2462 Vulnerability Management Jobs - Page 24

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

8.0 - 12.0 years

0 Lacs

karnataka

On-site

As a Product Security Specialist at Hitachi Energy, your role revolves around establishing an Enterprise Approach to Product Risk Management. You will be responsible for the following key responsibilities: - Review the current state of Product Risk generated by security control testing and vulnerability management activities. - Provide technical tool integration and architect guidance for product cybersecurity vulnerability identification, remediation, and response to the business and Enterprise Risk Management reporting. - Lead the development of innovative solutions and drive the implementation of new tools and technologies related to Product risk management. - Report activities that meet ...

Posted 1 month ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

surat, gujarat

On-site

As a Cloud Security Engineer at Gainserv Infotech Pvt Ltd, you will play a crucial role in designing, implementing, and maintaining secure cloud infrastructure and applications. Your expertise in cloud platforms such as AWS and Azure, along with a strong understanding of security best practices, will be essential in ensuring a safe and efficient environment. Some key responsibilities include: - Network switches & wireless APs configuration & maintenance - Managing Network Firewall settings like NAT, Access rules, Policy, DPI SSL, IDS/IPS, VPN, etc - Configuring & Managing Azure infrastructure - Configuration & Management of AWS S3 bucket - Setting up active monitoring for Network equipment -...

Posted 1 month ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

As a Supplier Cyber Risk and Assurance Specialist at Bengaluru Luxor North Tower, your primary responsibility will be to support the supplier cyber risk and assurance processes for all business units and support functions across GSK to manage and mitigate cyber security risks introduced by third-parties. Your key responsibilities will include: - Conducting comprehensive supplier cybersecurity assessments and generating detailed reports in alignment with departmental procedures and industry best practices. - Continuously developing and enhancing the third-party risk management process framework for security risk, incorporating the latest standards, procedures, emerging technologies, and AI-dr...

Posted 1 month ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

maharashtra

On-site

As a Technical Program Manager at Hudson River Trading (HRT), you will play a crucial role in the Security team by collaborating closely with the Compliance and Legal teams. Your main responsibility will involve researching, developing, and managing security solutions to meet various industry regulations and requirements. By joining our dynamic and technical team, you will have the chance to take ownership and make strategic contributions to HRT's global cyber security systems, enabling the company to navigate complex regulatory landscapes as it expands into new markets. **Responsibilities:** - Manage programs, collaborating with cross-functional teams to achieve security and compliance Key ...

Posted 1 month ago

AI Match Score
Apply

12.0 - 16.0 years

0 Lacs

maharashtra

On-site

As an experienced Infrastructure Compliance Manager, your role will involve ensuring the bank's infrastructure meets all RBI compliance requirements and implementing security and operational controls for infrastructure systems. You will conduct regular infrastructure assessments to ensure adherence to internal security policies, industry standards, and RBI regulations. Your responsibilities will also include leading and implementing zero-day patching processes, overseeing the identification, remediation, and patching of security vulnerabilities, defining best practices for patch management, and preparing compliance reports for senior management. Key Responsibilities: - Ensure RBI compliance ...

Posted 1 month ago

AI Match Score
Apply

10.0 - 16.0 years

0 Lacs

pune, maharashtra

On-site

You are looking for a Cybersecurity Engineer to join a Leading Product Based (Medical) Company in Gurugram/Pune. With 12 - 16 years of experience, your role will involve the following responsibilities: - Leading the design, implementation, and maintenance of comprehensive security measures for medical device development. - Designing and implementing secure architectures for new medical devices, including connectivity, data protection, access controls, and communication protocols. - Conducting vulnerability assessments and penetration testing on medical devices to identify security flaws and implement corrective actions. - Ensuring compliance with medical device cybersecurity regulations and ...

Posted 1 month ago

AI Match Score
Apply

12.0 - 16.0 years

0 Lacs

karnataka

On-site

Role Overview: You will be joining the Cyber Governance, Risk & Controls (GRC) team as a Principal Information Security at FC Global Services India LLP. In this role, you will serve as a strategic partner to the US counterparts, shaping, executing, and maturing cyber risk programs. Your responsibilities will include designing and piloting cyber risk assessment programs, enhancing policy documentation, driving regulatory compliance initiatives, and conducting comprehensive cyber risk assessments. Key Responsibilities: - Design, build, and pilot a targeted cyber risk assessment program to proactively identify, measure, and address emerging risks. - Elevate the quality, clarity, and consistency...

Posted 1 month ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

As a Tidal Admin/Scheduler, you will play a crucial role in managing Tidal Admin and Scheduling with 5-7 years of experience. Your responsibilities will include: **Tidal Admin:** - Experience/Understanding of Hosting Tidal on AWS Cloud - Expertise in AWS Cloud (EC2, RDS, Load balancers, NFS, Security groups. Subnets, Networking) - Experience in Installing the Tidal Master on Unix - Experience in Installing the Tidal Client Manger on Unix - Experience in installing Tidal Agents on Unix and Windows - Troubleshooting the Master/Client Manager/Agents - Handling the P1/P2 priority calls - Experience/Understand of running the SQL Queries - Experience in using SSL for Client Manager - Experience in...

Posted 1 month ago

AI Match Score
Apply

6.0 - 10.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Director, Security at Banyan Software, your role is crucial in overseeing cybersecurity operations at HQ and providing advisory services to Banyan's 95+ OpCos worldwide. You will collaborate with a global team of security experts to ensure consistent risk management, scalable frameworks, and portfolio-wide visibility. **Key Responsibilities:** - **Core Security Functions (HQ Ownership)** - Oversee IAM strategy and operations including Okta SSO, MFA, conditional access, and lifecycle governance. - Ensure managed devices meet zero-trust standards through EDR/XDR, encryption, and patching. - Manage logging, SIEM/MDR integration, and threat detection for HQ systems. - Establish scanning, re...

Posted 1 month ago

AI Match Score
Apply

2.0 - 6.0 years

0 Lacs

maharashtra

On-site

Role Overview: As a Technical Support Specialist in Email Security, your primary responsibility will be to provide customer support through calls, emails, and remote sessions. Your aim should be to achieve 100% customer satisfaction by delivering efficient support services. You will be expected to have a good understanding of email systems, DNS, and mail client configuration. Additionally, you will be managing Cisco Ironport / Cisco ESA and Symantec Message Gateway for Email Threat Prevention. Key Responsibilities: - Prevent unwanted emails using Adaptive Reputation, combat spam with Anti-Spam Policies, and tackle malware with AntiMalware Policies. - Monitor and rectify information security ...

Posted 1 month ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

hyderabad, telangana

On-site

Role Overview: You are being hired as an Engineer, IT Network for American Airlines, where you will have the opportunity to be part of a diverse and high-performing team dedicated to technical excellence. Your primary focus will be on delivering unrivaled digital products that contribute to a more reliable and profitable airline. As part of the Network Domain, you will be responsible for the design, implementation, management, and maintenance of the organization's networking infrastructure, ensuring efficient and secure data transmission. Key Responsibilities: - Write/engineer network device configuration scripts with associated change documentation to meet project goals and deadlines. - Imp...

Posted 1 month ago

AI Match Score
Apply

7.0 - 14.0 years

0 Lacs

kerala

On-site

As a Manager in the Cloud Security and Risk Assessment team at EY, you will have the fantastic opportunity to lead the audit and review of security architecture and controls across hybrid cloud environments. Your role will be instrumental in the growth of our service offering and contributing to a leading firm. Your responsibilities will include: - Evaluating key cloud security solutions such as CSPM, CWPP, IAM, CASB, WAF, cloud encryption services, SIEM, and security automation tools across AWS, Azure, GCP, and on-premises environments. - Assessing the implementation and operations of vulnerability management and patching programs for timely identification and remediation of vulnerabilities...

Posted 1 month ago

AI Match Score
Apply

8.0 - 14.0 years

0 Lacs

karnataka

On-site

As an Information Security Manager at our company in Bangalore, you will be responsible for overseeing and managing both cloud and product security initiatives. Your role will involve developing and implementing comprehensive security strategies, policies, standards, and procedures for cloud infrastructure and product security. You will collaborate with cross-functional teams to ensure the security of cloud-based systems and services, conduct security assessments and audits, manage security incidents, and deliver security awareness training programs for employees. Additionally, you will work closely with product development teams to integrate security best practices and lead the product secu...

Posted 1 month ago

AI Match Score
Apply

15.0 - 20.0 years

30 - 40 Lacs

chennai

Work from Office

Roles and Responsibilities Design, implement, and maintain vulnerability management solutions using various tools such as Qualys, Tenable, and Nessus. Conduct regular vulnerability assessments to identify potential risks and develop remediation plans to mitigate them. Collaborate with cross-functional teams to integrate vulnerability management into existing security frameworks and processes. Develop and maintain relationships with clients to understand their specific needs and provide tailored consulting services. Desired Candidate Profile 15-20 years of experience in IT services & consulting industry. Strong expertise in Vulnerability Assessment, Penetration Testing, Vulnerability Manageme...

Posted 1 month ago

AI Match Score
Apply

7.0 - 11.0 years

0 Lacs

karnataka

On-site

You are invited to apply for the role of Manager Threat & Vulnerability Management (TVM). As a technically skilled manager with hands-on experience in tools like Qualys and Tenable, strong IT infrastructure knowledge, and the ability to drive cross-functional collaboration for effective risk reduction across a large enterprise, your expertise is crucial in this role. Key responsibilities include: - Leading and/or participating in the vulnerability scan strategy across all environments on-prem or cloud - Infusing and leveraging relevant threat intelligence and process improvements to continually improve security outcomes - Directly handling scan operations that include appropriate scoping, pl...

Posted 1 month ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

As an IS Analyst - Vulnerability Management at the GCS IS team, you will be a key contributor in recommending physical and technical information security best practices. Your role involves collaborating with local offices and administrators to implement administrative and technical procedures for networks and applications, reporting directly to the Information Security Manager in India. **Key Responsibilities:** - Be a vital member of the GCS IS Ethical Hacking & Data Protection Team. - Conduct regular vulnerability assessments using tools like Qualys and Nessus. - Analyze scan results, prioritize vulnerabilities, and coordinate remediation efforts. - Maintain and enhance the vulnerability m...

Posted 1 month ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

maharashtra

On-site

Role Overview: Join Strategy's IT Security group as a Senior Application Security Engineer and play a crucial role in safeguarding Strategy's software applications while using modern security and AI tooling. In this position, you will be responsible for establishing innovative security practices throughout the software development lifecycle, ensuring that our software products are resilient against novel threats and vulnerabilities. Key Responsibilities: - **Security Architecture:** Design and implement application security architecture and processes, ensuring they align with industry best practices and regulatory requirements. - **Secure SDLC:** Manage a risk-balanced SDLC by integrating th...

Posted 1 month ago

AI Match Score
Apply

3.0 - 6.0 years

5 - 15 Lacs

hyderabad

Work from Office

Enterprise Information Security at Providence is responsible for appropriately protecting all information relating to its caregivers and affiliates, as well as protecting its confidential business information (including information relating to its caregivers, affiliates, and patients) What will you be responsible for? Plan, track and monitor threat intelligence research to identify new threats. Assist in the responsibility for the reviewing vulnerabilities' data from multiple sources (i.e. external / internal penetration testing, internal / external vulnerability scanning, etc.) across multiple technologies to determine risk rating of vulnerabilities to business assets. Assist in improving a...

Posted 1 month ago

AI Match Score
Apply

0.0 - 3.0 years

5 - 7 Lacs

lucknow

Work from Office

Target Defence Academy is looking for Tele - caller professionals to join our dynamic team and embark on a rewarding career journey A telecaller is a customer service representative who contacts customers over the telephone A typical job description for a telecaller includes the following responsibilities: Make outbound calls to customers to promote products and services, or follow up on recent purchases Respond to customer inquiries and provide information about products and services Resolve customer complaints and provide appropriate solutions Keep records of all customer interactions and transactions, updating customer information in a database as necessary Meet and exceed sales and custo...

Posted 1 month ago

AI Match Score
Apply

1.0 - 6.0 years

4 - 8 Lacs

bengaluru

Work from Office

Identification, assessment, and remediation of data risks. DSPM (Data Security Posture Management) tool policy definition. Classification of data elements with applied categories according to sensitivity, risk level, and applicable laws/regulations. Assessment of data risk applied guidance and recommendations. Working across organizations to gather technical and business requirements. Evaluation of controls to identify effectiveness and gaps. Working with control owners on preventative and reactive solutions. Management of data assets, including risk documentation and data inventory. Preparing, executing, and presenting reporting for leadership, examiners, and business partners. Participatin...

Posted 1 month ago

AI Match Score
Apply

2.0 - 8.0 years

6 - 10 Lacs

bengaluru

Work from Office

: Identification, assessment, and remediation of data risks. DSPM (Data Security Posture Management) tool policy definition. Classification of data elements with applied categories according to sensitivity, risk level, and applicable laws/regulations. Assessment of data risk applied guidance and recommendations. Working across organizations to gather technical and business requirements. Evaluation of controls to identify effectiveness and gaps. Working with control owners on preventative and reactive solutions. Management of data assets, including risk documentation and data inventory. Preparing, executing, and presenting reporting for leadership, examiners, and business partners. Participat...

Posted 1 month ago

AI Match Score
Apply

9.0 - 12.0 years

2 - 3 Lacs

gurugram

Work from Office

Co-ordinate with the team for data inflow for sample selection on a weekly basis Sample the cases basis the process requirement % with the team to ensure every team employee data gets monitored and validated Validate sample cases of Customer complaints that are closed based on Call Listening Samples need to be taken from- No defect cases/ Proven complaints Validate the cases from the WCP portal based on the customer complaint raised /Issues Like- Annual Fee-related Issues, Wrong Card type issues and Wrong credit limit promise to ensure every team employee data gets monitored and validated under process monitoring Validate the calls listening activity from the Aspect portal by sampling the ca...

Posted 1 month ago

AI Match Score
Apply

8.0 - 12.0 years

3 - 7 Lacs

hyderabad

Work from Office

Responsiblitities: Develop, implement, and manage robust security policies and procedures to protect the organizations information assets. Conduct risk assessments, vulnerability assessments, and security audits to identify and mitigate potential threats. Manage and oversee the companys vulnerability management program, including the identification, classification, and remediation of security vulnerabilities. Design and enforce security measures and policies for cloud computing environments, with a strong focus on AWS. Stay updated on the latest cybersecurity trends, threats, and technologies to continuously improve the organizations security posture. Collaborate with development and operati...

Posted 1 month ago

AI Match Score
Apply

5.0 - 10.0 years

7 - 10 Lacs

bengaluru

Hybrid

Notice Period: Immediate Employment Type: Contract CDE Certification must Person should be willing to work on 24/7 Support Person should be at least 4 to 5 years of Experience into CyberArk.Person must have hands on experience in below concepts Onboarding of Accounts. Offboarding of Accounts Reports generation and preparation Safe creation and access provision Platform duplication and customization. Strong problem solving skills(Password management and session management issues) Person should know about master policy and how it works. person must have knowledge on DR drill process in CyberArk environment. Person should know how to install and upgrade our CyberArk Components((EPV,PVWA,CPM,PSM...

Posted 1 month ago

AI Match Score
Apply

5.0 - 8.0 years

4 - 8 Lacs

hyderabad

Work from Office

1. Conduct vulnerability scan using Prisma's cloud vulnerability scanning features to identify vulnerabilities in cloud resources . 2. Assess and monitor security posture of Kubernetes clusters, including network policies, pod configurations and container runtime security. 3. Leverage Prisma cloud's automated vulnerability risk scoring to evaluate severity of vulnerabilities 4. Work with teams to prioritize vulnerabilities based on severity, exploitability & potential business impact. 5. Ensure organization's cloud infrastructure complies with industry standards 6. Use Prisma cloud to scan Kubernetes clusters and container registries for known vulnerabilities and misconfigurations 7. Create ...

Posted 1 month ago

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies