Jobs
Interviews

77 Vulnerability Scanning Jobs - Page 3

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

1.0 - 4.0 years

1 - 6 Lacs

Mumbai

Work from Office

Your day at NTT DATA The Senior Associate Information Security Analyst is a developing subject matter expert, responsible for designing and implementing security systems to protect the organization's computer networks from cyber-attacks, and to help set and maintain security standards. This role is required to monitor the organization's computer networks for security issues, install security software, and document any security issues or breaches found. The Senior Associate Information Security Analyst is responsible for assisting in the planning, implementation, and management of information security measures to safeguard the organization's digital assets and systems and contributes to maintaining a secure and compliant environment. What you'll be doing Key Responsibilities: Monitors security alerts and events from various sources, investigates potential threats, and escalates incidents as necessary. Assists in the implementation and monitoring of security controls, including firewalls, intrusion detection systems, and access controls. Performs regular vulnerability assessments, analyses scan results, and assists in prioritizing and remediating identified vulnerabilities. Supports the incident response team in investigating security incidents, documenting findings, and participating in remediation efforts. Assists in ensuring compliance with industry standards (for example, GDPR, ISO 27001) by conducting assessments and implementing necessary controls. Installs security measures and operates software to protect systems and information infrastructure, including firewalls and data encryption programs. Documents security breaches and assess the damage they cause. Works with the security team to perform tests and uncover network vulnerabilities. Fixes detected vulnerabilities to maintain a high-security standard. Develops organizational best practices for IT security. Performs penetration testing and upgrades systems to unable security software. Installs and upgrades antivirus software and tests and evaluates new technology. Assists with the installation of security software and understands information security management. Researches security enhancements and makes recommendations to management. Stays abreast of information technology trends and security standards. Contributes to security awareness initiatives by creating training materials, conducting workshops, and educating employees about best security practices. Maintains accurate records of security incidents, assessments, and actions taken for reporting and audit purposes. Assists in the management and maintenance of security tools, including antivirus software, encryption tools, and security information and event management (SIEM) systems. Participates in risk assessments to identify potential security threats, vulnerabilities, and associated risks to the organization. Collaborates with cross-functional teams, IT, and other teams to ensure security measures are integrated into the organization's processes and projects. Performs any other related task as required. Knowledge and Attributes: Good communication skills to effectively convey technical information to non-technical stakeholders. Good analytical thinking and problem-solving skills to prevent hacking on a network. Ability to identify and evaluate potential risks and to develop solutions. Ability to identify and mitigate network vulnerabilities and explain how to avoid them. Understands firewalls, proxies, SIEM, antivirus, and IDPS concepts. Understands patch management with the ability to deploy patches in a timely manner whilst understanding business impact. Developing proficiency with MAC and OS. Familiarity with security frameworks, standards, and regulations (for example, NIST, CIS, GDPR). Basic understanding of network and system architecture, protocols, and security controls. Ability to analyze security incidents and assess potential risks. Ability to work both independently and collaboratively in a fast-paced environment. Academic Qualifications and Certifications: Bachelor's degree or equivalent in information security, cybersecurity, computer science, or related. Security certifications such as CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM) are advantageous. Required Experience: Moderate level of demonstrated experience in information security or cybersecurity, or related roles. Moderate level of demonstrated experience working in a global IT organization. Moderate level of demonstrated experience with computer network penetration testing and techniques. Moderate level of demonstrated experience with security assessment and vulnerability scanning tools. Workplace type : On-site Working

Posted 1 month ago

Apply

2.0 - 7.0 years

4 - 9 Lacs

Mumbai

Work from Office

Your day at NTT DATA The Security Managed Services Engineer (L2) is a developing engineering role, responsible for providing a managed service to clients to ensure that their Security Infrastructures and systems remain operational. Through the proactive monitoring, identifying, investigating, and resolving of technical incidents and problems, this role is able to restore service to clients. The primary objective of this role is to proactively review client requests or tickets and apply technical/process knowledge to resolve them without breaching service level agreement (SLA) and focuses on second-line support for incidents and requests with a medium level of complexity. The Security Managed Services Engineer (L2) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: Min 4+ Years exp in Soc along with SIEM (Splunk). Min 2 years Hands on exp in Splunk. Configure and maintain the SIEM system, ensuring that it's properly set up to collect and analyze security event data. Develop, customize, and manage security rules within the SIEM to detect and respond to security threats. Monitor SIEM alerts, investigate them, and take appropriate actions based on the severity and nature of the alerts. Oversee the collection, normalization, and storage of log data from various sources. Develop and document incident response procedures, and lead or assist in incident response efforts when security incidents occur. Analyze and investigate security events from various sources. Manage security incidents through all incident response phases to closure. Utilize SIEM, SOAR, UEBA, EDR, NBAD, PCAP, Vulnerability Scanning, and Malware analysis technologies for event detection and analysis. Update tickets, write incident reports, and document actions to reduce false positives. Develop knowledge of attack types and finetune detective capabilities. Identify log sources and examine system logs to reconstruct event histories using forensic techniques. Align SIEM rules and alerts with the LICs security policies and compliance requirements. Conduct computer forensic investigations, including examining running processes, identifying network connections, and disk imaging. Maintain and support the operational integrity of SOC toolsets. Collaborate with SIEM solution vendors for updates, patches, and support to ensure the system's reliability and effectiveness. Maintain thorough documentation of the SIEM system's configuration, procedures, and incident response plans. Proactively identify and report system security loopholes, infringements, and vulnerabilities to the Security Operations Centre Manager in a timely manner. Work closely with other IT and security teams during incident response, coordinating efforts and sharing information to mitigate security incidents effectively. Ensure that the SIEM system helps the LIC meet regulatory compliance requirements and is ready for security audits. Continuously optimize the SIEM system for efficient performance, ensuring it can handle the volume of data and remain responsive. Develop automation scripts and workflows to streamline common security response tasks and enhance efficiency. Knowledge and Attributes: Ability to communicate and work across different cultures and social groups. Ability to plan activities and projects well in advance, and takes into account possible changing circumstances. Ability to maintain a positive outlook at work. Ability to work well in a pressurized environment. Ability to work hard and put in longer hours when it is necessary. Ability to apply active listening techniques such as paraphrasing the message to confirm understanding, probing for further relevant information, and refraining from interrupting. Ability to adapt to changing circumstances. Ability to place clients at the forefront of all interactions, understanding their requirements, and creating a positive client experience throughout the total client journey. Academic Qualifications and Certifications: Bachelor's degree or equivalent qualification in IT/Computing (or demonstrated equivalent work experience). Active CEH certification is Must. Required Experience: Moderate level of relevant managed services experience handling Security Infrastructure. Moderate level of knowledge in ticketing tools preferably Service Now. Moderate level of working knowledge of ITIL processes. Moderate level of experience working with vendors and/or 3rd parties. Workplace type : On-site Working

Posted 1 month ago

Apply

2.0 - 5.0 years

4 - 8 Lacs

Mumbai

Work from Office

Your day at NTT DATA The Security Managed Services Engineer (L1) is an entry level engineering role, responsible for providing a managed service to clients to ensure that their Firewall infrastructure remain operational through proactively identifying, investigating, and routing the incidents to correct resolver group. The primary objective of this role is to ensure zero missed service level agreement (SLA) conditions and focuses on first-line support for standard and low complexity incidents and service requests. The Security Managed Services Engineer (L1) may also contribute to support on project work as and when required. What you'll be doing Key Responsibilities: Configure and maintain the SIEM system, ensuring that it's properly set up to collect and analyze security event data. Develop, customize, and manage security rules within the SIEM to detect and respond to security threats. Monitor SIEM alerts, investigate them, and take appropriate actions based on the severity and nature of the alerts. Oversee the collection, normalization, and storage of log data from various sources. Develop and document incident response procedures, and lead or assist in incident response efforts when security incidents occur. Analyze and investigate security events from various sources. Manage security incidents through all incident response phases to closure. Utilize SIEM, SOAR, UEBA, EDR, NBAD,PCAP, Vulnerability Scanning, and Malware analysis technologies for event detection and analysis. Update tickets, write incident reports, and document actions to reduce false positives. Develop knowledge of attack types and finetune detective capabilities.Identify log sources and examine system logs to reconstruct event histories using forensic techniques.Align SIEM rules and alerts with the LICs security policies and compliance requirements.Conduct computer forensic investigations, including examining running processes, identifying network connections, and disk imaging. Maintain and support the operational integrity of SOC toolsets.Collaborate with SIEM solution vendors for updates, patches, and support to ensure the system's reliability and effectiveness.Maintain thorough documentation of the SIEM system's configuration, procedures, and incident response plans.Proactively identify and report system security loopholes, infringements, and vulnerabilities to the Security Operations Centre Manager in a timely manner. Work closely with other IT and security teams during incident response, coordinating efforts and sharing information to mitigate security incidents effectively.Ensure that the SIEM system helps the LIC meet regulatory compliance requirements and is ready for security audits.Continuously optimize the SIEM system for efficient performance, ensuring it can handle the volume of data and remain responsive.Develop automation scripts and workflows to streamline common security response tasks and enhance efficiency. Workplace type : On-site Working

Posted 1 month ago

Apply

3.0 - 6.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Ability to understand the technical implications and impact of various types of vulnerabilities on servers and applications including remote code execution, elevation of privilege, information disclosure. Ability to assess the risk associated with vulnerabilities, including impact and exploitability Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 3 plus years of experience Experience in vulnerability management, security operations, or a related field with a proven track record of identifying and mitigating vulnerabilities. Practical experience with vulnerability scanning, risk assessment, and patch management processes. Proficiency with vulnerability scanning tools such as Nessus, Qualys, Rapid7 Preferred technical and professional experience Vulnerability AssessmentExperience in conducting vulnerability assessments and penetration testing Application Hands-on experience withTenable.SC (or an equivalent VM platform) including administration of Nessus remote and agent-based scans, profile creation and maintenance Skills in prioritizing vulnerabilities based on their severity, potential impact, and the organization’s risk profile, experience with ASM solution

Posted 1 month ago

Apply

2.0 - 4.0 years

10 - 11 Lacs

Hyderabad

Work from Office

Overview Exp. - 3-6 Years Location - Hyderabad, Bangalore, Gurgaon, Mumbai Shift - 11 AM - 8 PM Skills - Exp. in Vulnerability mgt., vulnerability scanning tools such as Qualys, Tenable, or Rapid7, Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). About Omnicom Global Solutions Omnicom Global Solutions is an integral part of Omnicom Group, a leading global marketing and corporate communications company. Omnicom’s branded networks and numerous specialty firms provide advertising, strategic media planning and buying, digital and interactive marketing, direct and promotional marketing, public relations, and other specialty communications services to over 5,000 clients in more than 70 countries. OGS India plays a critical role for our group companies and global agencies by providing stellar products, solutions, and services across Creative Services, Technology, Marketing Science (Data & Analytics), Advanced Analytics, Market Research, Business Support Services, Media Services, and Project Management. With over 4000 talented colleagues in India, we are growing rapidly and are looking for professionals like you to help build the next chapter of our journey. Responsibilities Role Overview We have an exciting opportunity for an Analyst, Vulnerability Management at our Hyderabad office. This role is central to maintaining and enhancing Omnicom’s cybersecurity framework by overseeing vulnerability assessments, remediation guidance, and program governance. As a Vulnerability Management Specialist, you will drive day-to-day scanning operations, review security exposures, and ensure that the organization’s attack surface is minimized through proactive analysis and mitigation. You’ll also collaborate on vendor assessments and support strategic improvements to our enterprise vulnerability management program. Key Responsibilities Maintain and operate vulnerability scanning tools and associated processes. Conduct regular scans and assessments of enterprise environments to detect security vulnerabilities. Review findings, prioritize risks, and recommend remediations or security patches in coordination with IT and security teams. Develop and present exception and management reports; track remediation status and escalate unresolved risks. Assist in creating and maintaining quality metrics and dashboards for vulnerability program performance. Monitor vendor and third-party security postures; support governance and compliance protocols. Collaborate with cross-functional teams to support risk mitigation strategies and secure configuration management. Contribute to the evolution of Omnicom’s next-generation vulnerability management and threat detection frameworks. Qualifications Required Qualifications 3–5 years of experience in vulnerability management, information security, or a related discipline. Proficiency with vulnerability scanning tools such as Qualys, Tenable, or Rapid7. Familiarity with patch management workflows and remediation lifecycle practices. Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). Ability to analyse technical findings, assess business impact, and provide actionable remediation guidance. Effective communication skills with experience in stakeholder engagement and reporting. Detail-oriented with strong problem-solving skills and the ability to work independently or in a team setting. Preferred Qualifications Security certifications such as CompTIA Security+, CEH, or equivalent. Exposure to vendor risk management and third-party security assessment. Experience with ITSM tools and ticketing systems for remediation tracking

Posted 1 month ago

Apply

7.0 - 12.0 years

15 - 30 Lacs

Noida

Work from Office

Job Title: Security Operation Manager Location: Noida Job Tyoe : Full-Time Experience: 7+ Years Department: Operation/ Security Reports To: Operation Director Job Summary: The Security Operational Manager is responsible for overseeing the day-to-day operations of the organization's security infrastructure. This role involves managing the security operations center (SOC), leading incident response efforts, and ensuring the effectiveness of security policies, procedures, and protocols. The Security Operational Manager will collaborate with various departments to safeguard the company's information assets and maintain a robust security posture. Key Responsibilities: Manage Security Operations: Oversee the daily activities and operations of the security operations center (SOC), ensuring continuous monitoring, detection, and response to security incidents. Incident Response: Lead the incident response team in identifying, managing, and resolving security breaches and vulnerabilities. Conduct post-incident analysis and reporting to prevent future occurrences. Security Monitoring: Implement and maintain security monitoring tools and technologies to detect and respond to threats in real-time. Penetration Testing and Vulnerability Scanning: Conduct regular penetration testing and vulnerability scanning to identify and mitigate security weaknesses within the organization's systems and applications. Policy and Compliance: Develop, enforce, and update security policies, procedures, and protocols in alignment with industry standards and regulatory requirements. Ensure compliance with relevant laws and regulations. Team Leadership: Tain, and mentor the security operations team, fostering a culture of continuous improvement and professional development. Risk Management: Conduct regular security risk assessments and implement mitigation strategies to reduce identified risks. Collaboration: Work closely with IT, legal, and other departments to ensure comprehensive security measures are integrated into all business processes. Reporting: Prepare and present regular reports on security operations, incidents, and compliance status to the Customers. Emergency Response: Develop and maintain emergency response plans for security incidents, ensuring the organization is prepared for potential crises. Qualifications: Education: Bachelors degree in Computer Science, Information Security, or a related field.. Experience: Minimum of 7 years of experience in information security, with at least 3 years in a managerial role overseeing security operations. Certifications: Relevant certifications such as CISSP, CISM, CEH, or similar are highly desirable. Technical Skills: Proficient in security technologies such as SIEM, IDS/IPS, firewalls, antivirus software, and endpoint protection. Expertise in conducting penetration testing and vulnerability scanning. AWS Expertise: In-depth knowledge and experience with Amazon Web Services (AWS) security practices and tools. Knowledge: In-depth understanding of security frameworks (e.g., NIST, ISO 27001), compliance requirements (e.g., GDPR, HIPAA), and incident response best practices. Leadership: Strong leadership and team management skills with the ability to motivate and guide a diverse team. Communication: Strong verbal and written communication skills, with the ability to convey complex security issues to non-technical stakeholders. Working Conditions: The role may require occasional on-call work to address security incidents. Must be able to work in a high-pressure environment and handle multiple tasks simultaneously.

Posted 1 month ago

Apply

4.0 - 7.0 years

9 - 18 Lacs

Gurugram

Work from Office

PREFERENCE: Early joiners preferred This position is strictly Work from Office. Please read this carefully before applying. Working days will be 5 per week. The job location will be Sec 59, Gurgaon Candidates currently based in Delhi-NCR Prior experience in a startup or fast-paced environment Immediate availability for interviews Strong communication skills and team fit Long-term commitment preferred Job Title: DevOps Engineer Location: Sector 59, Gurgaon/Gurugram Experience: 4 to 7 years Industry: BFSI Employment Type: Full-time Work Mode: On-site Job Description: We are hiring a DevOps/Integration Engineer with strong experience in CI/CD , cloud (AWS/OCI) , and DevSecOps tools . The candidate should be skilled in integrating and troubleshooting across build systems, application monitoring, and secure deployments in hybrid (on-prem + cloud) environments. Key Responsibilities: Set up and manage CI/CD pipelines , quality gates, and vulnerability scanning Configure & troubleshoot SAST/DAST tools Manage build/compile tools - Maven, Gradle, etc. Use tools like Prometheus , Grafana , ELK , or Splunk for monitoring/logging Work on cloud (AWS/OCI) and on-prem infrastructure Troubleshoot network issues and maintain system uptime Experience with Hibernate , clusters , and performance tuning Collaborate with development and security teams for smooth delivery Required Skills: CI/CD tools: Jenkins, GitLab CI, Azure DevOps Cloud platforms: AWS or Oracle Cloud Build tools: Maven, Gradle Security: SAST/DAST, DevSecOps integration Monitoring: ELK, Prometheus, Grafana Networking & troubleshooting Hibernate, clustering exposure Good to Have: Certifications (AWS, OCI, DevOps) Docker/Kubernetes knowledge Awareness of OWASP or ISO compliance

Posted 1 month ago

Apply

4.0 - 7.0 years

6 - 9 Lacs

Bengaluru

Work from Office

Conduct vulnerability scan using Prisma's cloud vulnerability scanning features to identify vulnerabilities in cloud resources . 2. Assess and monitor security posture of Kubernetes clusters, including network policies, pod configurations and container runtime security. 3. Leverage Prisma cloud's automated vulnerability risk scoring to evaluate severity of vulnerabilities 4. Work with teams to prioritize vulnerabilities based on severity, exploitability & potential business impact. 5. Ensure organization's cloud infrastructure complies with industry standards 6. Use Prisma cloud to scan Kubernetes clusters and container registries for known vulnerabilities and misconfigurations 7. Create vulnerability reports that detail discovered vulnerabilities, risk analysis and remediation actions.

Posted 1 month ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Hyderabad

Work from Office

Urgent Requirement for Vulnerability Management, Conduct vulnerability scan using Prisma's cloud vulnerability scanning features to identify vulnerabilities in cloud resources . Assess and monitor security posture of Kubernetes clusters, including network policies, pod configurations and container runtime security. Leverage Prisma cloud's automated vulnerability risk scoring to evaluate severity of vulnerabilities Work with teams to prioritize vulnerabilities based on severity, exploitability & potential business impact. Ensure organization's cloud infrastructure complies with industry standards Use Prisma cloud to scan Kubernetes clusters and container registries for known vulnerabilities and misconfigurations Create vulnerability reports that detail discovered vulnerabilities, risk analysis and remediation actions.

Posted 1 month ago

Apply

10.0 - 15.0 years

35 - 40 Lacs

Hyderabad

Work from Office

We have Immediate Openings on Vulnerability Management Contract to Hire role for multiple clients. Job Details Skills Vulnerability Management Experience 10+Years Location Pan India Job type Contract to HIRE Primary & Secondary Skills Vulneribility Management Qualys Guard Qualys Agent Policy Compliance Vulneribilty Scanning RESPONSIBILITIES Perform vulnerability assessment using leading Vulnerability Scanning solutions like Qualys, Microsoft Defender, etc. Perform vulnerability assessments on On-prem, Cloud hosted systems, container (like Docker & Kubernetes), databases, web services and other widely deployed infrastructure components. Perform false positive validation and ensure delivery of quality reports. Act as a technical SME to analyse the vulnerability results & detection logic. Provide technical advice and support on remediation to infrastructure / application support teams. Manage & Implement approved scan exclusions based on the request from platform support teams. Review findings and identify root causes for common issues and provide recommendations for sustainable improvements. Responsible to maintain vulnerability quality assurance by building VM team technical knowledge base. Research and report on security vulnerabilities and latest advancements in the vulnerability management lifecycle. Understand security policies, procedures and guidelines to all levels of management and staff. Communicate effectively orally and in writing and establish cooperative working relationships. Provide suggestion to improve vulnerability Management service based on current trends in information technology (Network, system security software and hardware). Act as line manager in the absence of team lead. People and Talent Minimum 6 years of experience in Information security and preferably in Banking and Financial services sector Good understanding and Implementation experience on Enterprise Network Security Architecture and Enterprise Network Design. In-depth working experience on Cloud technologies, routers, switches, firewalls, load balancers and proxy will be added advantage for the role. Bachelor Degree in Engineering, Computer Science/Information Technology or its equivalent. Industry certifications will be a plus e.g. CISSP, CCNA Security, CCIE, CCNP Security, CISA, CRISC and CISM. Strong knowledge and subject matter expertise in multiple areas within Information Security. Hands on skill and expertise in performing risk / threat assessments/risk consulting. Excellent written, oral communication and reporting skills. Provides technical leadership, expertise and direction working with district and college technical staff for design and implementation of information technology security systems. Develops strategy for propagating, maintaining, and measuring compliance against security policies, standards, and guidelines district-wide. Time management and organizational skills Ability and desire to learn new skills quickly Performs other related duties as assigned. Risk Management COMPETENCIES SKILLS FRAMEWORK Grow Self Applicable for all roles. Action Oriented Taking on new opportunities and tough challenges with a sense of urgency, energy and enthusiasm. Collaborates Building partnerships and working collaboratively with others to meet shared objectives. Courage Stepping up to address difficult issues and saying what needs to be said. Customer Focus Building strong customer relationships and delivering customer-centric solutions. Instils Trust Gaining the confidence and trust of others through honesty, integrity and authenticity. Nimble Learning Actively learning through experimentation when tackling new problems. Using both successes and failures as a learning factor.

Posted 1 month ago

Apply

4.0 - 9.0 years

7 - 16 Lacs

Pune, Bengaluru, Greater Noida

Work from Office

About the Role We are seeking a skilled and security-conscious Backend Engineer to join our growing engineering team. In this role, you will be responsible for designing, developing, and maintaining secure backend systems and services. Youll work with modern technologies across cloud platforms, graph databases, and containerized environments to build scalable and resilient infrastructure. Key Responsibilities Design and implement backend services and APIs using Python. Manage and query graph data using Neo4j. Work across cloud platforms (AWS, Azure, GCP) to build and deploy secure, scalable applications. Optimize and maintain relational and analytical databases including PostgreSQL and ClickHouse. Develop and deploy serverless applications and microservices. Containerize applications using Docker and manage deployment pipelines. Collaborate with security teams to integrate best practices and tools into the development lifecycle. Mandatory Skills Proficiency in Python programming . Hands-on experience with Neo4j for graph database management and Cypher querying. Working knowledge of AWS , Azure , and Google Cloud Platform (GCP) . Experience with PostgreSQL and ClickHouse for database optimization and management. Understanding of serverless architecture and deployment strategies. Proficiency with Docker for containerization and deployment. Nice to Have Experience with AWS ECS and EKS for container orchestration. Familiarity with open-source vulnerability/secret scanning tools (e.g., Trivy, Gitleaks, etc.). Exposure to CI/CD pipelines and DevSecOps practices. What We Offer Competitive compensation and benefits. Flexible work environment. Opportunities to work on cutting-edge security and cloud technologies. A collaborative and inclusive team culture.

Posted 1 month ago

Apply

4.0 - 8.0 years

3 - 7 Lacs

Mumbai

Work from Office

Daily assessment of vulnerabilities identified by infrastructure scan Evaluate rate and perform risk assessments on assets Prioritizing vulnerabilities discovered along with remediation timeline s Work with associated teams to explain vulnerabilities and remediation steps as required Maintain knowledge of the threat landscape Create reports and provide analysis on vulnerabilities for technical teams and leadership Skill Required Knowledge of application network and operating system security Experience with vulnerability and patch assessment Linux and windows experience Good understanding of Windows and Linux patching Knowledge of vulnerability scoring systems CVSS CMSS Experience on vulnerability scanning tools Excellent writing and presentation skills are required in order to communicate findings and status Primary Skills VMDR Policy Compliance Qualys Tenable Nessus Rapid7 Secondary Skills Excellent writing and presentation skills are required in order to communicate findings and statusCleary communicate priorities and escalation points procedures to other team members Detail oriented organized methodical follow up skills with an analytical thought process Experience performing dynamic scans static scans and penetration testing Development experienceProject management experience Innovative and efficiency focused Track trends and configure systems as required to reduce false positives from true events

Posted 1 month ago

Apply

3.0 - 6.0 years

8 - 12 Lacs

Bengaluru

Work from Office

environmental, pharmaceutical and cosmetic product testing and in AgroScience CRO services. It is also one of the global independent market leaders in certain testing and laboratory services for genomics, discovery pharmacology, forensics, CDMO, advanced material sciences and in the support of clinical studies. Young and dynamic, we have a rich culture, and we offer fulfilling careers Junior Vulnerability Management Analyst Position Overview: We are seeking a motivated and detail-oriented Junior Vulnerability Management Analyst to join our cybersecurity team. The role focuses on identifying, analysing, and assisting in the remediation of infrastructure vulnerabilities using tools like PingCastle and Qualys SCA. This is an excellent opportunity for individuals looking to grow their expertise in cybersecurity and vulnerability management. Key Responsibilities Vulnerability Scanning & Analysis: Conduct vulnerability scans using PingCastle and Qualys SCA to identify risks in Active Directory and infrastructure systems. Analyze scan results, validate findings, and prioritize vulnerabilities based on risk levels. Monitor scan performance, troubleshoot issues, and report anomalies to senior analysts. Remediation Support : Collaborate with IT Operation Teams to track remediation efforts and ensure timely resolution of identified vulnerabilities. Provide recommendations for configuration hardening based on findings. Reporting & Documentation: Generate detailed vulnerability reports and dashboards for internal stakeholders. Maintain accurate records of vulnerabilities, remediation timelines, and compliance status. Policy & Compliance: Assist in reviewing security policies and ensuring adherence to industry standards like CIS benchmarks. Support compliance efforts by aligning vulnerability management practices with organizational goals.Soft Skills: Strong analytical skills with attention to detail. Effective communication skills for technical reporting and collaboration with cross-functional teams. Eagerness to learn new tools and adapt to evolving cybersecurity challenges.Desirable Skills: Experience with patch management processes. Familiarity with compliance frameworks (e.g., ISO 27001, NIST). Qualifications Qualifications & Skills Technical Skills: Foundational understanding of cybersecurity principles, vulnerability management, and risk mitigation. Familiarity with tools like PingCastle, Qualys SCA, or similar vulnerability assessment platforms. Basic knowledge of Active Directory security and IT infrastructure components (e.g., servers, networks).Education & Experience: Bachelors degree in Cybersecurity, Information Technology, or a related field (or equivalent experience) 0-3 years of experience in cybersecurity or IT operations.

Posted 2 months ago

Apply

10.0 - 20.0 years

6 - 15 Lacs

Noida

Remote

Min Exp - 10 yrs Shift - 8:30 PM to 5:30 AM IST IT SDM with strong infrastructure expertise Managing SOC & NOC teams, Incident management, vulnerability scanning, patching cycles, Must know ITSM tools Share CV at kavita.singh@elevancesystems.com

Posted 2 months ago

Apply

5.0 - 8.0 years

15 - 22 Lacs

Bengaluru

Remote

Job Description: Systems Engineer (PCI Vulnerability Mitigation) Position Overview: We are seeking a highly skilled Systems Engineer with experience in identifying, mitigating, and managing PCI DSS (Payment Card Industry Data Security Standard) related vulnerabilities. The ideal candidate will have a strong background in systems engineering, security best practices, and vulnerability management to ensure the protection of sensitive payment data across enterprise systems. Key Responsibilities: - Identify, assess, and remediate vulnerabilities across infrastructure, applications, and cloud environments. - Collaborate with Security, Infrastructure, and Development teams to prioritize and implement vulnerability remediation efforts. - Perform vulnerability scans, risk assessments, and penetration tests to identify PCI-related risks. - Analyze scan results from tools such as Qualys, Tenable, or similar to prioritize vulnerabilities based on risk impact. - Develop and maintain system hardening standards in alignment with PCI DSS and industry best practices. - Create and maintain technical documentation, including vulnerability remediation plans, system configurations, and security policies. - Support audit and compliance assessments by providing evidence of vulnerability management and patching efforts. - Automate patch management and vulnerability remediation processes using tools like Ansible, PowerShell, or Python. - Monitor emerging threats, vulnerabilities, and vendor security patches to proactively address potential risks. Required Skills and Qualifications: - Bachelor's degree in Computer Science, Information Technology, or a related field (or equivalent experience). - 3+ years of experience in systems engineering or vulnerability management with a focus on PCI DSS compliance. - Experience with vulnerability scanning tools such as Qualys, Tenable or Nessus. - Hands-on experience in patch management and system hardening across Windows, Linux, and cloud platforms. - Solid understanding of network protocols, firewalls, and secure system configurations. - Experience with SIEM tools and log analysis for identifying security incidents. - Scripting skills (PowerShell, Python, Bash) to automate security tasks. - Strong documentation and communication skills. Preferred Qualifications: - Relevant certifications such as CompTIA Security+, CISSP, or PCI Professional (PCIP). - Experience with cloud environments (AWS, Azure, GCP) and cloud security controls. - Knowledge of container security (Docker, Kubernetes). - Experience working in Agile or DevOps environments.

Posted 2 months ago

Apply

5.0 - 8.0 years

15 - 30 Lacs

Bengaluru

Work from Office

Job Summary We are seeking a highly skilled and motivated Vulnerability Management Specialist with at least 5 years of hands-on experience in identifying, assessing, and mitigating security vulnerabilities across enterprise environments. The ideal candidate will have a strong understanding of cybersecurity principles, vulnerability scanning tools, and risk management frameworks, with the ability to communicate technical issues to non-technical stakeholders. Job Requirements • Manage the end-to-end vulnerability management lifecycle: discovery, classification, prioritization, remediation tracking, and reporting. • Conduct regular vulnerability assessments using tools such as Qualys, Tenable, Nessus, or Rapid7. • Collaborate with system owners, infrastructure teams, and developers to address and remediate vulnerabilities. • Monitor threat intelligence feeds to identify and assess emerging vulnerabilities. • Develop and maintain metrics and reports on vulnerability status, trends, and remediation progress. • Ensure compliance with internal security policies and external regulatory standards (e.g., PCI-DSS, ISO 27001, HIPAA). • Coordinate periodic penetration testing and work with external vendors as needed. • Assist in maintaining and improving the organization's vulnerability management processes and tools. • Strong analytical and problem-solving skills. • Excellent written and verbal communication. • Ability to manage multiple priorities and work effectively in a fast-paced environment. • Collaborative mindset with a strong sense of accountability. • Security certifications such as CISSP, CEH, OSCP, CompTIA Security+, or GIAC. • Experience with scripting languages (Python, PowerShell, Bash) for automation of vulnerability tasks. • Exposure to cloud environments (AWS, Azure, GCP) and related security controls. • Familiarity with SIEM and ticketing systems (e.g., Splunk, ServiceNow). Education • Bachelor's degree in Computer Science, Information Security, or a related field (or equivalent work experience). • Minimum of 5 years of professional experience in vulnerability management, information security, or a related domain. • Strong knowledge of operating systems (Windows, Linux, Unix), network protocols, and application architectures. • Hands-on experience with vulnerability scanning tools (e.g., Qualys, Nessus, Rapid7, Tenable.io). • Familiarity with patch management practices and tools. • Understanding of CVSS scoring, OWASP Top 10, and MITRE ATT&CK framework. • Experience interpreting and responding to vulnerability alerts (e.g., CVEs, vendor advisories).

Posted 2 months ago

Apply

2.0 - 4.0 years

10 - 11 Lacs

Hyderabad

Work from Office

Overview Exp. - 3-6 Years Location - Hyderabad, Bangalore, Gurgaon, Mumbai Shift - 11 AM - 8 PM Skills - Exp. in Vulnerability mgt., vulnerability scanning tools such as Qualys, Tenable, or Rapid7, Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). About Omnicom Global Solutions Omnicom Global Solutions is an integral part of Omnicom Group, a leading global marketing and corporate communications company. Omnicom’s branded networks and numerous specialty firms provide advertising, strategic media planning and buying, digital and interactive marketing, direct and promotional marketing, public relations, and other specialty communications services to over 5,000 clients in more than 70 countries. OGS India plays a critical role for our group companies and global agencies by providing stellar products, solutions, and services across Creative Services, Technology, Marketing Science (Data & Analytics), Advanced Analytics, Market Research, Business Support Services, Media Services, and Project Management. With over 4000 talented colleagues in India, we are growing rapidly and are looking for professionals like you to help build the next chapter of our journey. Responsibilities Role Overview We have an exciting opportunity for an Analyst, Vulnerability Management at our Hyderabad office. This role is central to maintaining and enhancing Omnicom’s cybersecurity framework by overseeing vulnerability assessments, remediation guidance, and program governance. As a Vulnerability Management Specialist, you will drive day-to-day scanning operations, review security exposures, and ensure that the organization’s attack surface is minimized through proactive analysis and mitigation. You’ll also collaborate on vendor assessments and support strategic improvements to our enterprise vulnerability management program. Key Responsibilities Maintain and operate vulnerability scanning tools and associated processes. Conduct regular scans and assessments of enterprise environments to detect security vulnerabilities. Review findings, prioritize risks, and recommend remediations or security patches in coordination with IT and security teams. Develop and present exception and management reports; track remediation status and escalate unresolved risks. Assist in creating and maintaining quality metrics and dashboards for vulnerability program performance. Monitor vendor and third-party security postures; support governance and compliance protocols. Collaborate with cross-functional teams to support risk mitigation strategies and secure configuration management. Contribute to the evolution of Omnicom’s next-generation vulnerability management and threat detection frameworks. Qualifications Required Qualifications 3–5 years of experience in vulnerability management, information security, or a related discipline. Proficiency with vulnerability scanning tools such as Qualys, Tenable, or Rapid7. Familiarity with patch management workflows and remediation lifecycle practices. Strong understanding of cybersecurity frameworks and standards (e.g., NIST, ISO 27001, CIS Controls). Ability to analyse technical findings, assess business impact, and provide actionable remediation guidance. Effective communication skills with experience in stakeholder engagement and reporting. Detail-oriented with strong problem-solving skills and the ability to work independently or in a team setting. Preferred Qualifications Security certifications such as CompTIA Security+, CEH, or equivalent. Exposure to vendor risk management and third-party security assessment. Experience with ITSM tools and ticketing systems for remediation tracking

Posted 2 months ago

Apply

2.0 - 6.0 years

3 - 7 Lacs

Gurugram

Work from Office

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Security Delivery Governance Good to have skills : NAMinimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Your day will involve ensuring the security of critical assets and systems. Roles & Responsibilities:- Expected to be an SME, collaborate, and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Expected to provide solutions to problems that apply across multiple teams.- Develop and implement security policies and procedures.- Conduct security assessments and audits.- Monitor security incidents and respond to breaches promptly.- Stay updated on the latest security trends and technologies. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Delivery Governance.- Strong understanding of security frameworks and compliance standards.- Experience in conducting risk assessments and vulnerability scans.- Knowledge of security tools and technologies.- Good To Have Skills: Experience with Security Incident Response.- Hands-on experience in implementing security controls and measures. Additional Information:- The candidate should have a minimum of 12 years of experience in Security Delivery Governance.- This position is based at our Gurugram office.- A 15 years full-time education is required. Qualification 15 years full time education

Posted 2 months ago

Apply

4.0 - 8.0 years

5 - 11 Lacs

Pune, Bengaluru, Mumbai (All Areas)

Hybrid

Role & responsibilities Experience in event monitoring, correlation, event analysis, investigate and remediation of security events Good knowledge and experience of Security Monitoring tools Good knowledge and experience of Cyber Incident Response Good knowledge and experience of Cyber Threat Intelligence and the role it plays Awareness of Cyber security issue and remediation Awareness of Attack & Penetration Testing / Ethical Hacking Use strong TCP/IP networking skills to perform network troubleshooting to isolate and diagnose common network problems Resolve problems independently and understand escalation procedure Interface with clients to understand the quality aspects and expectations, as needed Monitoring security events from the various SOC entry channels (Alerts, Tickets, and Email) based on the security event severity, escalate to Vendor/Customer/Product Development as appropriate to perform further investigation and resolution Follow ITIL practices regarding incident, problem and change management. Staying up-to-date with emerging security threats including applicable regulatory security requirements. Recommend enhancements to SOC security process, procedures and policies. Communicate effectively with customers, teammates, and management. Ability to quickly adapt and master new technology/processes as per the business/partner requirement. Mentoring the team to enhance their skills on the Security Domain Relevant professional experience including working knowledge or high level awareness of the following technologies: • Log Management and Event Management • Firewalls, Routers (e.g. Cisco, IPS, Palo Alto etc.) • Windows Management (e.g., Active Directory, Group Policy Objects, etc.) • Operating Systems (e.g. Windows Server 2008/2012, CentOS Linux, OSX, etc. •Understanding of different compliances. • Working experience and exposure on SIEM tool (eg : Splunk)"

Posted 2 months ago

Apply

4.0 - 9.0 years

12 - 17 Lacs

Bengaluru

Work from Office

Optum is a global organization that delivers care, aided by technology to help millions of people live healthier lives. The work you do with our team will directly improve health outcomes by connecting people with the care, pharmacy benefits, data and resources they need to feel their best. Here, you will find a culture guided by inclusion, talented peers, comprehensive benefits and career development opportunities. Come make an impact on the communities we serve as you help us advance health optimization on a global scale. Join us to start Caring. Connecting. Growing together. As a Senior Information Security Engineering Consultant, your responsibilities include administration, maintenance, architecture, and engineering related to on-premise and cloud security solutions. This includes, direct support, technical ownership, and leading others with regards to the platforms. Additional responsibilities as needed, but may include security posture review and analysis, security vulnerability scanning, monitoring and alerting development and tooling, and security incident response. Primary Responsibilities Work on-call and non-standard hours when necessary Support team leads and Subject Matter Expert (SME) for approaches, procedures, and implementation of Cybersecurity systems, specifically perimeter firewalls Be able to troubleshoot in highly complex, technical situations within an enterprise organization Be able to identify and mitigate risks Capable of formulating and implementing procedures and systems Be able to document and communicate on an expert level Have or be in process of obtaining advanced certifications pertinent to area of expertise Collaborate in the development of training content for issues related to IT Cybersecurity Develops and oversees the development of innovative approaches and solutions to complex problems and issues Supports the monitoring and responses to security incidents, offering expertise to ensure prompt and effective resolution Collaborates with director, managers, project managers, architects and other technical personnel to ensure mitigation of risks to the company Comply with the terms and conditions of the employment contract, company policies and procedures, and any and all directives (such as, but not limited to, transfer and/or re-assignment to different work locations, change in teams and/or work shifts, policies in regards to flexibility of work benefits and/or work environment, alternative work arrangements, and other decisions that may arise due to the changing business environment). The Company may adopt, vary or rescind these policies and directives in its absolute discretion and without any limitation (implied or otherwise) on its ability to do so Required Qualifications Graduate degree or equivalent experience 6+ years of experience in IT Security for large enterprise environments 5+ years of experience with next gen/firewall (ex. Palo Alto) 5+ years of experience with WAN/LAN routing, switching, proxy and firewall environments Work experience as a system security engineer or information security engineer Proven solid planning and problem-solving skills Proven ability to troubleshoot in highly complex, technical situations within a matrixed organization Preferred Qualification CompTIA Security +, or related certification, PCNSE, CCNA, Network +

Posted 2 months ago

Apply

3.0 - 7.0 years

13 - 17 Lacs

Hyderabad

Work from Office

Optum is a global organization that delivers care, aided by technology to help millions of people live healthier lives. The work you do with our team will directly improve health outcomes by connecting people with the care, pharmacy benefits, data and resources they need to feel their best. Here, you will find a culture guided by inclusion, talented peers, comprehensive benefits and career development opportunities. Come make an impact on the communities we serve as you help us advance health optimization on a global scale. Join us to start Caring. Connecting. Growing together. Azure Platform Engineer is responsible for designing, implementing, and managing cloud-based applications and solutions using Microsoft Azure. Primary Responsibilities Design and DevelopCreate and deploy Azure cloud-based solutions MaintenanceMonitor and maintain existing Azure infrastructure and workloads SecurityEnsure the security, performance, reliability, and scalability of Azure applications and infrastructure TroubleshootingPerform troubleshooting and root cause analysis for infrastructure issues CollaborationWork closely with developers to implement continuous delivery systems and methodologies on Azure DocumentationDefine and document best practices and strategies regarding application deployment and infrastructure maintenance TrainingProvide guidance, training, and mentorship to other team members on Azure technology and solutions Disaster RecoveryDevelop and implement disaster recovery plans Cost ManagementAssist in the development of cost management strategies for Azure usage Comply with the terms and conditions of the employment contract, company policies and procedures, and any and all directives (such as, but not limited to, transfer and/or re-assignment to different work locations, change in teams and/or work shifts, policies in regards to flexibility of work benefits and/or work environment, alternative work arrangements, and other decisions that may arise due to the changing business environment). The Company may adopt, vary or rescind these policies and directives in its absolute discretion and without any limitation (implied or otherwise) on its ability to do so Required Qualifications Bachelor’s or advanced Degree in a related technical field 7 + years IT experience 5+ years Azure Cloud Services and DevOps experience 4+ years of experience on Infrastructure as Code (Terraform/Ansible/Chef/Puppet) 4+ years of experience on Docker and Container Orchestration (Azure Kubernetes) 4+ years of experience on DevOps and CI/CD tools such as Git, Git Actions, Jenkins, Sonar, CodeQL etc. 4+ experience on Monitoring tools and technologies (Splunk, Dynatrace, new relic) Experience to design and implement Azure Cloud infrastructure and servicesAzure Container Apps, VNet with subnets, Private Endpoints for SQL MI, Cosmos/Mongo, Storage, GitHub for repos, CI/CD, container image scanning, secret scanning, Azure AD (SSO), Key Vault (secrets etc.), Azure App Gateway, Azure Load balancers and Private endpoints Azure Security ToolsProficiency with Azure Security Centre, Azure Active Directory, Azure Key Vault, and other Azure services Vulnerability ManagementProven ability to executing vulnerability scans and security assessments, and implementing remediation measures Secure Coding PracticesProven ability to ensure secure coding practices are followed in development Regulatory ComplianceProven ability to implement regulatory compliance controls for Azure infrastructure Proficient with Azure Security Centre, Azure Active Directory, Azure Key Vault, and other Azure services. Solid experience in executing vulnerability scans and security assessments and implementing remediation measures. Proficient Ensuring secure coding practices are followed in development. Work experience in Implementing regulatory compliance controls for Azure infrastructure Preferred Qualifications Hands-on scripting with one or moreYAML, JSON, PowerShell, BASH or Python Infrastructure Engineering experience Automation experience Good knowledge on SRE principles At UnitedHealth Group, our mission is to help people live healthier lives and make the health system work better for everyone. We believe everyone-of every race, gender, sexuality, age, location and income-deserves the opportunity to live their healthiest life. Today, however, there are still far too many barriers to good health which are disproportionately experienced by people of color, historically marginalized groups and those with lower incomes. We are committed to mitigating our impact on the environment and enabling and delivering equitable care that addresses health disparities and improves health outcomes — an enterprise priority reflected in our mission.

Posted 2 months ago

Apply

8.0 - 12.0 years

19 - 21 Lacs

Bengaluru

Work from Office

Responsibilities: * Design, implement, and maintain secure solutions on AWS cloud platform using IAM and security architecture principles.

Posted 2 months ago

Apply

4.0 - 6.0 years

25 - 30 Lacs

Bengaluru

Hybrid

Dodge Position Title: Senior Security Engineer Location: Bangalore, India Roles and Responsibilities Implement and optimize security tools such as SIEM, EDR, IDS/IPS Firewalls, and threat intelligence platforms to enhance threat detection and response. Configure and manage SIEM Indicators of Compromise (IoCs) to ensure accurate correlation, alerting, and detection of malicious activities. Continuously monitor and correlate network traffic, security alerts, and events to detect potential threats and anomalous activity. Follow incident response protocols, investigate security breaches, and work with internal teams to resolve vulnerabilities efficiently. Conduct regular security assessments, penetration tests, and vulnerability scans to identify risks and recommend improvements. Ensure the organization complies with relevant security standards, regulations, and best practices. Educate employees on cybersecurity best practices, phishing prevention, and safe internet usage to enhance the companys security posture. Work closely with IT staff to ensure secure configurations, patch management, and adherence to cybersecurity policies. Qualifications Hands-on working knowledge and experience is required in: Windows, Linux (Ubuntu, CentOS, Red Hat), macOS Firewalls (Palo Alto, Cisco ASA, Fortinet) SIEM Technologies (ArcSight, Splunk, QRadar, LogRythm, Sentinel, Exabeam, Insight IDR) TCP/IP, DNS, VPNs, Zero Trust Networking, WPA3 EDR/XDR/MDR (CrowdStrike, SentinelOne, Microsoft Defender ATP, Rapid7) Scripting (Python, PowerShell, Bash, SQL) Vulnerability Scanning (Nessus, Qualys) IDS/IPS/NSM (Snort, Suricata, Zeek, Security Onion) IAM Solutions (OAuth/SAML, Active Directory, AWS IAM) AWS Security Certification, Operating System: Linux, SIEM: Splunk, EDR/XDR/MDR: CrowdStrike or Defender or Sentinel One, Vulnerability Scan: Qualys, Network Security, Hands-on working knowledge and experience is preferred in: Penetration Testing Tools: Metasploit, Burp Suite, Nmap SDLC: SAST/DAST Experience Security Frameworks (NIST, ISO 27K1, CIS, SOC1/2) MITRE ATT&CK AWS Security Hub, Azure Security Center, Google Security Command Center Secrets Management (CyberArk Conjur, Hashicorp, AWS Secrets Mgr, Doppler) Encryption Tools: OpenSSL, BitLocker, VeraCrypt Certifications Preferred : Certified Information Systems Security Professional (CISSP) Certified Ethical Hacker (CEH) CompTIA Security+ Education and Years of Experience: At least 5 years of experience in cybersecurity, IT, or network administration

Posted 2 months ago

Apply

5 - 8 years

5 - 9 Lacs

Bengaluru

Work from Office

About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Vulnerability Scanning. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 2 months ago

Apply

2 - 7 years

8 - 15 Lacs

Hyderabad

Work from Office

Experience with review and implementation of Security Controls Experience with gap analysis and improvement recommendations, as per the best Industry practices and Security Frameworks (NIST, CIS, ISO etc.) Supports initiatives like zero trust Architecture, endpoint security, IAM, etc. Ensures policy alignment with business and regulatory needs. Focuses on cloud compliance, security configurations, and shared responsibility models. Hand on experience with network Security, operating systems, databases, and cloud platforms (AWS, Azure). Exposure to SIEM (e.g., Splunk, Chronicle), vulnerability scanners (e.g., Nessus, Qualys), EDR (CrowdStrike, Sentinel One, etc) Exposure to Risk management / Assessment

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies