quality issues and security vulnerability issues reported by scanning tools. Soft skills: Team player. Good interpersonal and communication skills. Proactive and self-driven; eager to learn, curious and capable of multi-tasking. A mentoring spirit, able to share knowledge and expertise. Job functions: Analyse requirements, design develop maintain software products in alignment with the technology strategy of the organization Produce prototypes to illustrate technology options and mitigate risks Conduct and/or participate in technical reviews of requirements, specifications, designs, code and other artifacts. Ensure commitments are agreed, reviewed and met. Contribute to design standards and support designs re-use (best practices, etc.). Contributes to development plan by providing task estimates. Provide operational support when needed. Prepare technical documentation to field and/or customers in a timely fashion. mentor others regarding technical matters. Share expertise and expand his/her informal network throughout the organization: field, research, engineering, manufacturing and other domains. Identify and keep abreast of novel technical concepts and markets. Learn new skills and adopt new practices readily in order to develop innovative and innovative software products that maintain Companys technical leadership position. Write automated tests (unit tests, integration tests, etc.). Our Hyperlearning workplace is grounded upon four principles Flexible work arrangements, Free spirit, and emotional positivity Agile self-determination, trust, transparency, and open collaboration All Support needed for the realization of business goals, Stable employment with a great atmosphere and ethical corporate culture

Posted 1 week ago

Apply

6.0 - 11.0 years

8 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

Greenlight is the leading family fintech company on a mission to help parents raise financially smart kids. We proudly serve more than 6 million parents and kids with our award-winning banking app for families. With Greenlight, parents can automate allowance, manage chores, set flexible spend controls, and invest for their family s future. Kids and teens learn to earn, save, spend wisely, and invest. At Greenlight, we believe every child should have the opportunity to become financially healthy and happy. It s no small task, and that s why we leap out of bed every morning to come to work. Because creating a better, brighter future for the next generation depends on it. Greenlight s Security Operations team is responsible for continuously monitoring and analyzing security threats, alerts, detecting and responding to security incidents across our infrastructure and implementing security controls to prevent future attacks. You will maintain and enhance a consistent and reliable operational security environment and take a proactive security monitoring approach. You must be a highly skilled and technical individual who is able to collaborate cross-functionally to remediate security challenges and has the ability to adapt in a dynamic security landscape. What you will be doing: Deploy and maintain security tools to proactively monitor and respond to emerging threats Monitor and analyze security alerts from various security tools (SIEM, firewalls, IPS, EDR etc.) to identify potential threats and incidents Investigate security incidents, determine their root cause and impact, and recommend appropriate mitigation strategies Participate in incident response activities, following established procedures to contain and remediate threats Analyze security data and identify trends to improve the organizations overall security posture Manage the critical vulnerability remediation process and drive rapid corrective actions AI inclusion and automation of routine security tasks to improve efficiency Stay up-to-date on the latest security threats and vulnerabilities Collaborate with other security teams and IT teams to ensure a comprehensive security posture Support ongoing security compliance, audit, and certification programs (e.g., PCI, HIPAA, SOC2) What you need to bring: 6+ years of security operations experience, preferably in cloud centric environments Demonstrate skill in identifying exploits and vulnerabilities and providing remediation efforts in network and server environments Knowledge of emerging threats and ability to stay abreast of developing threats and cyber vulnerabilities Knowledge of TCP/IP Protocols, network analysis, and network/security applications. Understanding of security within a public cloud environment (e.g., AWS, Azure OR GCP) and SaaS platforms Ability to be part of an on-call rotation and first responder to security event escalations Team player, collaboration with India and US team (mostly in PST timezone) Nice to Have: Experience with scripting languages (Python, PowerShell, etc.) Experience with public cloud security (AWS, Azure, GCP) Red/Blue team experience Security certifications (e.g., CISSP, Security+, CEH, GIAC) Who we are: It takes a special team to aim for a never-been-done-before mission like ours. We re looking for people who love working together because they know it makes us stronger, people who look to others and ask, How can I help? and then How can we make this even better? If you re ready to roll up your sleeves and help parents raise a financially smart generation, apply to join our team. Greenlight is an equal opportunity employer and will not discriminate against any employee or applicant based on age, race, color, national origin, gender, gender identity or expression, sexual orientation, religion, physical or mental disability, medical condition (including pregnancy, childbirth, or a medical condition related to pregnancy or childbirth), genetic information, marital status, veteran status, or any other characteristic protected by federal, state or local law. Greenlight is committed to an inclusive work environment and interview experience. If you require reasonable accommodations to participate in our hiring process, please reach out to your recruiter directly or email recruiting@greenlight.me .

Posted 1 week ago

Apply

6.0 - 9.0 years

8 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Mandatory Skills: 6 - 9 years of working experience as a Software Engineer Technical Skills: AWS (40% Focus): Several years (at least 3) of hands-on experience in developing and utilizing various AWS services, with a strong emphasis on Infrastructure as Code (IaC). Backend (40% Focus): Several years (at least 3) of strong programming experience in Java 17+ and the Spring/Spring Boot ecosystem. Proficiency in SQL. Experience with DevOps practices, covering the entire operation lifecycle including incident management and vulnerability handling, beyond just CI/CD pipelines. Experience with Terraform for infrastructure provisioning. Experience with containerization and orchestration using AWS ECS and Fargate. Familiarity with message queuing systems like Kafka. Experience with search and analytics platforms like Elastic Search and Splunk. Proficient in using Docker for containerization. Experience with version control systems, specifically Git and GitLab. Familiarity with code quality and static analysis tools such as SonarQube. Experience with issue tracking and collaboration tools like JIRA and Confluence. Frontend (20% Focus): Experience with Angular 15+ and Node. js. Responsibilities: Develop and operate the existing system landscape, ensuring its maintainability, reliability, and scalability. Actively participate in all Scrum and SAFe team events, contributing to planning, execution, and continuous improvement. Contribute to all phases of the software development lifecycle, from concept and design to testing and deployment. Write clean, well-documented, and high-quality code, adhering to clean code principles. Participate in pair programming and conduct thorough code reviews to ensure code quality and knowledge sharing. Take ownership and responsibility for assigned tasks and contribute proactively to the teams success. Contribute to and participate in load and performance testing efforts. Integrate security best practices throughout the development lifecycle (DevSecOps). Leverage your experience to contribute to potential future cloud migration efforts. . Mandatory certification (if Any): Good to have skills: AWS certifications

Posted 1 week ago

Apply

3.0 - 7.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

Experience : 3 to 7 years Required Skills : Experience with Data Transfer tools and methods, including the ability to create and process Experience with certificate management/ application License management Experience with server patching and maintenance, vulnerability remediation, Server Monitoring/ system diagnostic tools/ maintenance reports (Rapid7, Brinqa) Experience with File server management Experience of Active Directory & DNS management Extensive knowledge of AWS Services: Including but not limited to VPC, EC2, EMR, S3, Fargate, Load balancers. EFX, EBS, AWS workspaces The Ability to Install and configure the software in accordance with installation procedures, organizational guidelines and plans. System configuration, default user settings, etc. Experience with the following is a plus: GlobalScape NDM (including Secure+) AWS S3/ AWS CLI GCP Azure Blob WinSCP/Putty Responsibilities : Experience with managing server access requests/ system accounts/ password management Experience managing Instance/EBS snapshots Experience with server decommissions Experience with change control processes (presenting use cases, changes, testing, approvals, etc.) Experience with setup and configuration of user tools (Dbeaver, Excel Macro functionality, Vedit, etc.) and troubleshooting. Apply for this position Alternatively, you may email your resume to Full Name * Email * Phone * Cover Letter * Upload CV/Resume * Drop files here or click to upload Drop files here or click to upload Maximum allowed file size is 128 MB. Allowed Type(s): .pdf, .doc, .docx By using this form you agree with the storage and handling of your data by this website. *

Posted 2 weeks ago

Apply

3.0 - 8.0 years

5 - 10 Lacs

Bengaluru

Work from Office

Naukri logo

The Security Testing teams mission is to partner with Atlassian internal teams globally to provide innovative and holistic security testing to secure Atlassian products, platforms and customers. This role supports Atlassian s security team, Engineers and Customers by performing high quality penetration testing on our software, platforms and services. This role supports Atlassian s security team, Engineers and Customers by providing world class technical assurance of our software, platforms and services through high quality manual penetration testing and code review. Working at Atlassian Atlassians can choose where they work - whether in an office, from home, or a combination of the two. That way, Atlassians have more control over supporting their family, personal goals, and other priorities. We can hire people in any country where we have a legal entity. Interviews and onboarding are conducted virtually, a part of being a distributed-first company. ","responsibilities":" You will support others in technically validating the state of Atlassian s technical security controls, working closely with both our security and engineering teams. You enjoy vulnerability hunting and get excited when you find vulnerabilities that typical automated toolsets can t. You must have a strong ability to work with colleagues to understand our products and then come up with ways to strengthen security. Since we work closely with our product engineering teams, the ability to read and understand code is very important. Our products are built using a number of different languages but Java, Go, and Python are the most common. ","qualifications":" On your first day, well expect you to have: 3+ years working in a penetration testing/appsec/manual code review role Strong understanding of web application security Experience in cloud security architecture and infrastructure Experience coding in Java, Python, or Go, and at least one scripting language An ability to reason about security decisions Experience leading projects from start to finish and mentoring other security practitioners Strong collaboration and communication skills when working with closely with deeply technical development and infrastructure teams Its great, but not required, if you have: Submitted bug bounty reports to third party companies Published contributions to the security community Certifications: OSCP, OSCE, OSWE, CREST CRT, GPEN CVE s to your name Presentation experience at industry events Developed security tools Experience working with compliance, privacy, IT, networking or related functions Benefits & Perks Atlassian offers a wide range of perks and benefits designed to support you, your family and to help you engage with your local community. Our offerings include health and wellbeing resources, paid volunteer days, and so much more. To learn more, visit

Posted 2 weeks ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

About Netskope Since 2012, we have built the market-leading cloud security company and an award-winning culture powered by hundreds of employees spread across offices in Santa Clara, St. Louis, Bangalore, London, Paris, Melbourne, Taipei, and Tokyo. Our core values are openness, honesty, and transparency, and we purposely developed our open desk layouts and large meeting spaces to support and promote partnerships, collaboration, and teamwork. From catered lunches and office celebrations to employee recognition events and social professional groups such as the Awesome Women of Netskope (AWON), we strive to keep work fun, supportive and interactive. Visit us at Netskope Careers. Please follow us on LinkedIn and Twitter @Netskope . About the position Netskope is looking for an analyst on the Threat and Vulnerability Management team. This position will focus on the identification and proactive mitigation of Netskope s attack surface, threat landscape, security gaps , and cyber threats which could impact the business. In addition, this role will be responsible for performing the vulnerability management function such as finding, reporting, and supporting business units in their vulnerability remediation efforts. Roles & Responsibilities Continuous development and execution of the enterprise Threat and Vulnerability Management strategic plan to identify and reduce vulnerable attack surfaces Perform complex analysis to understand emerging threats, and continuously demonstrates awareness of current threat posture Reviews emerging and existing threat methodologies and exploit code / proof of concept code to develop mitigations, prioritize risks and navigating sources for identification of vulnerable assets. Execute on core team functions such as scanning, reporting, custom checks, asset tagging, as well as incorporating threat intelligence into vulnerability checks Automate security tasks using scripting languages such as python. Maintain and contribute to the threat models understanding emerging/existing threats and countermeasures to them. Partners with internal teams to lead, develop, test, and continuously validate detection signatures for various attacks Provide internal teams with hardening guidance and develop tooling for auditing Support teams by being a Remediation Champion giving them guidance on various strategies to remediate a vulnerability and supporting them in their testing and validation efforts. Provides expertise in incident response activities. Teach and understand CVSS, CVE, and additional vulnerability ratings and methodologies Qualifications/Requirements Experience 2 to 5 Yrs in Security Should possess relevant university degree and/or professional qualifications/certification (e.g. CEH, OSCP) Must have knowledge with tools Tenable, Qualys, NMAP, SCAPY, and other tools. Must have the ability to understand hardening guidelines for new technologies and applications being adopted by Netskope. Understanding of containerization and containerized applications, their security weaknesses and how to secure them Must have an understanding of patch automation, security orchestration, and management tooling for on premise, private cloud, and cloud infrastructure. Knowledge of OWASP Web and Mobile Top 10 vulnerabilities and identifying them. Knowledge of TCP/IP and other application and network level protocols. Knowledge of Cloud Applications like AWS, Azure and other SAAS Applications. Excellent written and verbal communication skills. Self-motivated, curious, knowledgeable pertaining to news and current events. Ability to be effective in a remote global work environment. #LI-RS1

Posted 2 weeks ago

Apply

0.0 - 7.0 years

2 - 5 Lacs

Hyderabad

Work from Office

Naukri logo

Career Category Information Systems Job Description Join Amgen s Mission of Serving Patients At Amgen, if you feel like you re part of something bigger, it s because you are. Our shared mission to serve patients living with serious illnesses drives all that we do. Since 1980, we ve helped pioneer the world of biotech in our fight against the world s toughest diseases. With our focus on four therapeutic areas -Oncology, Inflammation, General Medicine, and Rare Disease- we reach millions of patients each year. As a member of the Amgen team, you ll help make a lasting impact on the lives of patients as we research, manufacture, and deliver innovative medicines to help people live longer, fuller happier lives. Our award-winning culture is collaborative, innovative, and science based. If you have a passion for challenges and the opportunities that lay within them, you ll thrive as part of the Amgen team. Join us and transform the lives of patients while transforming your career. What you will do Let s do this. Let s change the world. In this vital role you will play a crucial role in ensuring the security and integrity of the companys information systems. You will develop and implement security measures, conduct vulnerability assessments, monitor network traffic, and respond to security incidents. Your expertise in security protocols, threat detection, and incident response will contribute to safeguarding the companys data and systems from potential cyber threats. Roles & Responsibilities: Manage Amgens single sign-on platforms like Okta and Microsoft Entra ID, oversee multifactor authentication services, and support the B2B environment for external partners. Engage in enterprise projects, including migrating on-premises Access services to the SaaS solutions. Monitor system performance and operational metrics, carry out preventative maintenance tasks, and automate regular procedures. Take responsibility and ownership for completing system owner assigned tasks and addressing compliance-related requests. Develop and update technical documentation, including standard operating procedures (SOPs), design documents, operational diagrams, manuals, and more. Perform regular hardware and software audits on servers and applications to verify they adhere to established standards, policies, and configuration guidelines. What we expect of you We are all different, yet we all use our unique contributions to serve patients. Basic Qualifications: Master s or Bachelor s degree and 0- 3 years of Information Systems experience or related field OR Diploma degree and 4 - 7 years of Information Systems experience or related field. Preferred Qualifications: Must-Have Skills: Ability to analyze and interpret complex data to identify and remediate issues. Experience supporting Identity Provisioning platforms. Sharp learning agility, problem-solving and analytical thinking . Good-to-Have Skills: Experience with IS Security. Proficiency in scripting and automation is a plus. Professional Certifications. Microsoft, GCP or AWS Cloud (preferred). Identity Provisioning or Security Certification (preferred). Okta, Ping Identity or Microsoft Azure (preferred). Soft Skills: Excellent analytical and troubleshooting skills. Strong verbal and written communication skills. Ability to work effectively with global, virtual teams . High degree of initiative and self-motivation. Ability to manage multiple priorities successfully. Team oriented, with a focus on achieving team goals. What you can expect of us As we work to develop treatments that take care of others, we also work to care for your professional and personal growth and well-being. From our competitive benefits to our collaborative culture, we ll support your journey every step of the way. In addition to the base salary, Amgen offers competitive and comprehensive Total Rewards Plans that are aligned with local industry standards. Apply now and make a lasting impact with the Amgen team. careers. amgen. com As an organization dedicated to improving the quality of life for people around the world, Amgen fosters an inclusive environment of diverse, ethical, committed and highly accomplished people who respect each other and live the Amgen values to continue advancing science to serve patients. Together, we compete in the fight against serious disease. Amgen is an Equal Opportunity employer and will consider all qualified applicants for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, protected veteran status, disability status, or any other basis protected by applicable law. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. .

Posted 2 weeks ago

Apply

15.0 - 20.0 years

1 - 4 Lacs

Gurugram

Work from Office

Naukri logo

Job Title: Sr Manager CSSU Admin activities Audit Experience : 10 ~ 15 Year(s) Age Limit Educational Qualification: B.E / B. Tech Job Role Responsibilities Role: Monitoring and managing all the audit and administrative procedures under cyber security for working and compliance. Responsibilities: Project Coordination: Manage and coordinate cybersecurity projects, including resource allocation, timeline management, and budget control. Collaborate with cross-functional teams (SMC,ENGG, IT, Supply Chain, Homologation, Suppliers etc.) to ensure project alignment and successful execution. Oversee the implementation of cybersecurity measures and controls. Control and liasioning with consultants. Reporting and Communication: Prepare detailed and informative reports on audit findings, risk assessments, and project progress. Communicate effectively with stakeholders at various levels, including technical and non-technical audiences. Provide recommendations for cybersecurity improvements and enhancements. Project Management: Proven project management skills, including planning, execution, and monitoring. Experience with project management methodologies (e.g., Agile, Waterfall). Ability to manage multiple projects simultaneously and prioritize tasks effectively. User Training and Awareness: Develop and deliver cybersecurity function and awareness training programs for concern areas. Information Management: Maintain comprehensive documentation of cybersecurity process, procedure, and evidence. Ensure compliance with document requirement for audit and certification. Cybersecurity Audit and Assessment: Develop and execute comprehensive cybersecurity audit plans for vehicle systems and components. Conduct vulnerability assessments, penetration testing, and risk assessments. Identify and evaluate cybersecurity risks and threats. Develop mitigation strategies and action plans to address identified vulnerabilities. Competency Requirements Technical/ Functional: Strong analytical abilities and knowledge of cybersecurity principles are essential. Should have experience in inter-division coordination activities. Must be aware of work areas of various verticals and business areas companywide. Some prior experience related to Audit procedures preferable. Understanding of cybersecurity principles, standards, and best practices. Basic Knowledge of automotive cybersecurity standards (e.g., ISO/SAE 21434, UNR 155/156, AIS 189/190). Experience with cybersecurity frameworks Basic knowledge of IT area of MSIL is needed. Behavioral: Ability to manage teams with diverse projects. Monitor latest industrial trends (global and national) and utilize them in innovative ways in respective areas of work. Ability to effectively plan and coordinate interactive activities with various participants. Must possess good interpersonal, communication and presentation skills.

Posted 2 weeks ago

Apply

4.0 - 5.0 years

5 - 9 Lacs

Kochi, Chennai, Thiruvananthapuram

Work from Office

Naukri logo

4 5 years in vulnerability management or cybersecurity research JobDetail - PIT Solutions PIT Solutions Pvt Ltd Thejaswini Technopark Trivandrum, Kerala Indien Brigade World Trade Center Infopark, Kochi, Kerala Indien Senior Vulnerability Database Analyst Technopark (Trivandrum) und Infopark (Kochi) About the Role We are looking for a cybersecurity-focused, detail-driven Senior Vulnerability Database Analyst to support a global client s vulnerability intelligence operations. In this role, you will be responsible for maintaining the integrity, accuracy, and relevance of a high-impact vulnerability database. You will collaborate with cybersecurity researchers, vendors, and internal teams to classify, validate, and manage vulnerability data in alignment with industry standards such as CVE and NVD. Your contributions will directly support threat detection, mitigation planning, and responsible vulnerability disclosure on a global scale. Key Responsibilities Review and validate incoming vulnerability reports for accuracy, completeness, and contextual relevance. Maintain and enhance the vulnerability database by documenting key details, impact assessments, mitigation strategies, and severity levels. Collaborate with global researchers, vendors, and disclosure bodies to ensure ethical and responsible reporting. Analyze vulnerabilities using CVE standards and contribute to classification workflows. Monitor Indicators of Compromise (IOCs), exploit trends, and emerging threat vectors. Leverage automation and scripting (e.g., Python, Bash) for data validation and enrichment tasks. Produce clear and concise documentation, including summary reports and technical bulletins. Ensure compliance with cybersecurity frameworks and responsible handling of sensitive information. Required Skills Experience Solid foundation in cybersecurity principles, vulnerability lifecycle management, and threat intelligence. Working knowledge of global vulnerability repositories like the National Vulnerability Database (NVD) and the Common Vulnerabilities and Exposures (CVE) system. Proficiency in scripting languages (Python/Bash) to automate analytical workflows and data integrity checks. Strong analytical mindset with the ability to interpret complex exploit mechanics and risk severity. Effective communicator able to liaise with both technical and non-technical stakeholders. Experience with structured databases, version control systems, and cybersecurity toolkits. Preferred Skills Qualifications 4 5 years of hands-on experience in vulnerability research, security operations, or cyber threat analysis. Professional certifications such as CompTIA Security+, Certified Ethical Hacker (CEH), or equivalent. Background in ethical hacking, penetration testing, or security tool development. Familiarity with disclosure norms, vulnerability scoring systems (CVSS), and compliance frameworks (e.g., NIST, ISO/IEC 27001). Experience with automating cybersecurity workflows using open-source or commercial tools. Soft Skills Precision-oriented mindset with a passion for accuracy and quality. Collaborative approach, with the ability to work cross-functionally in a global and multicultural team. Ethical, discreet, and trustworthy in managing sensitive cybersecurity information. Curious and self-motivated to stay updated on emerging exploits and cyber threats. Senior Vulnerability Database Analyst Personal Details Geburtsdatum (dd/mm/yyyy) Titel h chster Schulabschluss Dateien ausw hlen oder hier reinziehen Die maximal zul ssige Gr sse betr gt 12 MB und die zul ssigen Formate sind .txt,.doc,.docx,.pdf,.odt und.rtf Wie sind Sie auf uns aufmerksam geworden(optional) Ich akzeptiere die elektronische Speicherung meiner Daten gem ss der Datenschutzerkl rung Recaptcha requires verification. Nach oben scrollen Funktionell Diese Cookies sind immer aktiviert, da sie f r Grundfunktionen der Website erforderlich sind. Hierzu z hlen Cookies, mit denen gespeichert werden kann, wo auf der Seite du dich bewegst w hrend eines Besuchs oder, falls du es m chtest, auch von einem Besuch zum n chsten. Au erdem tragen sie zur sicheren und vorschriftsm igen Nutzung der Seite bei. Soziale Medien und Werbung Cookies von sozialen Medien erm glichen es dir, dich mit deinen sozialen Netzwerken zu verbinden und Inhalte unserer Website ber soziale Medien zu teilen. Werbecookies (von Drittparteien) erfassen Informationen, mithilfe derer Werbung besser an deine Interessen angepasst wird, sowohl auf Nike Websites als auch au erhalb von diesen. In manchen F llen ist hierf r die Verarbeitung deiner pers nlichen Daten erforderlich. Das Deaktivieren dieser Cookies kann zur Anzeige von Werbung f hren, die f r dich weniger interessant ist. Auch der problemlose Austausch mit Facebook, Twitter oder anderen sozialen Netzwerken sowie das Teilen von Inhalten auf sozialen Medien kann beeintr chtigt werden. Du kannst deine Einstellungen jederzeit unter "Cookie-Einstellungen" unten auf der Seite ndern.

Posted 2 weeks ago

Apply

1.0 - 3.0 years

2 - 6 Lacs

Bengaluru

Work from Office

Naukri logo

Calix is hiring Security Researcher to join their Threat Intelligence team in Bangalore. The successful candidates will lead efforts in identifying, analyzing, and mitigating network threats. Develop and implement advanced threat detection and prevention strategies. Additionally, they will enhance threat detection capabilities through various research activities. Key Responsibilities: Write, test, and optimize IPS signatures using the companys proprietary signature language and detection engine to identify network-based intrusions and malicious activities. Learn and master the proprietary signature syntax, functions, and capabilities to develop effective detection rules across various protocols and attack vectors. Analyze network traffic patterns and packet captures to create custom signatures tailored to the proprietary IPS platforms unique detection capabilities. Collaborate with engineering teams to understand platform-specific limitations and optimize signature performance within the proprietary engine environment. Support and contribute to internal automation processes designed to streamline threat detection activities and signature deployment workflows. Work closely with senior researchers and team leads to learn advanced detection methodologies and complex signature development techniques. Capture, analyze, and process indicators of compromise from diverse third-party threat intelligence sources and internal security tools. Monitor security advisories and vulnerability disclosures to identify new detection opportunities within the proprietary platform framework. Document research findings and contribute to knowledge sharing initiatives that benefit the broader security research team. Gain hands-on experience with complex detection capabilities by shadowing senior team members during high-priority investigations and research projects. Develop expertise in the proprietary platform through guided learning sessions and practical application under senior supervision. Qualifications: Bachelors/Masters degree in Computer Science, Electrical Engineering, Cyber Security or a related field. 1-3 years of experience in cybersecurity, network security, or threat detection roles. Understanding of core network concepts including TCP/IP, protocols, routing, and traffic analysis. Familiarity with network security tools, IDS/IPS, and malware prevention/monitoring solutions. Working experience on signature writing and threat detection technologies. Working Knowledge of both Windows and Linux based operating systems. Basic scripting capabilities in Python or similar languages for automation and data processing tasks. Must thrive within a team environment as well as on an individual basis. Natural curiosity and willingness to learn in a fast-paced, ever-changing threat landscape. A passion for cybersecurity, continuous improvement, and staying current on threat trend.

Posted 2 weeks ago

Apply

7.0 - 9.0 years

7 - 11 Lacs

Thiruvananthapuram

Work from Office

Naukri logo

Job Title: Specialist I - Information Security | Vulnerability Management - Subject Matter Expert (SME) Location:, Hyderabad , Chennai , Bangalore , Trivandrum , Cochin Experience: 7-9 years Company: CyberProof, A UST Company About CyberProof CyberProof is a leading cyber security services and platform company dedicated to helping customers react faster and smarter to security threats. We enable enterprises to create and maintain secure digital ecosystems through automation, threat detection, and rapid incident response. As part of the UST family, we are trusted by some of the world s largest enterprises. Our Security Operations Group is composed of a global team of highly skilled cyber security professionals, with our tier 3-4 expertise rooted in Israeli Intelligence. Job Summary: We are seeking a highly experienced and knowledgeable Subject Matter Expert (SME) to join our Vulnerability Management team. The ideal candidate will possess deep expertise in cybersecurity, particularly in vulnerability management processes, tools, and best practices. This role demands strong analytical skills, excellent communication, and a proactive approach to security risk mitigation. Key Responsibilities: Lead and manage the vulnerability management program end-to-end. Conduct vulnerability assessments and penetration testing. Use tools like Qualys VMDR, MS Defender, and CrowdStrike to detect, analyze, and report vulnerabilities. Create dashboards and detailed reports with actionable recommendations. Prioritize vulnerabilities based on business risk and exploitability. Collaborate with technical teams for remediation planning and execution. Stay current with emerging threats, trends, and technologies. Deliver training on vulnerability management processes and tools. Support incident response efforts with expertise in vulnerability exploitation and mitigation. Ensure compliance with security frameworks and regulatory standards.

Posted 2 weeks ago

Apply

2.0 - 7.0 years

8 - 12 Lacs

Gurugram

Work from Office

Naukri logo

Role: Monitoring and managing all the audit and administrative procedures under cyber security for working and compliance. Responsibilities: Project Coordination: Manage and coordinate cybersecurity projects, including resource allocation, timeline management, and budget control. Collaborate with cross-functional teams (SMC,ENGG, IT, Supply Chain, Homologation, Suppliers etc.) to ensure project alignment and successful execution. Oversee the implementation of cybersecurity measures and controls. Control and liasioning with consultants. Reporting and Communication: Prepare detailed and informative reports on audit findings, risk assessments, and project progress. Communicate effectively with stakeholders at various levels, including technical and non-technical audiences. Provide recommendations for cybersecurity improvements and enhancements. Project Management: Proven project management skills, including planning, execution, and monitoring. Experience with project management methodologies (e.g., Agile, Waterfall). Ability to manage multiple projects simultaneously and prioritize tasks effectively. User Training and Awareness: Develop and deliver cybersecurity function and awareness training programs for concern areas. Information Management: Maintain comprehensive documentation of cybersecurity process, procedure, and evidence. Ensure compliance with document requirement for audit and certification. Cybersecurity Audit and Assessment: Develop and execute comprehensive cybersecurity audit plans for vehicle systems and components. Conduct vulnerability assessments, penetration testing, and risk assessments. Identify and evaluate cybersecurity risks and threats. Develop mitigation strategies and action plans to address identified vulnerabilities. Technical/ Functional: Strong analytical abilities and knowledge of cybersecurity principles are essential. Should have experience in inter-division coordination activities. Must be aware of work areas of various verticals and business areas companywide. Some prior experience related to Audit procedures preferable. Understanding of cybersecurity principles, standards, and best practices. Basic Knowledge of automotive cybersecurity standards (e.g., ISO/SAE 21434, UNR 155/156, AIS 189/190). Experience with cybersecurity frameworks Basic knowledge of IT area of MSIL is needed.

Posted 2 weeks ago

Apply

3.0 - 7.0 years

5 - 9 Lacs

Chennai

Work from Office

Naukri logo

Task Description: Vulnerability Mgmt Support & maintain the vulnerability detection & mitigation best practice Apply threat & VM program to information security practices & develop its maturity Participate in incident response triage & proactive analysis in information security related vulnerabilities detection & mitigation in the network, systems and/or application; Analyse vulnerability feeds & support the CDC operations with IOC/IOA based on vendor advisories , security alerts & threat trending; Provide analysis & apply CVSS scoring mechanism, that associated to all related vectors/strings of vulnerabilities; Detect, analyze, & acknowledged CDC operation & EDR team for latest threats/detection signature & creation of use cases that able to monitor or drop related vulnerability exploitations; Provide regular updates to the stakeholders on security assessment reports with detailed security issues & recommend workarounds; Regular tracking & maintain the vulnerability process cycle to ensure timely closure of all vulnerability findings ; Actively investigate the latest in security vulnerabilities, vendor advisories, security incidents, & penetration techniques & notify stakeholders when appropriate; Provide support & participate, in ongoing & future projects of VM . Provide security assessment & consultation o

Posted 2 weeks ago

Apply

4.0 - 8.0 years

7 - 12 Lacs

Mumbai

Work from Office

Naukri logo

Jr. Network Engineer Managing and prioritizing assigned tasks collaborating with team members when needed - business projects, change controls, documentation, and vulnerability remediation, etc. Enhance and maintain network environments performing routine tasks - e.g. Firewall policy changes Upkeep of IPAM and network diagrams Network monitoring and resiliency Software/Firmware Updates Contribute to documentation by writing and updating existing documents and diagrams. Provide network architecture recommendations and best practices. Supporting escalated tickets from Service Desk Team Research & advise on new technologies and practices. Support Fortigate systems, Manage ACL, centralized logging for firewalls Support for Configuration based, version based, policy based issues Configure new, updating firmware, policy changes Infra team manages all issues related to this through proactive monitoring and use it Log in to the switch and managing it (E.g. Configure new, updating firmware, policy changes) Networking, including vnets, private networking, and private endpoints in Azure Ability to work with Hybrid-networking scenarios with on-prem to Azure connectivity, VPN Gateways Qualifications 3+ years of hands-on experience with Fortinet Product 3+ years of hands-on experience with Cisco/Juniper 3+ years of experience with Azure/AWS/Google Cloud NetworkingBachelor s Degree Qualifications Bachelor

Posted 2 weeks ago

Apply

0.0 - 6.0 years

9 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

Your seniority as a security engineer puts you in the ranks of the top talent in your field. Play a critical role at one of the worlds most iconic financial institutions where security is vital. As a Security Engineer III at JPMorgan Chase within Cyber Technology & Controls, you serve as a seasoned member of a team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and malicious behavior. Carry out critical technology solutions with tamper-proof, audit defensible methods across multiple technical areas within various business functions in support of the firm s business objectives Job responsibilities Executes security solutions design, development, and technical troubleshooting with the ability to apply knowledge of existing security solutions to satisfy security requirements for internal clients (e.g., product, platform, application owners) Creates secure and high-quality production code and maintains algorithms that run synchronously with appropriate systems Applies specialized tools (e.g., vulnerability scanner) to analyze and correlate incident data to identify, interpret, and summarize the probability and impact of threats when determining specific vulnerabilities Leads delivery of continuity-related awareness, training, educational activities, and exercises Adds to team culture of diversity, equity, inclusion, and respect Required qualifications, capabilities, and skills Formal training or certification on security engineering concepts and 3+ years applied experience Experience developing security engineering solutions Proficient in coding in one of more languages such as Java and C#. Experience in Networking eg, load balancers, various protocols, proxy. Understanding of the Software Development Life Cycle Understanding of agile methodologies such as CI/CD, application resiliency, and security Preferred qualifications, capabilities, and skills Familiar in developing scalable and highly available applications. Familiar with public cloud , preferably AWS

Posted 2 weeks ago

Apply

5.0 - 10.0 years

5 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Senior Cybersecurity Supervisor The Senior Cybersecurity Supervisor will be responsible for delivering services to assess and evaluate the security posture of a variety of Honeywell Products and partner technologies. This role will be responsible for security services delivery, which may include use of application / network / firmware / hardware security toolsets, detection of security defects, and remediation consultation of those weaknesses. Our services support the identification of potential attack techniques and serve as the foundation for continuously improving the product development lifecycle. You will provide leadership for a team of Product Security Assurance Engineers. This position will also work with other business stakeholders to ensure testing techniques are developed in accordance with asset risk and business functionality and will play a key role in ensuring appropriate remediation activities are completed as planned. RESPONSIBILITIES Leadership role with Product Security Assurance Team Direct staff and team leaders Provide mentorship, expertise and direction to junior security assurance and product team members Interview and hire qualified candidates Conduct meaningful performance reviews Champion strategic Product Security initiatives Create development plans Track skillsets and approve training requests Proactively anticipate escalations and track issues/conduct root cause analysis assessments Lead initiatives to engineer better solutions Ensure accountability for the development, maintenance and improvement of Security Testing across all SBGs Assist in the development of modular, repeatable, effective Security Testing processes Partner with Tools and Technology Team to select, implement, develop, and automate testing with appropriate tools. Continuously monitors levels of service and interprets and prioritizes threats based on test results Provide briefings to Product Security leadership and other executive leaders Work with cross functional teams to develop remediation suggestions YOU MUST HAVE Bachelor s degree in computer science or software engineering, electrical engineering or equivalent experience 5+ years demonstrated experience in penetration testing WE VALUE 2+ years demonstrated experience leading a team of 3 or more individual contributors Experience in security testing within the appropriate domain Experience leading security test programs at a Fortune 100 corporation Relevant Security certifications Public speaking at Technical Conferences 2+ years of application development Familiarity with reverse engineering tools, debuggers, and dynamic analysis techniques. Understanding of application protocols, development, and common attack vectors. Published vulnerability research Good cybersecurity capabilities and strong software engineering skills Excellent understanding of security by design principles and architecture level security concepts Experience and knowledge of penetration testing methodologies and tools Up to date knowledge of current and emerging security threats and techniques for exploiting security vulnerabilities Demonstrated project management skills. Effective oral and written communication skills Excellent interpersonal skills

Posted 2 weeks ago

Apply

6.0 - 11.0 years

8 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Innovate to solve the worlds most important challenges The future is what you make it. When you join Honeywell, you become a member of our global team of thinkers, innovators, dreamers, and doers who make the things that make the future. That means changing the way we fly, fueling jets in an eco-friendly way, keeping buildings smart and safe and even making it possible to breathe on Mars. Working at Honeywell isn t just about developing cool things. That s why all our employees enjoy access to dynamic career opportunities across different fields and industries. Are you ready to help us make the future? The Honeywell Global Security (HGS) business believes in integrating security into all aspects of our business to protect the people, processes, and assets by which Honeywell achieves its greater mission. In the role of Sr Advanced Cyber Security Architect, you will join a growing central Product Security organization providing expertise in secure software, requirements, and architecture throughout all phases of the product lifecycle. The role will report to the Director of Cyber Security and will drive security baselines, processes, solutions, and risk reduction across a growing line of core product. This role will have the unique distinction of being a part of a highly cross functional security team, creating new strategies, policies and processes, and centrally touching every end of Honeywell s offerings, product lifecycle, and business lifecycle. This role will additionally interact regularly with Suppliers and industry partners, to keep up with an ever-evolving threat landscape. Key Responsibilities: Lead efforts with the development teams to manage product risk and apply the appropriate security controls Provide product security related coaching and security expertise for all software and firmware development teams Drive best in class security requirements into product and service offerings Lead and coordinate cross-functional activities for Supplier Cyber Assessments Lead new project deployments and initiatives that add value to SDL processes and procedures Lead efforts of mentoring and training the engineering development community and facilitate adoption of shift-security-to-left practice As a member of the architecture leadership team, you will understand and influence the development of services and offerings by ensuring security by design of the cloud, as well as on-premises solutions. Ensure data security requirements are understood and implemented in accordance with applicable country laws and regulations Partner with development teams and Suppliers across business and product lines to drive security requirements, practices, and complete thorough security reviews of products Drive secure engagement and architecture including threat modeling, vulnerability and risk assessment, analysis of findings from penetration tests, and tools (e.g., SAST, SCA, Container vulnerability scans) Drive incident response investigation, ensure coordination for remediation plan and execution Mentor and coach engineering and security architects in secure SDLC practices, train and engage security advocates Represent Honeywell in consortia, contributing to creation and refinement of tomorrow s industry standards and best practices You must have: 6+ years of experience in security engineering Secure software development lifecycle (SSDLC) experience Understanding of security by design principles We value: Experience with Cloud Provider (e.g., Azure, AWS, GCP) security architecture and controls Experience with Threat Modeling Experience with security tools (e.g., SAST, SCA, vulnerability scanning, penetration testing) Understanding of Agile software development practices Experience with SaaS, cloud, IOT, and OT security and controls Understanding of DevOps (CI/CD) Sound understanding of Cryptography, encryption algorithms, Public Key Infrastructure (PKI), Secure boot and Open-source risk management Up to date knowledge of current and emerging security threats and techniques for exploiting security weaknesses Certifications in security demonstrating deep practical knowledge such as CSSLP, CCSP, or CISSP Strong interpersonal skills with the ability to facilitate diverse groups, help negotiate priorities, and resolve conflicts among partners Experience working with external partners Experience with definition, creation, integration, and monitoring of metrics Passion for achieving results and continual self-improvement Master s Degree

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies