Jobs
Interviews

13 Webinspect Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 9.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Educational Requirements Bachelor of Engineering Service Line Infosys Quality Engineering Responsibilities Hands-on knowledge of Security testing methodologies like OWASP Top 10, SANS 25 etc., Ability to perform automated and manual hands-on penetration security testing e.g. DAST, SAST and SCA, identifying security risks within applications, cloud infrastructure, security controls and Network systems. Additional Responsibilities: The successful candidate must be highly motivated, fast learner, flexible, willing to assume responsibility and deliver quality work on time Constantly identify opportunities for enhancing productivity using automation and process improvements. Exposure to scripting languages(e.g. Shell) Knowledge on DevSecOps Technical and Professional Requirements: Any specific tools required Burpsuite, WebInspect, Fortify, Zap, Checkmarx Preferred Skills: Technology-Security Testing-Security Testing - ALL

Posted 1 week ago

Apply

5.0 - 8.0 years

8 - 18 Lacs

Chennai

Hybrid

What you will do Review and triage new vulnerability tickets to validate the impact. Assist users by providing security guidance for remediation of Vulnerabilities. Validate remediation efforts from internal customers. Investigate possible security exceptions. Update, maintain and document security controls. Ensure application teams are implementing remediations within SLA Maintain documentation of work performed and remediation actions using ServiceNow ticketing system What you should possess Strong customer focus with the ability to advise and work closely with application teams and vendors on mitigation. Exposure to commercial and open-source tools such as Burpsuite, WebInspect, , Qualys, nmap, etc. Experience cataloguing and risk-scoring vulnerabilities discovered through assessments. Knowledge about public cloud environments Knowledge about basic computer networking and HTTP Good understanding and experience with: Web application security assessment, including hands-on techniques. Hands-on experience in identifying, mitigating, and remediating vulnerabilities based on OWASP Top10 (API, Web) Basic Scripting knowledge with the capability to automate analysis of technical engineering tasks using python, bash, or the use of PowerAutomate CVSS3 scoring and its use in risk rating. Basic experience with Linux Preferable certifications like CEH / ECSA / CompTIA or other equivalent security certifications What success looks like Prompt, effective review and collaboration on remediation of security vulnerabilities. Responsiveness to internal customer requests. Validation of remediated tickets within published service level agreements (SLAs). What you will do Review and triage new vulnerability tickets to validate the impact. Assist users by providing security guidance for remediation of Vulnerabilities. Validate remediation efforts from internal customers. Investigate possible security exceptions. Update, maintain and document security controls. Ensure application teams are implementing remediations within SLA Maintain documentation of work performed and remediation actions using ServiceNow ticketing system What you should possess Strong customer focus with the ability to advise and work closely with application teams and vendors on mitigation. Exposure to commercial and open-source tools such as Burpsuite, WebInspect, , Qualys, nmap, etc. Experience cataloguing and risk-scoring vulnerabilities discovered through assessments. Knowledge about public cloud environments Knowledge about basic computer networking and HTTP Good understanding and experience with: Web application security assessment, including hands-on techniques. Hands-on experience in identifying, mitigating, and remediating vulnerabilities based on OWASP Top10 (API, Web) Basic Scripting knowledge with the capability to automate analysis of technical engineering tasks using python, bash, or the use of PowerAutomate CVSS3 scoring and its use in risk rating. Basic experience with Linux Preferable certifications like CEH / ECSA / CompTIA or other equivalent security certifications What success looks like Prompt, effective review and collaboration on remediation of security vulnerabilities. Responsiveness to internal customer requests. Validation of remediated tickets within published service level agreements (SLAs). What You Can Expect A fun, cutting-edge, and collaborative environment A culture of innovation and continuous learning. Training, support, and mentoring to expand and evolve your expertise. Opportunities to impact the security of Comcast products in millions of homes and businesses What We Require: Bachelor's Degree in Computer Science, Information Systems, or other related field or equivalent work experience. Disclaimer: The above information has been designed to indicate the general nature and level of work performed by employees in this role. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications. Comcast is an EEO/AA/Drug Free Workplace. Comcast is an equal opportunity employer. A fun, cutting-edge, and collaborative environment A culture of innovation and continuous learning. Training, support, and mentoring to expand and evolve your expertise. Opportunities to impact the security of Comcast products in millions of homes and businesses What We Require: Bachelor's Degree in Computer Science, Information Systems, or other related field or equivalent work experience. Disclaimer: The above information has been designed to indicate the general nature and level of work performed by employees in this role. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications. Comcast is an EEO/AA/Drug Free Workplace. Comcast is an equal opportunity employer.

Posted 2 weeks ago

Apply

4.0 - 8.0 years

0 Lacs

maharashtra

On-site

As a highly organized Cybersecurity Officer at AmeriPharma, you will play a crucial role in managing system-wide healthcare compliance, information security, and privacy regulations. Reporting to the Director of Regulatory Affairs, you will be responsible for ensuring regulatory excellence, information security, and adherence to federal and state laws. Your primary focus will be on fostering a culture of accountability, trust, and risk management across all IT infrastructures. Your duties will involve developing and managing a comprehensive cybersecurity program in compliance with regulations such as HITECH, providing cybersecurity support during software and network development, conducting security and risk assessments, and managing annual risk assessments, vulnerability management, and penetration testing. You will also be responsible for implementing security measures, overseeing compliance with patient data protection regulations, and managing cyber threats, incident response, and forensic investigations. To be successful in this role, you must have expertise in HIPAA, HITECH, HITRUST, and cybersecurity frameworks, along with extensive experience in risk management, information security, and regulatory compliance auditing. Strong technical knowledge in network security, cloud security, and identity access management is essential, as well as exceptional communication skills and the ability to make strategic, data-driven decisions in high-pressure environments. You will collaborate with IT teams to improve security controls across cloud, network, and endpoints, lead cybersecurity awareness training programs for employees, align cybersecurity initiatives with business objectives, and innovate in cybersecurity frameworks, AI-driven threat detection, and cloud security. Additionally, you will engage with industry leaders and regulatory bodies on emerging cybersecurity threats and develop and test software applications using Agile methodologies. The ideal candidate will have a Bachelor's degree in Computer Science, Information Technology, or a related field, along with certifications such as CompTIA A+, Network+, CISSP, CCNA, MSCE, or MCSD. A minimum of 4 years of experience in Engineering, Software Engineering, or related fields is required, as well as proficiency in cybersecurity tools and platforms. If you are passionate about cybersecurity, have a strong background in regulatory compliance and risk management, and are looking for a challenging and rewarding opportunity to make a difference in healthcare IT security, we invite you to join our dynamic team at AmeriPharma.,

Posted 2 weeks ago

Apply

8.0 - 10.0 years

20 - 25 Lacs

Hyderabad

Work from Office

Your Impact: Fortify on Demand is an end-to-end platform for all your AppSec needs. We are the only application security provider to offer SAST, SCA, DAST, IAST, and MAST as a service. We help our customers to achieve fast remediation throughout the software lifecycle with robust assessments by a team of security experts. Experience in Production Operations (or Support), driving Incident management calls for escalations are a must. What it takes: This is a Principal technical support engineer role in the Fortify on Demand team, with a goal to provide the highest level of customer satisfaction. As an Enterprise Support Engineer, you will act as a single point of contact your assigned customers, providing technical support on the Fortify on Demand offering. The role is to provide expert technical support guidance to customers for the Application Security needs, working proactively to avoid issues and ensuring rapid incident resolution when problems occur. As a Technical Account Manager, you will conduct troubleshooting, gather diagnostics, reproduce problems, diagnose faults and escalate software change requests to Fortify Product Engineering. The goal is to become a trusted support advisor and ensure that customers are successful in their use of their FoD service. What you need to succeed: Technical University or Bachelor's degree preferred. Typically 8-10 years experience in technical support and/or consulting. Experience in AppSec desired Experience with AppSec tools (Fortify SCA, Fortify WebInspect or equivalent tools) Excellent verbal and written communication skills in English Knowledge of German and/or French would be a plus Advanced troubleshooting skills in a technical environment. Advanced proficiency with case management databases and tools. Superior customer service skills. Phone and remote support experience. Knowledge and resolution ability. Ability to solve and document solutions for usage of other technicians and customers. Ability to train peers on solutions. Ability to take ownership for resolution with escalated customers. Ability to lead technical action plans. Lead or provide expertise to teams or projects. Good To Have Knowledge of cloud platforms AWS, Azure, Google Pipelines Jenkins, Azure DevOps Containers Docker, Kubernetes Git/Version control/SCCM CEH or equivalent certification DevOps Open-source platforms

Posted 3 weeks ago

Apply

5.0 - 8.0 years

7 - 10 Lacs

Bengaluru

Work from Office

Your Impact As part of the Product Security team, you must have a strong understanding of information security processes across product development lifecycle including secure coding principle, static code / dynamic scanning, application penetration testing, container security, cloud security, supply chain security and threat modelling the applications. You should be familiar with the industry best practices for information security policies and product security. standards. You will have the opportunity to collaborate with the product stakeholders such as product development, cloud operation, system architects, security champions, Global Information Security on the Product security process and customer escalations/support What The Role Offers Please review the below write up and highlight for any corrects Strategic Planning: Align application security initiatives with business goals; refine Product Security processes and tools. Technical Leadership: Stay updated on the latest trends and advancements in application security and apply them to continually improve the organizations security program. Recommend mitigations for vulnerabilities; manage third-party and open-source software risk. Architecture and Design: Review application designs for security best practices. Design, enhance, and advocate for the threat modelling process. Conduct threat modelling and advise product teams on implementing appropriate security controls. Security Reviews: Conduct security assessments throughout the development lifecycle. Collaborate with development teams to remediate security vulnerabilities. Code Review and Analysis: Conduct code reviews and implement automated code analysis tools. Secure Development Practices: Enforce secure coding practices, train developers in secure coding. Incident Response/Customer Escalations: Lead incident response efforts related to application security incidents. Work with cross-functional teams to investigate and remediate security breaches. Policy and Standards: Develop and enforce application security policies; ensure compliance with industry standards. Security Testing: Oversee the implementation of security testing methodologies Conduct Penetration Testing activity for applications/systems Security Awareness: Promote security awareness across engineering; conduct training for development teams on Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). Collaboration: Collaborate with cross-functional teams, including development, operations, GIS, etc., to integrate security into all aspects of the software development lifecycle and improve security maturity. Documentation and Reporting: Maintain comprehensive documentation of security processes/policies; produce maturity status reports for senior management. Generate reports and conduct peer reviews. Research and Innovation: Stay informed on emerging threats and vulnerabilities, and proactively implement innovative security solutions. Vendor and Tool Evaluation: Evaluate and recommend security tools/technologies; Manage vendor relationships What You Need To Succeed 5 - 8 years of experience with the relevant technologies Bachelors degree in engineering, computer science or equivalent is preferred Industry standard best practices on application security controls, requirements, features, and specifications Application security issues, weaknesses, vulnerabilities, threats, risks, and impacts of exploitation Familiarity with Security Standards and groups (OWASP, PCI, SANS, OSSTMM etc.) Strong vulnerability assessment experience of web, mobile and thick client applications, RESTful & JSON APIs, web servers, databases, and hosting environments (cloud, off-cloud, Containers) Strong experience in manual vulnerability assessment and penetration testing Hands on experience on Application Security tools such as Fortify, WebInspect, Burp, etc. Experience in planning, researching and developing security policies, standards and procedures in line with industry best practices A natural curiosity to learn how things work, and more importantly, how they can be made to work outside of their intended purposes, (i.e. the ethical hacker mentality) Preferably to have application security penetration testing related certifications, (e.g. GWAPT, OSWE, OSCP, GPEN, CPTE, CEH, GWEB, GCIH, etc.) Highly desirable to have general information security related certifications, (e.g. CISSP, CISM, GSEC, CCSP, etc.) Should have excellent team playing and collaborative skills, to work with multiple stake holders. Strong analytical, troubleshooting, writing, communication, and consultancy skills Possess a commitment to quality and a thorough approach to work.

Posted 3 weeks ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Hyderabad

Work from Office

YOUR IMPACT As part of the Product Security team, you must have a strong understanding of information security processes across product development lifecycle including secure coding principle, static code / dynamic scanning, application penetration testing, container security, cloud security, supply chain security and threat modelling the applications. You should be familiar with the industry best practices for information security policies and product security. standards. You will have the opportunity to collaborate with the product stakeholders such as product development, cloud operation, system architects, security champions, Global Information Security on the Product security process and customer escalations/support What The Role Offers Strategic Planning: Align application security initiatives with business goals; refine Product Security processes and tools. Technical Leadership: Stay updated on the latest trends and advancements in application security and apply them to continually improve the organizations security program. Recommend mitigations for vulnerabilities; manage third-party and open-source software risk. Architecture and Design: Review application designs for security best practices. Design, enhance, and advocate for the threat modelling process. Conduct threat modelling and advise product teams on implementing appropriate security controls. Security Reviews: Conduct security assessments throughout the development lifecycle. Collaborate with development teams to remediate security vulnerabilities. Code Review and Analysis: Conduct code reviews and implement automated code analysis tools. Secure Development Practices: Enforce secure coding practices, train developers in secure coding. Incident Response/Customer Escalations: Lead incident response efforts related to application security incidents. Work with cross-functional teams to investigate and remediate security breaches. Policy and Standards: Develop and enforce application security policies; ensure compliance with industry standards. Security Testing: Oversee the implementation of security testing methodologies Conduct Penetration Testing activity for applications/systems Security Awareness: Promote security awareness across engineering; conduct training for development teams on Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). Collaboration: Collaborate with cross-functional teams, including development, operations, GIS, etc., to integrate security into all aspects of the software development lifecycle and improve security maturity. Documentation and Reporting: Maintain comprehensive documentation of security processes/policies; produce maturity status reports for senior management. Generate reports and conduct peer reviews. Research and Innovation: Stay informed on emerging threats and vulnerabilities, and proactively implement innovative security solutions. Vendor and Tool Evaluation: Evaluate and recommend security tools/technologies; Manage vendor relationships What You Need To Succeed Industry standard best practices on application security controls, requirements, features, and specifications Application security issues, weaknesses, vulnerabilities, threats, risks, and impacts of exploitation Familiarity with Security Standards and groups (OWASP, PCI, SANS, OSSTMM etc.) Strong vulnerability assessment experience of web, mobile and thick client applications, RESTful & JSON APIs, web servers, databases, and hosting environments (cloud, off-cloud, Containers) Strong experience in manual vulnerability assessment and penetration testing Hands on experience on Application Security tools such as Fortify, WebInspect, Burp, etc. Experience in planning, researching and developing security policies, standards and procedures in line with industry best practices A natural curiosity to learn how things work, and more importantly, how they can be made to work outside of their intended purposes, (i.e. the ethical hacker mentality) Preferably to have application security penetration testing related certifications, (e.g. GWAPT, OSWE, OSCP, GPEN, CPTE, CEH, GWEB, GCIH, etc.) Highly desirable to have general information security related certifications, (e.g. CISSP, CISM, GSEC, CCSP, etc.) Should have excellent team playing and collaborative skills, to work with multiple stake holders. Strong analytical, troubleshooting, writing, communication, and consultancy skills Possess a commitment to quality and a thorough approach to work Education and Experience: B.E./B.Tech/Bachelors/Master of Computer Science or equivalent Industry Experience: 2 - 4 years of relevant experience

Posted 3 weeks ago

Apply

4.0 - 9.0 years

22 - 25 Lacs

Pune, Bengaluru

Hybrid

Job Title: WebPT P1 - Consultant Location: Bangalore & Pune (Hybrid Role) Contract Duration: 6 Months Roles & Responsibilities: Perform automated testing of running applications and static code (SAST, DAST). Conduct manual application penetration tests on one or more of the following to discover and exploit vulnerabilities: Web applications Internal applications APIs Internal and external networks Mobile applications Experience in one or more of the following is a plus: Mobile application testing Web application pen testing Application architecture Business logic analysis Work on application tools to perform security tests, including: AppScan NetsSparker Acunetix Checkmarx Veracode BurpSuite OWASP ZAP Kali Linux Able to explain vulnerabilities such as: IDOR (Insecure Direct Object References) Second Order SQL Injection CSRF (Cross-Site Request Forgery) Provide root cause analysis and remediation guidance for identified vulnerabilities. Mandatory Technical & Functional Skills: Minimum three (3) years of recent experience working with application tools to perform security tests: AppScan NetsSparker Acunetix Checkmarx Veracode BurpSuite OWASP ZAP Kali Linux (or equivalent) Minimum three (3) years of performing manual penetration testing and code review against: Web applications Mobile apps APIs Minimum three (3) years of experience working with both technical and non-technical audiences in reporting results and leading remediation conversations. Preferred: One year of experience in the development of web applications and/or APIs. Ability to identify and work with new tools/technologies to plug and play on client projects as needed to solve the problem at hand. Certifications (Preferred but not required): GWAPT (GIAC Web Application Penetration Tester) CREST (Certified Testing Professional) OSCP (Offensive Security Certified Professional) OSWE (Offensive Security Web Expert) OSWA (Offensive Security Web Application) This is a 6-month contract role with hybrid work arrangements in Bangalore and Pune .

Posted 3 weeks ago

Apply

8.0 - 11.0 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Dear Candidate, We are hiring a Compliance Engineer to ensure code and dependencies meet licensing and audit standards. Key Responsibilities: Track open-source usage and license compliance. Automate compliance scanning and reporting. Assist in security reviews and audits. Required Skills & Qualifications: Familiarity with tools like FOSSA, Black Duck. Knowledge of OSS licenses (MIT, GPL, Apache). Experience with code scanning and SBOMs. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Delivery Manager Integra Technologies

Posted 3 weeks ago

Apply

6.0 - 9.0 years

10 - 14 Lacs

Chennai

Work from Office

Comcast brings together the best in media and technology We drive innovation to create the world's best entertainment and online experiences As a Fortune 50 leader, we set the pace in a variety of innovative and fascinating businesses and create career opportunities across a wide range of locations and disciplines We are at the forefront of change and move at an amazing pace, thanks to our remarkable people, who bring cutting-edge products and services to life for millions of customers every day If you share in our passion for teamwork, our vision to revolutionize industries and our goal to lead the future in media and technology, we want you to fast-forward your career at Comcast Job Summary "Responsible for contributing towards the build and maintenance of the organization's cyber security systems and infrastructure Exercises solid knowledge of engineering skills and methodology with a working knowledge of applicable cyber security compliance standards Conducts security assessments and audits to identify cybersecurity risks within the company's networks, applications and operating systems Helps secure and protect the Network Infrastructure: Routers, Switches, Optical Devices, L2 Datacenter and cabling, Strand Mounted devices, Secure Routing protocols, DOCSIS plant (CMTS/vCMTS/PON), SDN, best practice device configuration, network automation, monitoring and troubleshooting Tests company's internal systems to validate security and detect any computer and information security weaknesses Performs a technical analysis of vulnerabilities and determines the impacts to the organization Reports, tracks and records findings in a comprehensive vulnerability assessment report Identifies and recommends appropriate action to mitigate vulnerabilities and reduce potential impacts on cybersecurity resources Applies long-term objectives and plans related to the company's technical vision to daily activity Applies innovative solutions for cyber engineering developmental problems that are competitive with industry and company standards Has in-depth experience, knowledge and skills in own discipline Usually determines own work priorities Acts as a resource for colleagues with less experience Employees at all levels are expect to: Understand our Operating Principles; make them the guidelines for how you do your job Own the customer experience think and act in ways that put our customers first, give them seamless digital options at every touchpoint, and make them promoters of our products and services Know your stuff be enthusiastic learners, users and advocates of our game-changing technology, products and services, especially our digital tools and experiences Win as a team make big things happen by working together and being open to new ideas Be an active part of the Net Promoter System a way of working that brings more employee and customer feedback into the company by joining huddles, making call backs and helping us elevate opportunities to do better for our customers Drive results and growth Respect and promote inclusion and diversity Do what's right for each other, our customers, investors and our communities" Job Description What you will do Review and triage new vulnerability tickets to validate the impact Assist users by providing security guidance for remediation of Vulnerabilities Validate remediation efforts from internal customers Investigate possible security exceptions Update, maintain and document security controls Ensure application teams are implementing remediations within SLA Maintain documentation of work performed and remediation actions using ServiceNow ticketing system What You Should Possess Strong customer focus with the ability to advise and work closely with application teams and vendors on mitigation Exposure to commercial and open-source tools such as Burpsuite, WebInspect, , Qualys, nmap, etc Experience cataloguing and risk-scoring vulnerabilities discovered through assessments Knowledge about public cloud environments Knowledge about basic computer networking and HTTP Good understanding and experience with: Web application security assessment, including hands-on techniques Hands-on experience in identifying, mitigating, and remediating vulnerabilities based on OWASP Top10 (API, Web) Basic Scripting knowledge with the capability to automate analysis of technical engineering tasks using python, bash, or the use of PowerAutomate CVSS3 scoring and its use in risk rating Basic experience with Linux Preferable certifications like CEH / ECSA / CompTIA or other equivalent security certifications What Success Looks Like Prompt, effective review and collaboration on remediation of security vulnerabilities Responsiveness to internal customer requests Validation of remediated tickets within published service level agreements (SLAs) What You Can Expect A fun, cutting-edge, and collaborative environment A culture of innovation and continuous learning Training, support, and mentoring to expand and evolve your expertise Opportunities to impact the security of Comcast products in millions of homes and businesses What We Require Bachelor's Degree in Computer Science, Information Systems, or other related field or equivalent work experience Disclaimer This information has been designed to indicate the general nature and level of work performed by employees in this role It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities and qualifications Comcast is proud to be an equal opportunity workplace We will consider all qualified applicants for employment without regard to race, color, religion, age, sex, sexual orientation, gender identity, national origin, disability, veteran status, genetic information, or any other basis protected by applicable law Base pay is one part of the Total Rewards that Comcast provides to compensate and recognize employees for their work Most sales positions are eligible for a Commission under the terms of an applicable plan, while most non-sales positions are eligible for a Bonus Additionally, Comcast provides best-in-class Benefits to eligible employees We believe that benefits should connect you to the support you need when it matters most, and should help you care for those who matter most Thats why we provide an array of options, expert guidance and always-on tools, that are personalized to meet the needs of your reality to help support you physically, financially and emotionally through the big milestones and in your everyday life Please visit the compensation and benefits summary on our careers site for more details Education Bachelor's Degree While possessing the stated degree is preferred, Comcast also may consider applicants who hold some combination of coursework and experience, or who have extensive related professional experience Relevant Work Experience 5-7 Years

Posted 1 month ago

Apply

7.0 - 12.0 years

9 - 14 Lacs

Bengaluru

Work from Office

Position Purpose The purpose of the position is to help with the information security topics mentioned in the direct responsibilities. Responsibilities Direct Responsibilities - Executing IT risk assessment reviews, identifying controls gaps and working in collaboration with subject matter experts to devise appropriate mitigation plans. Identifying key risk trends, issues and other insights requiring further investigation and following up with Technology as appropriate. Knowledge of Secure Development methodologies and frameworks. Hands-on experience in penetration testing and tools like AppScan, Webinspect, Fortify, AppSpider, BurpSuite, Qualys, Checkmarx, Coverity Well-versed in conducting Security Review, Assessments and providing recommendations. Knowledge of OWASP, SANS standards. Experience in Process Improvement, Controls Enhancement and Reporting. - Engaging with organization wide risk and control groups, including internal audit and territory control teams. - Working with Technology stakeholders (including Production Support and Development teams) to identify the IT risks affecting the organization and formulating appropriate remediation strategies based on full understanding of business exposure and compensating controls. Contributing Responsibilities Excellent understanding of development security and its implementation in systems: identification, authentication, access control and provisioning, alignment of jurisdiction to business process Knowledge of single-sign-on security strategies (e.g. SAML, OAUTH2, SiteMinder etc.) Excellent understanding of authentication related mechanisms (Kerberos, One Time Passwords, PKI) Good understanding of cryptography and its practical uses within secure application development Familiarity with common security vulnerabilities (e.g. OWASP Top 10) Strong technical skills required to understand vulnerabilities in detail and how to resolve/mitigate them. Excellent knowledge of programming best practices, design patterns, etc. Excellent problem solving skills, being able to develop approaches to complex technology and strategy problems, building consensus across diverse interest groups and working within constraints of practical delivery yet able to think beyond the requirements of immediate issues. Well-developed written communication skills with the ability to summarise key issues, conclusions and recommendations in report form. Target audiences will include regulatory authorities and internal/external auditors. Technical & Behavioral Competencies Excellent knowledge of programming best practices, design patterns, etc. Excellent problem solving skills, being able to develop approaches to complex technology and strategy problems, building consensus across diverse interest groups and working within constraints of practical delivery yet able to think beyond the requirements of immediate issues. Well-developed written communication skills with the ability to summarize key issues, conclusions and recommendations in report form. Target audiences will include regulatory authorities and internal/external auditors. Hands-on experience in penetration testing and tools like AppScan, Webinspect, Fortify, AppSpider, BurpSuite, Qualys, Checkmarx, Coverity, Sonatype, Blackduck Well-versed in conducting Security Review, Assessments and providing recommendations. Knowledge of OWASP, SANS standards. Experience in Process Improvement, Controls Enhancement and Reporting. Excellent Inter personal and presentation skills Strong in verbal and written communication Ability to liaise with cross-functional stakeholders globally Clear understanding of application and data security Must be flexible, independent, self-motivated Good analytical skills Specific Qualifications (if required) - CEH, SSCP, OSCP certified. - Technical Graduate (Computer Science) Preferable. Skills Referential Behavioural Skills : (Please select up to 4 skills) Ability to collaborate / Teamwork Communication skills - oral & written Ability to share / pass on knowledge Active listening Transversal Skills: (Please select up to 5 skills) Ability to understand, explain and support change Analytical Ability Ability to develop and adapt a process Ability to develop and leverage networks Ability to manage / facilitate a meeting, seminar, committee, training Education Level: Bachelor Degree or equivalent Experience Level At least 7 years

Posted 1 month ago

Apply

5.0 - 9.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Educational Requirements Bachelor of Engineering Service Line Infosys Quality Engineering Responsibilities Hands-on knowledge of Security testing methodologies like OWASP Top 10, SANS 25 etc., Ability to perform automated and manual hands-on penetration security testing e.g. DAST, SAST and SCA, identifying security risks within applications, cloud infrastructure, security controls and Network systems. Additional Responsibilities: The successful candidate must be highly motivated, fast learner, flexible, willing to assume responsibility and deliver quality work on time Constantly identify opportunities for enhancing productivity using automation and process improvements. Exposure to scripting languages(e.g. Shell) Knowledge on DevSecOps Technical and Professional Requirements: Any specific tools required Burpsuite, WebInspect, Fortify, Zap, Checkmarx Preferred Skills: Technology->Security Testing->Security Testing - ALL

Posted 1 month ago

Apply

7 - 9 years

37 - 40 Lacs

Ahmedabad, Bengaluru, Mumbai (All Areas)

Work from Office

Dear Candidate, We are hiring a Penetration Tester to simulate attacks and discover security vulnerabilities in critical systems. Perfect for professionals skilled in offensive security techniques. Key Responsibilities: Conduct penetration tests on web, mobile, and network systems Document vulnerabilities and remediation recommendations Develop exploits and custom testing tools Collaborate with developers to address findings Required Skills & Qualifications: Proficiency with penetration testing tools (Burp Suite, Metasploit, Nmap) Strong understanding of application and network security Experience writing exploit scripts (Python, Bash) Bonus: OSCP, OSWE, or CEH certification Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies

Posted 2 months ago

Apply

8 - 11 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Dear Candidate, We are hiring a Security Engineer to design and implement secure systems across cloud and application environments. Ideal for engineers excited about threat modeling and proactive defense. Key Responsibilities: Perform security assessments and code reviews Develop security policies and incident response procedures Implement security controls in cloud and on-prem environments Monitor for vulnerabilities and recommend mitigation Required Skills & Qualifications: Knowledge of OWASP Top 10, secure coding practices Experience with SIEM, IDS/IPS, and vulnerability scanners Familiarity with cloud security (AWS, Azure, GCP) Bonus: Certifications (CISSP, CEH, OSCP) Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Delivery Manager Integra Technologies

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies