Home
Jobs

471 Vulnerability Management Jobs - Page 8

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 5.0 years

8 - 14 Lacs

Jaipur

Work from Office

Naukri logo

Must have skills : - 3+ years of experience focusing on operational vulnerability management work, specifically for processing vulnerabilities from Tenable in that Tenable IO and Tenable SC. - Experience in vulnerability management lifecycle, less on the scanning side, the rest for more on the life cycle, prioritization, remediation, analysis, tracking, reporting and driving through. - Emphasis on the remediation assistance process, create tickets or distributing vulnerabilities - Experience with JIRA Ticketing tool and experience in handling the Vulnerability Management process for large scale enterprises. - Shift Timings general but the candidate should be available to take calls at 5am IST scheduled across different location which includes Singapore, US and Arizona . Responsibilities : - Interpret vulnerability scan results and hand off to IT operations/product teams for remediation (primarily infrastructure vulns from Tenable; may also include container runtime or container registry vulnerabilities) - Provide remediation assistance to remediation owners (e.g technical steps to apply patches, investigate work arounds) - Track and report on overall remediation progress - Facilitation extension requests - Excellent collaboration and organization skills - Experience with Fortune 250 vulnerability management programs (large scale enterprises) - Familiarity with JIRA ticketing, JIRA dashboard creation

Posted 2 weeks ago

Apply

3.0 - 5.0 years

8 - 14 Lacs

Thane

Work from Office

Naukri logo

Must have skills : - 3+ years of experience focusing on operational vulnerability management work, specifically for processing vulnerabilities from Tenable in that Tenable IO and Tenable SC. - Experience in vulnerability management lifecycle, less on the scanning side, the rest for more on the life cycle, prioritization, remediation, analysis, tracking, reporting and driving through. - Emphasis on the remediation assistance process, create tickets or distributing vulnerabilities - Experience with JIRA Ticketing tool and experience in handling the Vulnerability Management process for large scale enterprises. - Shift Timings general but the candidate should be available to take calls at 5am IST scheduled across different location which includes Singapore, US and Arizona . Responsibilities : - Interpret vulnerability scan results and hand off to IT operations/product teams for remediation (primarily infrastructure vulns from Tenable; may also include container runtime or container registry vulnerabilities) - Provide remediation assistance to remediation owners (e.g technical steps to apply patches, investigate work arounds) - Track and report on overall remediation progress - Facilitation extension requests - Excellent collaboration and organization skills - Experience with Fortune 250 vulnerability management programs (large scale enterprises) - Familiarity with JIRA ticketing, JIRA dashboard creation

Posted 2 weeks ago

Apply

3.0 - 5.0 years

8 - 14 Lacs

Chennai

Work from Office

Naukri logo

Must have skills : - 3+ years of experience focusing on operational vulnerability management work, specifically for processing vulnerabilities from Tenable in that Tenable IO and Tenable SC. - Experience in vulnerability management lifecycle, less on the scanning side, the rest for more on the life cycle, prioritization, remediation, analysis, tracking, reporting and driving through. - Emphasis on the remediation assistance process, create tickets or distributing vulnerabilities - Experience with JIRA Ticketing tool and experience in handling the Vulnerability Management process for large scale enterprises. - Shift Timings general but the candidate should be available to take calls at 5am IST scheduled across different location which includes Singapore, US and Arizona . Responsibilities : - Interpret vulnerability scan results and hand off to IT operations/product teams for remediation (primarily infrastructure vulns from Tenable; may also include container runtime or container registry vulnerabilities) - Provide remediation assistance to remediation owners (e.g technical steps to apply patches, investigate work arounds) - Track and report on overall remediation progress - Facilitation extension requests - Excellent collaboration and organization skills - Experience with Fortune 250 vulnerability management programs (large scale enterprises) - Familiarity with JIRA ticketing, JIRA dashboard creation

Posted 2 weeks ago

Apply

5.0 - 7.0 years

7 - 10 Lacs

Pune

Remote

Naukri logo

What You'll Do Avalara is looking for Detection Engineer to join the Detection and Response Team. The ideal candidate will have a track record in incident response, demonstrating advanced technical expertise and leadership capabilities. Your role will be of an Incident Response Analyst, you will help protect Avalara. This includes detecting, investigating, and mitigating security incidents. You will also be a key contributor in improving our incident response capabilities. You will report to Security leadership at Avalara. This is a remote position. What Your Responsibilities Will Be You will perform incident response activities and workstreams as the Incident Response Senior Analyst. You will monitor security systems, including Intrusion Detection Systems (IDS), Endpoint Detection and Response (EDR) platforms, software firewalls, and Security Information and Event Management (SIEM) platforms. Gather and analyze evidence from affected systems, logs, and network traffic. You will conduct detailed investigations of security incidents to determine the root cause, scope, and impact. Document all aspects of security incidents, including timelines, actions taken, and lessons learned. Perform forensic analysis of compromised systems to identify the techniques and tactics used by attackers, or as directed by Legal. Collaborate with cross-functional teams including Engineering, IT, Security Operations, Legal, HR, and Compliance to manage and mitigate incidents. Strengthen KPIs and metrics for measuring response effectiveness and provide clear and consistent reporting to internal stakeholders. Participate in rotating On Call shifts that utilize a paging system in case a security event requires attention. What You'll Need to be Successful 5+ years experience in Security Incident Response. Experience across the information security domain, including familiarity with endpoint, email, network, cloud security, vulnerability management, incident response, and threat intelligence. Experience with log analysis, network security, digital forensics, and incident response investigations. Ability to script / code using Python or an equivalent language. Bachelor's degree in computer science, information security, or relevant experience. Certifications related to digital forensics and incident response.

Posted 2 weeks ago

Apply

9.0 - 14.0 years

16 - 20 Lacs

Bengaluru

Work from Office

Naukri logo

As a Software Architect at Nokia, you will guide the design and development of high-complexity cloud-native applications, directly influencing the future of communication services for enterprise customers. Youll work with a diverse, innovative team of developers, engineers, and security experts, fostering an environment of open communication and creative problem-solving. Your work will involve addressing complex customer difficulties, ensuring security, scalability, and performance while implementing cutting-edge technologies like Kubernetes and OpenStack. You have: Bachelor's degree with 9+ years of Core Java or C++ development experience on Telco grade products. Experience on Linux, Kubernetes, VMWare, and OpenStack. Proficiency in Cloud Native, Microservices, and Container technologies like Docker and Kubernetes (K8s). Knowledge of 4/5G signaling products and konwledge of 3GPP and RFCs. Experience with security threat assessments, SOC, Threat & Risk analysis, and vulnerability management tools. It would be nice if you also had: Familiarity with open-source PaaS environments such as OpenShift. Knowledge of hyperscale cloud capabilities Azure, AWS, GCP. Experience in design and architecture of problem solutions. Drive the design and implementation of complex cloud-native features with a focus on security, scalability, and performance. Lead architectural outcomes and create high-quality software components that align with customer needs and industry standards. Manage non-functional requirements to enhance product robustness and ensure compliance with security and quality standards. Evaluate and improve the existing codebase to achieve measurable enhancements in product behavior and reliability. Conduct security threat assessments and develop strategies to mitigate vulnerabilities within the product landscape.

Posted 2 weeks ago

Apply

7.0 - 12.0 years

16 - 20 Lacs

Pune

Work from Office

Naukri logo

Req ID: 301930 We are currently seeking a Digital Solution Architect Lead Advisor to join our team in Pune, Mahrshtra (IN-MH), India (IN). Position Overview We are seeking a highly skilled and experienced Data Solution Architect to join our dynamic team. The ideal candidate will have a strong background in designing and implementing data solutions using AWS infrastructure and a variety of core and supplementary technologies. This role requires a deep understanding of data architecture, cloud services, and the ability to drive innovative solutions to meet business needs. Key Responsibilities - Architect end-to-end data solutions using AWS services, including Lambda, SNS, S3, and EKS - Design and implement data streaming pipelines using Kafka/Confluent Kafka - Develop data processing applications using Python - Ensure data security and compliance throughout the architecture - Collaborate with cross-functional teams to understand business requirements and translate them into technical solutions - Optimize data flows for performance, cost-efficiency, and scalability - Implement data governance and quality control measures - Provide technical leadership and mentorship to development teams - Stay current with emerging technologies and industry trends Required Skills and Qualifications - Bachelor's degree in Computer Science, Engineering, or related field - 7+ years of experience in data architecture and engineering - Strong expertise in AWS cloud services, particularly Lambda, SNS, S3, and EKS - Proficiency in Kafka/Confluent Kafka and Python - Experience with Synk for security scanning and vulnerability management - Solid understanding of data streaming architectures and best practices - Strong problem-solving skills and ability to think critically - Excellent communication skills to convey complex technical concepts to both technical and non-technical stakeholders

Posted 2 weeks ago

Apply

10.0 - 20.0 years

20 - 35 Lacs

Ahmedabad

Work from Office

Naukri logo

Job Description: Strategic Leadership: Develop and execute the organization's cybersecurity and information management strategy, aligning it with business objectives and industry best practices. Collaborate with executive leadership to integrate security into all aspects of the company's operations and decision-making processes. Risk Management: Identify, assess, and prioritize cybersecurity risks and vulnerabilities, taking proactive measures to mitigate and manage them effectively. Establish a robust incident response plan and lead the response efforts in the event of a security breach. Security Governance: Oversee the development and implementation of information security policies, standards, and procedures. Ensure compliance with relevant regulatory requirements and industry standards (e.g., SEBI, RBI, DPDP, ISO 27001). Representation in various Committee and forums as required. Security Awareness and Training: Promote a strong cybersecurity culture across the organization through training, awareness campaigns, and ongoing education. Foster a sense of shared responsibility for security among employees and contractors. Security Architecture and Technology: Evaluate, recommend, and implement cutting-edge security technologies, tools, and practices. Oversee the design and maintenance of a secure and scalable IT infrastructure. Security Monitoring (SOC 24*7) and Incident Response: Implement continuous monitoring systems to detect and respond to security threats in real-time. Lead investigations into security incidents, documenting findings, and implementing remediation actions. Vendor and Third-Party Risk Management: Assess the security posture of third-party vendors and partners, ensuring they meet the company's security standards. Establish and maintain relationships with external security organizations and industry peers. Application Security and VAPT Budget and Resource Management Role and Responsibilities : Chief Information Security role comprehends the experience in ISMS implementation & audit management to strategize, improve and streamline information security governance within the organization. The role will be responsible for developing, implementing, and monitoring a strategic, comprehensive enterprise information security management program and protect the organization from cyber security and data breaches. Core Competencies : Technical & Functional Expertise Business & Commercial Acumen Market Intelligence Execution Excellence Strategic Orientation Decision Making Preferred Skills: Deep knowledge of cybersecurity technologies, risk management, and compliance requirements. Excellent Spoken & Written Communication. Analytical Ability. Stakeholder management.

Posted 2 weeks ago

Apply

2.0 - 5.0 years

4 - 7 Lacs

Hyderabad

Hybrid

Naukri logo

Your day at NTT DATA The Vulnerability Assessment Specialist is a seasoned subject matter expert, responsible for conducting advanced vulnerability assessments, identifying vulnerabilities, and provides expert recommendations to mitigate security risks to ensure the security and integrity of the organization's systems and infrastructure. This role requires collaboration with cross-functional teams, and they lead/perform vulnerability assessments, analyze findings, and provide recommendations to mitigate security risks and contributes to the improvement of vulnerability management practices. What you'll be doing Key Responsibilities: Conducts vulnerability assessments using automated scanning tools and manual techniques to identify security vulnerabilities in systems, networks, applications, and infrastructure components. Conducts penetration tests using automated tools and manual techniques to identify security vulnerabilities in systems, networks, applications, and infrastructure components. Analyzes scan results and prioritizes vulnerabilities based on severity, impact, and exploitability. Assesses the potential risks associated with identified vulnerabilities. Analyzes the business impact, likelihood of exploitation, and potential attack vectors to prioritize remediation efforts based on risk severity. Provides detailed remediation recommendations to system owners, administrators, and IT teams. Collaborates to develop practical mitigation strategies, configuration changes, and patch management processes to address identified vulnerabilities. Utilizes vulnerability scanning tools such as Nessus, OpenVAS, Qualys, or similar tools to conduct scans, configure scan policies, and fine-tune scan parameters for accurate and comprehensive assessments. Utilizes penetration testing tools such as Metasploit, Burp Suite, and similar tools to conduct tests, configure test policies, and fine-tune test parameters for accurate and comprehensive assessments. Prepares vulnerability assessment reports, documenting assessment findings, risk analysis, and recommended actions. Communicates assessment results to stakeholders, including technical and non-technical audiences, in a clear and concise manner. Collaborates with cross-functional teams, including IT operations, development teams, and security stakeholders, to ensure effective communication, coordination, and alignment on vulnerability management efforts. Communicates technical concepts and recommendations to non-technical stakeholders. Participates in security awareness programs and provides training to end-users and stakeholders on vulnerability management best practices, secure coding, and security hygiene. Promotes a culture of security awareness within the organization. Collaborates with incident response teams to identify and address vulnerabilities associated with security incidents. Provides support during incident response efforts and contribute to post-incident analysis and remediation. Stays updated with the latest security trends, emerging vulnerabilities, and industry best practices. Contributes to the enhancement of vulnerability assessment processes, methodologies, and tools. Shares knowledge and provides guidance to improve vulnerability management practices. Shares knowledge and provides guidance to improve penetration testing practices. Contributes to open source security projects and the security community. Performs any other related task as required. Knowledge and Attributes: Seasoned understanding of vulnerability assessment methodologies, tools, and industry best practices. Seasoned understanding of penetration testing methodologies, tools, and industry best practices. Seasoned understanding of networking concepts, operating systems, and common software vulnerabilities. Solid proficiency in using vulnerability assessment tools such as Nessus, OpenVAS, Qualys, or similar tools. Solid proficiency in using penetration testing tools such as Metasploit, Burp Suite, and similar tools. Seasoned knowledge of risk analysis principles and the ability to assess the business impact of vulnerabilities. Solid knowledge of vulnerability management frameworks, such as CVE, CVSS, and common vulnerability databases. Strong analytical and problem-solving skills to analyze scan results, prioritize vulnerabilities, and recommend effective remediation actions. Excellent written and verbal communication skills to prepare vulnerability assessment reports and effectively communicate technical information to diverse stakeholders. Excellent collaboration and teamwork skills to work effectively with cross-functional teams and stakeholders. Seasoned familiarity with security frameworks, standards, and regulatory compliance requirements. Academic Qualifications and Certifications: Bachelor's degree or equivalent in Computer Science, Information Security, or a related field. Relevant certifications such as Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP)GIAC Penetration Tester (GPEN) or GIAC Certified Vulnerability Assessor (GCVA) are beneficial. Required Experience: Seasoned demonstrated experience in information security or related roles, with a focus on conducting vulnerability assessments and providing remediation recommendations. Seasoned demonstrated experience in conducting advanced vulnerability assessments, including application security assessments, network security assessments, penetration testing, or code review. Experience in bug bounty programs and identifying zero-day vulnerabilities is a plus.

Posted 2 weeks ago

Apply

1.0 - 5.0 years

4 - 8 Lacs

Bengaluru

Hybrid

Naukri logo

Knowledge and application: Seasoned, experienced professional; has complete knowledge and understanding of area of specialization. Uses evaluation, judgment, and interpretation to select right course of action. Problem solving: Works on problems of diverse scope where analysis of information requires evaluation of identifiable factors. Resolves and assesses a wide range of issues in creative ways and suggests variations in approach. Interaction: Enhances relationships and networks with senior internal/external partners who are not familiar with the subject matter often requiring persuasion. Works with others outside of own area of expertise, with the ability to adapt style to differing audiences and often advises others on difficult matters. Impact: Impacts short to medium term goals through personal effort or influence over team members. Accountability: Accountable for own targets with work reviewed at critical points. Work is done independently and is reviewed at critical points. Workplace type : Hybrid Working

Posted 2 weeks ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Mumbai

Hybrid

Naukri logo

Additional Career Level Description: Knowledge and application: Applies broad expertise and knowledge in highly specialized fields or several related disciplines. Leads and contributes to development of company objectives and principles to achieve goals in creative and effective ways. Recognized internally as a subject matter expert with the ability to work on significant and unique issues where analysis of situations or data requires an evaluation of intangibles. Focuses on providing through leadership and works on projects, which requires understanding of wider business. Problem solving: Requires conceptual thinking and analysis of intangibles to understand advanced issues and implications to develop solutions with longer term impacts. Interaction: Requires advising on and conveying advanced information and persuading several diverse stakeholders/audiences. Creates formal networks involving coordination among groups. Impact: Translates functional vision into plans for a discipline and guides their execution. Exercises independent judgment in methods, techniques and evaluation criteria for obtaining results. Accountability: Accountable for own or team results, which may impact the entire function. May direct the activities of project teams.

Posted 2 weeks ago

Apply

8.0 - 11.0 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Naukri logo

Dear Candidate, We are seeking an Information Security Analyst to safeguard the organizations digital assets by identifying vulnerabilities, monitoring threats, and enforcing cybersecurity policies. Key Responsibilities: Monitor systems for security breaches and anomalies. Conduct vulnerability assessments and risk analysis. Implement and manage security tools (SIEM, firewalls, antivirus). Investigate incidents and support response and recovery efforts. Ensure compliance with frameworks such as ISO 27001, NIST, and GDPR. Required Skills & Qualifications: Knowledge of networking, firewalls, and encryption. Familiarity with security tools (Splunk, Nessus, Qualys, etc.). Strong understanding of access controls, IAM, and security protocols. Security certifications preferred (e.g., CompTIA Security+, CISSP, CEH). Experience with incident response and forensic analysis is a plus. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Delivery Manager Integra Technologies

Posted 2 weeks ago

Apply

0.0 - 4.0 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Microsoft Vulnerability Management. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 2 weeks ago

Apply

10.0 - 20.0 years

12 - 22 Lacs

Hyderabad

Work from Office

Naukri logo

About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 2 weeks ago

Apply

4.0 - 7.0 years

5 - 9 Lacs

Gurugram

Work from Office

Naukri logo

Join our Team About this opportunity: Ericsson invites applications for the role of Software Developer. In this challenging and fulfilled position, you will be tasked with constructing customers solutions during the building phase of the Software Development Life Cycle (SDLC). As a Software Developer, you will be responsible for performing the detailed design of application and technical architecture components and classes according to the specification provided by the System Architect. The role also involves coding Software components and contributing to the early testing phases, as well as extending your support towards system testing. What you will do: - Design and develop detailed software solutions. - Develop and integrate various software components. - Actively participate in software component and system testing. - Support in pre-sales and delivery of software. - Ensure compliance with organizations best practices for software development. - Contribute to asset creation and reuse in software design and development. The skills you bring: - Cloud Technologies (Kubernetes, Docker, AWS, Container, Microservices, spring boot). - Security. - DevSecOps. - Front End Development. - Security Reliability Model (SRM). - Application and Product security. - IT security and compliance. - Agile methodology. - Vulnerability Management. - CI/CD. - Back End Development. - Java Spring Boot Framework. - Tools for CI/CD (Git, Gerrit, Jenkins, Sonar, Helm). Why join Ericsson? What happens once you apply? Primary country and city: India (IN) || Gurgaon Req ID: 766680

Posted 2 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

1. Must have completed CEH certification 2. Must have expertise in DAST/SAST/API security, Network security, Mobile Security/DevSecops/Cloud Security/Vulnerability Management Mandatory Skills DAST (using Burp Suite), API security testing Good to Have Skills Network security, SAST

Posted 2 weeks ago

Apply

5.0 - 6.0 years

12 - 13 Lacs

Pune

Work from Office

Naukri logo

Manage all installed systems and infrastructure, including installation, configuration, testing, and maintenance of Linux-based operating systems. Troubleshoot, tune, upgrade, and monitor RedHat and CentOS systems, ensuring system health and performance. Perform OS upgrades for RedHat and CentOS platforms. Mitigate vulnerabilities related to the Linux OS within defined timeframes. Manage user accounts, create, delete, and modify user permissions, and configure/manage LVM, Apache, Samba, and NFS. Ensure system hardening and compliance with CIS standards. Provide support during IT audits and deliver required evidence to auditors. Enforce operating system policies to ensure security, integrity, and efficiency of system resources, applications, and operations. Support datacenter activities, including hardware break-fix coordination with OEM vendors. Address IT operations tickets and incidents in compliance with defined SLAs. Qualifications and Requirements: Certifications: Red Hat Certified Engineer (RHCE) required. AWS certification is a plus. ITIL certification preferred. Technical Skills: Proven working experience as a Linux Administrator in a large-scale environment. Experience with RedHat and CentOS platforms. Proficiency in managing LVM, Apache, Samba, and NFS. Strong understanding of security hardening techniques (CIS standards). Basic scripting knowledge (eg, Bash, Python). Experience: 5-6 years of experience in Linux system administration, supporting large and complex environments. Hands-on experience with OS patching, upgrades, and vulnerability management. Experience with cloud platforms such as AWS. Familiarity with Virtualization Platform such as VMware. Education: bachelors degree in IT, Computer Science, Computer Engineering, or a related field. Other Skills: Excellent communication and interpersonal skills. Strong problem-solving abilities. Familiarity with ITIL processes such as Incident, Change, and Problem Management. Additional Information: The role requires flexibility to work in 24x7 shifts. The candidate must be able to support datacenter operations and address hardware break-fix issues

Posted 2 weeks ago

Apply

12.0 - 15.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Security Governance Good to have skills : NAMinimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Advisor, you will provide enterprise-level advice to make organizations cyber resilient. Your typical day will involve engaging with various teams to assess and address cyber threats, developing strategies for digital asset protection, and ensuring that stakeholders maintain trust in the organization's security posture. You will also be responsible for staying updated on the latest cybersecurity trends and best practices to effectively guide your organization in navigating the complex landscape of cyber threats. Roles & Responsibilities:-Perform required audits and tests related to the Business Continuity Plans-Develop plans to safeguard data and intellectual property against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs-Work with Accenture's global asset and security organizations to develop solutions for clients unique problems and help implement business continuity plans and align resources, as appropriate-Deliver on key metrics (SLAs and KPIs) and contractual requirements successfully to execute run and transform projects to ensure the quality of functioning of teams to optimize security measures-Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Governance.- Strong understanding of risk management frameworks and compliance standards.- Experience in developing and implementing security policies and procedures.- Ability to conduct security assessments and audits.- Familiarity with incident response planning and execution. -Active participation in hiring of talent, operating of projects in various type and scale, execute concepts and implementation strategies for various systems to ensure practical implementation of security standards across client and industries.-Understands requirements and participates in Solution Review, Client orals, Client visits etc. to represent Accenture to help client and provide solutions to clients needs.-Document and deliver security and emergency measures policies, procedures, and tests.-Conversant on multiple CyberSecurity domains like:Identity and Access Management, Network Security, Vulnerability Management (Infra and Applications), Cloud Security, Endpoint and Email Security, SOC\SIEM, Network Security, Risk & Compliance, Data Security independent of various tools, technologies and processes. Additional Information:- The candidate should have minimum 12 years of experience in Security Governance.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

6.0 - 10.0 years

9 - 14 Lacs

Chennai, Bengaluru

Work from Office

Naukri logo

Job Title : DevOps Engineer Location: Chennai/ Bangalore Job Type: Full time Experience: 4 6 yrs Job Summary: We are seeking a skilled DevOps Engineer to join our team to streamline software development and deployment processes. The ideal candidate will work closely with development, operations, and QA teams to automate and optimize mission-critical deployments, infrastructure, and system monitoring. Your work will be crucial in ensuring the reliability, scalability, and security of our production environments. Key Responsibilities: CI/CD Pipeline Development: Design, implement, and manage continuous integration and deployment pipelines. Infrastructure as Code (IaC): Use tools like Terraform, Ansible, or CloudFormation to automate infrastructure provisioning. Cloud Infrastructure Management: Deploy and manage infrastructure on AWS, Azure, or Google Cloud Platform. Monitoring & Logging: Set up and maintain monitoring systems using tools like Prometheus, Grafana, ELK stack, or Datadog. Collaboration: Work closely with developers and other engineers to ensure high system availability and reliability. Security: Implement and maintain security best practices throughout the DevOps lifecycle. Incident Management: Troubleshoot production issues and coordinate with relevant teams to ensure prompt resolution. Automation: Continuously improve system performance and deployment efficiency through scripting and automation. Required Qualifications: Bachelor’s degree in Computer Science, Engineering, or a related field, or equivalent work experience. Proven experience as a DevOps Engineer or similar role. Proficient in scripting languages such as Python, Bash, or PowerShell. Experience with CI/CD tools like Jenkins, GitLab CI, CircleCI, or GitHub Actions. Strong understanding of containerization (Docker, Kubernetes). Familiarity with cloud platforms (AWS, GCP, Azure). Experience with configuration management tools (Ansible, Chef, Puppet). Solid understanding of networking and security principles. Preferred Qualifications: Certifications in AWS, Azure, or Kubernetes (e.g., CKA, AWS Certified DevOps Engineer). Experience with serverless architectures. Knowledge of GitOps workflows. Experience working in Agile/Scrum environments.

Posted 2 weeks ago

Apply

3.0 - 8.0 years

4 - 8 Lacs

Pune

Work from Office

Naukri logo

As an Associate Developer at IBM, you'll work with clients to co-create solutions to major real-world challenges by using best practice technologies, tools, techniques, and products to translate system requirements into the design and development of customized systems. In your role, you will be responsible for: Your primary responsibilities include: Working on the end to end feature development and solving challenges faced in the implementation. Collaborate with key stakeholders, internal and external, to understand the problems, issues with the product and features and solve the issues as per SLAs defined. Being eager to learn new technologies and implementing the same in feature development. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Hands on extensive experience on RPG language on AS/400 System I and have worked on Production system and Application Development. 3+ years of relevant experience working on mainframes. Should have technical expertise/hands on – Assembler, COBOL, JCL, CICS, VSAM, Inter-test, Fault Analyser, File-Manager, Control-M/Any other Scheduler etc. Should have expertise working on JIRA/Confluence/SharePoint/Any Change management tool (Remedy/Myservice/Service now etc.) Message Types and Transaction flows. Preferred technical and professional experience Processing between Acquirers, Issuer & Acquiring gateways etc. Interact with different stake holders , gather and articulate the . Good communications skills to deal with the clients directly and set up calls to bring the Business and Delivery inline.

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

Vadodara

Work from Office

Naukri logo

Civica develops software for local and national government, education, health and care. Over 5,000 public bodies across the globe use our software to help deliver critical services to over 100 million citizens. Our aspiration is to be a GovTech champion everywhere we work around the globe, supporting the needs of citizens and those that serve them every day. Building on 21 years of continuous growth and success, were at a pivotal point on our journey to realise that aspiration. As a company, we re passionate about what we do and the citizens we help to serve. If you too would like to help champion the use of technology in public services, to improve outcomes for citizens and public sector organisations, then Civica is the right place for you. We will help you unlock the best version of yourself, achieve growth in your career whilst making a real difference to people and communities. Why will you love this opportunity as Security Operations Centre (SOC) at Civica As a vital member of our dynamic Security Operations Centre (SOC) team, comprising Analysts, Engineers, and a SOC Manager, youll take the lead in monitoring our SIEM and various security systems to safeguard both CIVICA Group and our valued customers. Your keen eye will assess real-time and historical logs across multiple technologies, helping to uncover potential attack patterns, instances of compromise, and security vulnerabilities. Working closely with your team, youll swiftly determine the most effective response to security events and incidents, while meticulously documenting every step taken to contain and resolve the issues. Youll also manage internal customer requests, particularly in relation to phishing, spam, and Anti-virus challenges. Additionally, youll evaluate risks using a Surface Attack Tool, develop and utilize OSINT tools to gather open-source intelligence from various published sources, and collaborate with different business units to inform, mitigate, or remediate any issues. In this role, youll be in charge of supervising Microsoft Sentinel and Microsoft Defender systems, while also managing other technologies as needed, including IPS, Email Gateways, Web Filtering services, and Antivirus solutions. You ll be on the lookout for patterns of misuse or recurring issues, working together with the team to contain, control, and resolve any incidents. Plus, you ll have the chance to identify opportunities for improvement in our personnel, processes, or technology to enhance the teams overall effectiveness. A deep understanding of security principles Use of Microsoft Sentinel and/or Defender Minimum 3 years experience working in IT, with at least 1 year in a security-based role. Any recognised certific

Posted 2 weeks ago

Apply

6.0 - 12.0 years

17 - 18 Lacs

Bengaluru

Work from Office

Naukri logo

Vulnerability Management Job Description Scanning, tracking, recording and reporting vulnerabilities using Tenable Security Center and Vulcan Cyber. Validate and triage identified vulnerabilities. Track remediation efforts to their completion. Contribute to team strategy in managing threats and vulnerabilities Prepare and present reports that document vulnerability trends within our environments key areas for improvement Should administer, operate, update, patch, configure, develop, integrate, install, troubleshoot and maintain vulnerability management systems, tools, tactics, techniques and procedures Familiarity with Vulnerability Management tools such as Tenable SC Develop scripts to automate the system installation of required patches and configurations to remediate identified system vulnerabilities via SCCM. Provide regular reporting on patch management program and overall operation status of patch compliance via SCCM. Knowledge on SCCM/Endpoint Configuration

Posted 2 weeks ago

Apply

3.0 - 5.0 years

15 - 19 Lacs

Bengaluru

Work from Office

Naukri logo

Not Applicable Specialism Risk Management Level Senior Associate & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisations security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purposeled and valuesdriven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations & Summary A career within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. We play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats Responsibilities Minimum 35 years of experience Strong communication and presentation skills Basic knowledge on Cybersecurity and Network concepts. Good understanding and working exposure towards endpoint security, data security, network security and cloud security. Previous or current experience in managing a highlevel corporate breach. Understanding of Mitre Framework and Cyber kill chain techniques and how to implement it in the client infrastructure to detect and mitigate threats, Exposure towards technologies such as SIEM, EDR, Email Security, DLP, Vulnerability Management and Network Monitoring technologies (CrowdStrike, Palo Alto, Digital Guardian, Proofpoint) Good to have knowledge and experience on malware analysis, reverse engineering and performing deep dive forensic investigations. Willing to learn and put in the thought process to solve complex problems within the Security domain. Willing to work in 24/7 rotational shift. Good to have certifications such as CEH, GCIH, Network & Security Fundamentals. Mandatory Skill Sets SIEM , EDR , Crowdstike , Mitre , DLP , Proofpoint Preferred Skill Sets SIEM , EDR , Crowdstike , Mitre , DLP , Proofpoint Years of Experience 3+ Years Educational Qualification BE, B.Tech, M.Tech, MCA, MBA graduates. Education Degrees/Field of Study required Bachelor of Technology, Bachelor of Engineering, Master of Business Administration Degrees/Field of Study preferred Required Skills SoCs Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Learning Agility, Malware Analysis, Malware Detection Tools {+ 16 more} No

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

Ability to understand the technical implications and impact of various types of vulnerabilities on servers and applications including remote code execution, elevation of privilege, information disclosure. Ability to assess the risk associated with vulnerabilities, including impact and exploitability Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 3 plus years of experience Experience in vulnerability management, security operations, or a related field with a proven track record of identifying and mitigating vulnerabilities. Practical experience with vulnerability scanning, risk assessment, and patch management processes. Proficiency with vulnerability scanning tools such as Nessus, Qualys, Rapid7 Preferred technical and professional experience Vulnerability AssessmentExperience in conducting vulnerability assessments and penetration testing Application Hands-on experience withTenable.SC (or an equivalent VM platform) including administration of Nessus remote and agent-based scans, profile creation and maintenance Skills in prioritizing vulnerabilities based on their severity, potential impact, and the organization’s risk profile, experience with ASM solution

Posted 2 weeks ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Vulnerability Management.

Posted 2 weeks ago

Apply

2.0 - 5.0 years

3 - 7 Lacs

Mumbai

Work from Office

Naukri logo

The primary responsibility of this role is to provide advanced incident analysis and management within our SOC environment, while also leading the development and training of the L1 SOC team in incident analysis, parsers creation, rule views, and report management. The ideal candidate will have a strong background in cybersecurity, incident response, and leadership skills. Responsibilities: Advanced Incident Analysis: Utilize advanced tools and techniques to analyze and investigate security incidents detected within the organization's networks and systems. Incident Response: Lead incident response efforts, coordinating with internal and external stakeholders to mitigate and remediate security incidents promptly. Team Leadership: Provide mentorship and guidance to the L1 SOC team, assisting in the development of their skills in incident analysis, parser creation, rule views, and report management. Parser Creation: Develop and maintain parsers to enhance the capability of the SOC's security information and event management (SIEM) system in detecting and correlating security events. Rule View Management: Manage and optimize rule views within the SIEM platform to ensure accurate and timely detection of security threats. Report Management: Oversee the generation and distribution of security reports, including incident reports, trend analysis, and recommendations for improvement. Collaboration: Work closely with other teams within the organization, including IT operations, network engineering, and application development, to improve overall security posture and incident response capabilities. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Equivalent work experience may be considered. Minimum of 3 years of experience in a SOC environment, with a focus on incident analysis and response. Strong understanding of cybersecurity principles, including threat detection, malware analysis, and vulnerability management. Experience with SIEM platforms (e.g., Securonix, QRadar) and familiarity with creating and managing parsers and rule views. Leadership experience, with the ability to mentor and motivate team members effectively. Excellent communication skills, both written and verbal, with the ability to convey complex technical concepts to non-technical stakeholders.

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies