Home
Jobs

684 Vulnerability Assessment Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

6.0 - 10.0 years

22 - 30 Lacs

Hyderabad

Work from Office

Naukri logo

This position is responsible for executing and troubleshooting test cases between lab systems, performing test-affected lookups, maintaining ancillary databases, and analyzing data impacts. This role requires advanced analytical skills and the ability to execute complex test plans. Duties and Responsibilities: Execute Secondary Interface and complex processing system test plans, including creating accessions, entering results, generating processing labels, reviewing results, and performing retesting. Perform test-affected analysis, document findings, and assess the impact of system changes. Conduct quality control reviews of database updates and ensure data integrity. Handle draw fee updates and modifications, including site-specific draw fee changes. Review and update SHLs (sample handling logic) in QTIM database. Manage eDBR cases and oversee database modifications in QTIM database. Perform Y-site updates and database maintenance in ancillary systems. Create interface test plans and oversee their execution. Review and process custom panel request, ensuring accuracy and compliance. Follow established processes and procedures to meet Service Level Agreements (SLAs) and Service Level Objectives (SLOs). Provide troubleshooting support for database-related issues. Ensure compliance with database policies, procedures, conventions, and guidelines. Perform additional database-related tasks as assigned.

Posted 9 hours ago

Apply

4.0 - 9.0 years

15 - 30 Lacs

Hyderabad

Work from Office

Naukri logo

The primary responsibilities include managing vulnerability assessments using the Qualys tool, creating detailed metrics and reports, and collaborating with relevant teams to ensure timely remediation of identified vulnerabilities. To ensure the organization's IT infrastructure remains secure by proactively identifying, assessing, and mitigating vulnerabilities through effective use of the Qualys tool and coordinated efforts with cross-functional teams. The basic purpose of this position is to safeguard the organization's digital assets by maintaining a robust vulnerability management program that prioritizes risk reduction and compliance with security policies. Perform daily vulnerability assessments, create weekly metrics and reports, and handle ad-hoc requests as they arise. Work on analytical projects to enhance the vulnerability management process and develop strategies to address identified security issues. Prepare and present metrics and reports to senior leadership, showcasing trends in vulnerabilities over the year and how they are being addressed. Produce reports daily, weekly, and as needed on vulnerability assessments and remediation efforts. Responsible for training new hires and occasionally participating in candidate interviews. Technical/Job Specific Knowledge Vulnerability Management: In-depth knowledge of vulnerability assessment, prioritization, and remediation processes. Qualys: Proficiency in using Qualys for scanning, identifying, and managing vulnerabilities across various environments. Security Frameworks: Familiarity with industry standards and frameworks such as OWASP, NIST, and CIS. Network Security: Understanding of network protocols, firewalls, and intrusion detection/prevention systems. Skills Analytical Skills: Strong analytical abilities to identify and assess vulnerabilities and their potential impact. Technical Aptitude: Competence in using security tools and technologies to perform thorough assessments. Problem-Solving: Effective problem-solving skills to develop and implement remediation plans. Communication: Clear and concise communication skills to report findings and collaborate with different teams. Attention to Detail: High level of attention.

Posted 9 hours ago

Apply

2.0 - 6.0 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 10 hours ago

Apply

5.0 - 10.0 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

Key Responsibilities: Lead and execute vulnerability assessments across enterprise systems using Qualys VMDR and related modules. Manage and optimize Qualys scanning infrastructure including scanner appliances and cloud agents. Develop and maintain scanning strategies and schedules for internal and external assets. Analyze scan results, prioritize vulnerabilities based on risk, and coordinate remediation efforts with stakeholders. Generate detailed reports and dashboards using Qualys reporting tools and best practices. Ensure compliance with internal security policies and external regulatory requirements. Provide technical guidance and mentorship to junior team members. Collaborate with IT, DevOps, and application teams to integrate vulnerability management into CI/CD pipelines. Required Skills and Experience: 5+ years of experience in vulnerability assessment and management. Hands-on experience with Qualys VMDR, Patch Management, and Continuous Monitoring. Strong understanding of vulnerability lifecycle, CVSS scoring, and remediation workflows. Experience with asset discovery, host tracking, and scanning best practices. Familiarity with scripting (Python, PowerShell) for automation and integration. Knowledge of network protocols, operating systems, and web application security. Industry certifications such as CEH, CISSP, or Qualys certifications are a plus. Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Vulnerability Management. Experience3-5 Years.

Posted 10 hours ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: SAP Security. Experience5-8 Years.

Posted 10 hours ago

Apply

5.0 - 8.0 years

5 - 9 Lacs

Mumbai

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Active Directory. Experience5-8 Years.

Posted 10 hours ago

Apply

5.0 - 7.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

Job Summary Assist in implementing, maintaining and testing SOX controls supporting the Application Managers for custom applications and 3rd party Applications, support internal and external audits, and identify potential SOX compliance risks. Key Responsibilities: Pre-Implementation Quality CheckConduct a thorough review of controls design and implementation before product/functional go-live, based on evidence submitted by engineering and application management teams. SOX ITGC and Automated Controls EvaluationTest and evaluate the effectiveness of SOX IT General Controls (ITGC) and automated controls using audit checklists prepared by the Controls team to: Maintain SOX controls for internal and third-party products Support internal and external audits related to SOX compliance Control Testing DocumentationDocument control testing procedures and findings in a clear and concise manner. Control Deficiency Identification and ReportingIdentify and report any control deficiencies or weaknesses to ensure prompt remediation. SOX Compliance ReportingPrepare comprehensive reports and documentation for SOX compliance activities, including testing results and control evaluations. Cross-Functional CollaborationCollaborate with cross-functional teams to ensure the thoroughness and accuracy of controls implementation and testing. Educational Qualifications: Bachelor's degree in engineering, finance, or a related field CIA, CISA or CISSP certification Experience: 5-7 years of experience in SOX compliance testing, internal controls, or auditing Knowledge: Strong understanding of SOX regulations, internal controls, and accounting principles. Familiarity with auditing Oracle, Workday and/or Salesforce suite of applications. Skills: Strong analytical and problem-solving skills Excellent communication and interpersonal skills Ability to work independently and as part of a team CertificationCISA preferred Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: GRC Consulting. Experience5-8 Years.

Posted 10 hours ago

Apply

7.0 - 12.0 years

20 - 25 Lacs

Pune

Work from Office

Naukri logo

Mandate Skills- SIEM, PAM, Endpoint security & Vulnerability assessment. Key Responsibilities Incident Response and Management: Lead the incident response process, including identification, containment, eradication, and recovery. Analyze and respond to complex security incidents and breaches. Conduct post-incident analysis and develop reports with recommendations to prevent future incidents. Security Monitoring and Analysis: Oversee the continuous monitoring of security alerts and events. Analyze logs and data from various sources (e.g., SIEM, firewalls, EDR, IDS/IPS) to identify suspicious activity. Perform advanced threat hunting and forensic analysis. Vulnerability Management: Conduct regular vulnerability assessments. Identify, prioritize, and remediate security vulnerabilities in systems and applications. Collaborate with IT and development teams to implement security patches and updates. Security Architecture and Engineering: Design and implement security solutions to protect the organization's networks, systems, and data. Develop and maintain security policies, standards, and procedures. Evaluate and recommend new security technologies and tools. Compliance and Risk Management: Ensure compliance with relevant regulatory requirements and industry standards (e.g., ISO 27001, NIST). Perform risk assessments and develop mitigation strategies. Document and maintain security controls and frameworks. Required Skills and Qualifications Technical Expertise: Advanced knowledge of cybersecurity principles, techniques, and technologies. Proficiency in using security tools such as SIEM, IDS/IPS, firewalls, and endpoint protection solutions. Experience with vulnerability management, penetration testing, and forensic analysis. Experience: Minimum of 7-10 years of experience in cybersecurity, with at least 2-3 years in an L3 or senior role. Proven track record of handling complex security incidents and leading incident response efforts. Experience in designing and implementing security architectures and solutions. Certifications: Relevant certifications such as CISSP, CISM, CEH, GIAC, or equivalent are highly desirable. Analytical and Problem-Solving Skills: Strong analytical skills with the ability to identify and mitigate security threats. Excellent problem-solving skills and the ability to think critically under pressure. Communication and Collaboration: Strong communication skills, both written and verbal. Ability to collaborate effectively with cross-functional teams and stakeholders. Preferred Skills and Qualifications Experience with cloud security (e.g., AWS, Azure, Google Cloud). Knowledge of scripting and automation tools (e.g., Python, PowerShell). Familiarity with regulatory requirements and standards (e.g., GDPR, HIPAA).

Posted 11 hours ago

Apply

4.0 - 9.0 years

14 - 24 Lacs

Mumbai

Work from Office

Naukri logo

We are looking for someone who has good hands on experience in VAPT. This role is with one of the government department of Maharashtra. Education: B.E/B. Tech / M.Sc. (Comp. Sci) / MCA / MBA/ M. Tech degree or equivalent. Should be a certified auditor. 6 or more years of overall experience with at least 6 years of relevant experience in Vulnerability Analysis, Penetration Testing and/or forensics. Must have experience in managing at least 3 projects for large, enterprise scale Clients. should have at least two industry certifications as mentioned below: 1. Licensed Penetration Tester (LPT) 2. Certified Penetration Testing Professional (CPENT) 3. Certified Expert Penetration Tester (CEPT) 4. GIAC Penetration Tester (GPEN) 5. CompTIA PenTest+ 6. Certified Ethical Hacker (CEH) 7. Certified Mobile and Web App Penetration Tester (CMWAPT) 8. Computer Hacking Forensic Investigator (CHFI) 9. Certified Information System Auditor (CISA) 10. Certified Information Security Manager (CISM) 11. Other acceptable industry related certification in VAPT. 12. OSCP

Posted 13 hours ago

Apply

8.0 - 11.0 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Naukri logo

Dear Candidate, We are hiring a Cloud Security Specialist to secure cloud infrastructure and applications across AWS, Azure, or GCP. Ideal for professionals skilled in cloud-native security controls and monitoring. Key Responsibilities: Implement cloud security policies, IAM, and encryption Monitor cloud environments for threats and misconfigurations Conduct security assessments and remediation Collaborate with DevOps and compliance teams on secure deployments Required Skills & Qualifications: Experience with AWS, Azure, or GCP security services (e.g., GuardDuty, Security Center) Knowledge of network security, IAM, and cloud audit logs Familiarity with DevSecOps practices and IaC security scanning Bonus: Certifications like AWS Security Specialty, CCSP, or AZ-500 Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies

Posted 2 days ago

Apply

4.0 - 8.0 years

8 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less

Posted 3 days ago

Apply

2.0 - 5.0 years

3 - 7 Lacs

Bengaluru

Work from Office

Naukri logo

We're Celonis, the global leader in Process Mining technology and one of the world's fastest-growing SaaS firms. We believe there is a massive opportunity to unlock productivity by placing data and intelligence at the core of business processes and for that, we need you to join us.. The Team:. As a member of the Information Security Organization at Celonis, you'll collaborate closely with various departments and customers to communicate and demonstrate the security posture of our products. This position is part of the Security Enablement team within the broader Security GRC (Governance, Risk, and Compliance) Department. The Information Security team plays a critical role in ensuring Celonis' technology and information assets are appropriately guarded from external and internal threats. The Security GRC Department you'll be joining is responsible for maintaining existing security attestations at Celonis globally, balancing risk with appropriate controls and assessing control effectiveness.. The Role:. As Associate Security Enablement Analyst within the Information Security GRC team, you will act as a key interface between Celonis and its customers, helping to demonstrate the strength of our security posture and ensuring a smooth, informed, and confident customer journey. In this role, you’ll handle a broad range of customer-facing security activities—from responding to security questionnaires and audits, to building scalable processes and content for security communications. You’ll work closely with internal stakeholders across Legal, Operations, and Engineering, playing a critical role in reinforcing trust and transparency around our security practices. This position is ideal for someone who thrives at the intersection of security, communication, and customer success.. The work you’ll do:. Customer Security Requests: Respond quickly and accurately to customer security inquiries, supporting business development and customer success efforts.. Technical Security Communication: Independently address technical questions from customers, ensuring their security requirements are clearly understood and met.. Audit Support: Support customer audits and remote assessments by preparing and delivering relevant security documentation and evidence.. Security Questionnaires: Lead the completion of security questionnaires and related documentation, particularly those focused on cloud security.. Cross-Functional Collaboration: Work with Legal, Operations, and Cloud Engineering to develop and maintain standardized materials that clearly explain our security controls and practices.. Knowledge Management: Build and maintain a centralized knowledge base covering key Information Security topics, making resources easily accessible to internal and external stakeholders.. Enablement & Culture: Contribute to internal initiatives that strengthen Celonis’s security culture, operational maturity, and external security presence—whether through team development, internal enablement, or customer-facing improvements.. Privacy & GenAI Readiness: Collaborate with cross-functional teams to support privacy-related initiatives and emerging GenAI-related security considerations, ensuring alignment with evolving regulatory and customer expectations.. The qualifications you need:. University degree in the field of Information Technology and Management, Business Administration, or a similar field. Experience working with Security Questionnaires, IT projects, RFX. Work experience in the field of IT Security, Auditing, Cloud Security or similar. Excellent communication skills in English (spoken and written). Excellent ability to communicate with clients, relevant departments, collaborators and other relevant actors. High professional responsibility and excellent skills to work independently. Excellent skills to learn quickly and adapt to new tasks. Ability to learn topics related to Cloud, Infrastructure, and IT Security. Ability to work under pressure andin a dynamic work environment. Excellent communication skills in German (has the advantage). What Celonis Can Offer You:. Pioneer Innovation: Work with the leading, award-winning process mining technology, shaping the future of business.. Accelerate Your Growth: Benefit from clear career paths, internal mobility, a dedicated learning program, and mentorship opportunities.. Receive Exceptional Benefits: Including generous PTO, hybrid working options, company equity (RSUs), comprehensive benefits, extensive parental leave, dedicated volunteer days, and much more.. Prioritize Your Well-being: Access to resources such as gym subsidies, counseling, and well-being programs.. Connect and Belong: Find community and support through dedicated inclusion and belonging programs.. Make Meaningful Impact: Be part of a company driven by strong values that guide everything we do: Live for Customer Value, The Best Team Wins, We Own It, and Earth Is Our Future.. Collaborate Globally: Join a dynamic, international team of talented individuals.. Empowered Environment: Contribute your ideas in an open culture with autonomous teams.. About Us:. Celonis makes processes work for people, companies and the planet. The Celonis Process Intelligence Platform uses industry-leading process mining and AI technology and augments it with business context to give customers a living digital twin of their business operation. It’s system-agnostic and without bias, and provides everyone with a common language for understanding and improving businesses. Celonis enables its customers to continuously realize significant value across the top, bottom, and green line. Celonis is headquartered in Munich, Germany, and New York City, USA, with more than 20 offices worldwide.. Get familiar with the Celonis Process Intelligence Platform by watching this video.. Celonis Inclusion Statement:. At Celonis, we believe our people make us who we are and that “The Best Team Wins”. We know that the best teams are made up of people who bring different perspectives to the table. And when everyone feels included, able to speak up and knows their voice is heard that's when creativity and innovation happen.. Your Privacy:. Any information you submit to Celonis as part of your application will be processed in accordance with Celonis’ Accessibility and Candidate Notices. By submitting this application, you confirm that you agree to the storing and processing of your personal data by Celonis as described in our Privacy Notice for the Application and Hiring Process.. Please be aware of common job offer scams, impersonators and frauds. Learn more here.. Show more Show less

Posted 3 days ago

Apply

6.0 - 10.0 years

13 - 18 Lacs

Mumbai

Work from Office

Naukri logo

Are you a Product Security Analyst expert looking for a challenging opportunity?. Join our Product Security team.. We operate at the heart of the digital transformation of our business. Our team is responsible for Product Security including application security for our global organization.. Partner with the best.. We are looking for a Lead Product Security Analyst, with a focus in Product Security. In this role, you will work in a team and demonstrate working knowledge of systems and products and how they are secured in customers' businesses.. As a Senior Lead Product Security Engineer, you will be responsible for:. Building and executing engineering processes for early detection of design flaws, vulnerabilities, weaknesses, missing security controls, and secure implementation of product features.. Applying existing technologies, approaches, methodologies in new combinations to design new products, systems, or processes. Viewed internally and externally as a specialist in the discipline.. Presenting plans, technical roadmaps, ri Senior Lead Product Security Engineer Are you a Product Security Analyst expert looking for a challenging opportunity?. Join our Product Security team.. We operate at the heart of the digital transformation of our business. Our team is responsible for Product Security including application security for our global organization.. Partner with the best.. We are looking for a Lead Product Security Analyst, with a focus in Product Security. In this role, you will work in a team and demonstrate working knowledge of systems and products and how they are secured in customers' businesses.. As a Senior Lead Product Security Engineer, you will be responsible for:. Building and executing engineering processes for early detection of design flaws, vulnerabilities, weaknesses, missing security controls, and secure implementation of product features.. Applying existing technologies, approaches, methodologies in new combinations to design new products, systems, or processes. Viewed internally and externally as a specialist in the discipline.. Presenting plans, technical roadmaps, risks and recommendations to senior business and technical leaders. Lead programs related to Product Security Incident Response, Product Inventory, etc. Driving awareness, engagement, and improvements of Product Security metrics with business leaders. Demonstrating working knowledge of systems and products and how they are secured in a customer environment.. Implementing tools to automate and scale security processes.. Providing security leadership to the business segment product security teams. Experiencing with cyber security framework (NIST 800-53, ISO 27001, IEC 62443, etc.) implementation and governance. Familiarity with cyber regulations (EU NIS2, CRA, etc). Fuel your passion. To be successful in this role you will:. Have a bachelor’s degree in computer science or “STEM” Majors (Science, Technology, Engineering, and Math).. Have a minimum of 10 years of professional experience in a STEM-related degree preferably with a Product Security / OT Security focus.. Have project management experience, and expertise with Agile development teams.. Have prior work experience with various development tools including threat modelling, vulnerability technologies, application security, and secure coding principles.. Have experience with penetration testing and ethical hacking.. Have experience securing applications within cloud platforms such as AWS, Azure, and alike.. Have experience with a broad set of information security technologies and processes within a SaaS, IaaS, PaaS, or cloud environment.. Working with us. Our people are at the heart of what we do at Baker Hughes. We know we are better when all our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other.. Working for you. Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we must push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect:. Contemporary work-life balance policies and wellbeing activities. Comprehensive private medical care options. Safety net of life insurance and disability programs. Tailored financial programs.. Additional elected or voluntary benefits. About Us:. We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet.. Join Us:. Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward.. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law.. R136394. Show more Show less

Posted 3 days ago

Apply

4.0 - 8.0 years

8 - 12 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Naukri logo

Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less

Posted 3 days ago

Apply

4.0 - 8.0 years

8 - 12 Lacs

Hyderabad

Work from Office

Naukri logo

Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less

Posted 3 days ago

Apply

4.0 - 8.0 years

8 - 12 Lacs

Mumbai

Work from Office

Naukri logo

Our Offensive Security professionals are on a mission to make the world a safer place, one company at a time. We believe that our work to help our clients discover and remediate their unique security risks makes every one of us safer. Our clients trust us to use cutting-edge offensive security tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software.. We're looking to grow our team of penetration testers in India. We perform testing of web and smartphone applications, computer networks, cloud infrastructure, hardware devices, employees via social engineering, organizations via red team testing, and more.. As a Senior Consultant, you will report to a Principal Consultant in India. You will lead teams of consultants on cybersecurity projects for clients, large and small, across North America, EMEA, and APAC. You will be the technical leader of our engagements to our clients, scope solutions to their cybersecurity challenges, and act as their security subject matter expert and ours. You will mentor our Associate Consultants and Consultants during our engagements and act as a role model for their careers. You will think strategically and socialize your ideas to help us better ourselves.. Below are the roles and responsibilities for the Senior Consultant, Offensive Security role based in India:. Day to day responsibilities. Lead and deliver offensive security engagements such as web, mobile, API, and network penetration tests as an expert in the eyes of the client and your teammates. Solution and scope engagements for our clients, including penetration tests, cloud security projects, and more. Lead the technical delivery of our engagements by defining the execution strategy, delegating tasks to junior members of the team, evaluating their progress, and providing feedback. Execute internal strategic initiatives to help our practice grow, adapt, and evolve. Essential Traits. 6+ years in cybersecurity, with 3+ years in penetration testing, application security, or red teaming. Expert knowledge of application security, cloud security, infrastructure security, and other offensive or defensive security domains. A high degree of contextual and technological adaptability (i.e., tooland industry-agnostic). Generosity with your knowledge and patience with your apprentices. Excellent oral and written communication skills. A proven ability to lead and deliver cybersecurity engagements. Prerequisites. Bachelor’s degree or college diploma in information security, computer science or engineering, software engineering, or IT/System/Network administration. Excellent oral and written communication skills. Experience working both as part of a team and independently. About Kroll. Join the global leader in risk and financial advisory solutions—Kroll. With a nearly century-long legacy, we blend trusted expertise with cutting-edge technology to navigate and redefine industry complexities. As a part of One Team, One Kroll, you'll contribute to a collaborative and empowering environment, propelling your career to new heights. Ready to build, protect, restore and maximize our clients’ value? Your journey begins with Kroll.. Kroll is committed to equal opportunity and diversity, and recruits people based on merit.. In order to be considered for a position, you must formally apply via careers.kroll.com. Show more Show less

Posted 3 days ago

Apply

3.0 - 6.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Location/s: Bengaluru. Recruiter contact: Supriya Yadavalli. Mott MacDonald is a global engineering, management, and development consultancy with over 20,000 employees across more than 50 countries and 140+ offices.. We work across incredible global industries, delivering exciting work that is defining our future and making an important societal impact in the communities we serve. Our people power our performance – we succeed when they do. With countless opportunities to collaborate, learn, and grow, the possibilities for excellence are as varied as every individual.. Whether you want to grow as a subject matter expert or broaden your experience with roles across our international community, you’re surrounded by global specialists who want to combine their expertise and champion you to be your best. As a proudly employee-owned business, we benefit our clients, our communities, and each other, investing in creating the right space for everyone to feel empowered, included, and valued. Whatever your ambition, Mott MacDonald is where people come to be brilliant.. About The?business?unit. Mott MacDonald’s support services are the driving force behind our organisation enabling us to run efficiently and effectively. The team works collaboratively to offer specialist advice, best practice and technology to all areas of our business specifically designed for our global reach.. Job Description. Working as an IT Specialist in Cyber Security you will assist and advise the IT Manager for Cyber Security regarding Risk Analysis and Remediation. Risk Analysis and Remediation Service Desk analyst you will be the first point of contact for all employees seeking to resolve IT issues. Speedy and intelligent resolution of IT incidents is the key to ensuring that Mott MacDonald can deliver on its promises to its clients.. Key Duties And Responsibilities Include. Proactively seeking out the most effective means of monitoring information security related activities, by use of existing tools, or the investigation of new tools and methods. Developing and adopting appropriate Risk Assessment methodologies to ensure we are correctly prioritizing the risks we have identified.. Assist in the monitoring and resolution of all Information Security issues as they occur, driving through forensic investigation and remediation as appropriate.. Feedback all lessons learned into Operational and/or Governance systems.. Drive and support information security related change in Operational teams. Governance. Advice on appropriate security posture (approach, risks, technical measures, awareness) from the point of view of the business (both overall and specific teams). Assist with driving cultural change in the organization by helping people understand risks and make better choices to address enterprise security weaknesses.. Communications. Responsible for working with BMS and IT teams to communicate to the business and IT on known threats and best practices for information security, as they evolve.. Operational. Advice on all requirements around information security and appropriate use of specific systems or services, both those provided by IT or as required by the business, including projects with special security requirements and setup.. Acting as a point of contact for Information Security champions within operational IT teams, advising on appropriate responses, escalation as required.. Supervise the development of and relationship with the (planned) Security Operations Centre. Help to ensure that risk is measured and understood effectively by operational teams.. Penetration testing and vulnerability assessments. Assist with prioritisation of security controls and remediation.. Architecture. Review and recommend tools and processes for managing information security around new and existing systems.. Price out solutions and advise on the best risk solution portfolio.. Identify, review and evaluate technology risk.. Input to design choices for new systems to ensure security is addressed appropriately.. Scan and provide feedback on new products and risks to inform management strategy.. Essential. Candidate Specification:. Demonstrable experience of business operations and processes in a large multinational or global organisation. In-depth understanding of the Office 365 platform and Microsoft Windows Domain environment. In-depth understanding of modern cloud and network technologies and protocols. Demonstrate appreciation for user-centred design, experience, and usability. Experience with mobile applications. Working knowledge of international data privacy, data residency, and information security requirements. Desirable. High degree of understanding of the evolving global and internal IT environments. Knowledge of all Threat areas (deliberate, accidental, internal, external). Extensive experience of the ISO 27001 Information Security Management framework. Understanding of Cyber Essential Plus and similar government security standards. Personal Attributes. Passionate about technology and learning.. Ability to balance demands and priorities and think clearly under pressure.. Attention to detail and a focus on quality.. Excellent conflict resolution, communication, and collaboration skills.. Logical and analytical approach to solving problems.. We Can Offer (subject To Company’s Policy). Agile and safe working environment. Competitive annual leave and sick leaves. Group incentive scheme. Group term life insurance, Workmen’s compensation and Group medical insurance coverage. Short and Long-term Global employment opportunities. Global collaboration and knowledge sharing. Digital Innovation and Transformation. Equality, diversity and inclusion. We put equality, diversity and inclusion at the heart of our business, seeking to promote fair employment procedures and practices to ensure equal opportunities for all. We encourage individual expression in our workplace and are committed to creating an inclusive environment where everyone feels they have the opportunity to contribute.. Agile working. At Mott MacDonald, we believe it makes business sense for you and your manager to choose how you can work most effectively to meet your client, team and personal commitments. We embrace agility, flexibility and trust.. Location(s):. Bengaluru, KA, IN. Contract Type: Permanent. Work Pattern: Full Time. Market: Various. Discipline: Information technology. Job Ref: 9069. Recruiter Contact: Supriya Yadavalli. Show more Show less

Posted 3 days ago

Apply

2.0 - 5.0 years

7 - 11 Lacs

Gurugram

Work from Office

Naukri logo

About NCR Atleos Key Responsibilities Security Administration Design, Engineer and manage security solutions.Configure, monitor, and troubleshoot systems to ensure optimal performance and security.Plan and execute upgrades, patches, and other maintenance activities for security tooling.Collaborate with the cybersecurity team to ensure robust security measures and compliance with industry standards.Technical Support and Troubleshooting:Provide advanced technical support for AWS cloud networking issues.Mentor and guide junior engineers and IT support staff. Documentation and Reporting Create and maintain comprehensive documentation of configurations, procedures, and processes.Generate regular reports on system performance, security incidents, and maintenance activities. Qualifications Education :Bachelors degree in computer science, Information Technology, Cybersecurity, or a related field; or equivalent work experience. Experience :At least 3 years of hands-on experience in Cyber Security. Technical Skills: Strong understanding of network protocols and services (TCP/IP, DNS, VPN, etc.).Knowledge of scripting languages (PowerShell, Python) for automation. Key Competencies Problem-Solving Skills: Strong analytical and troubleshooting abilities to diagnose and resolve complex technical issues. Communication Skills: Excellent verbal and written communication skills, with the ability to explain technical concepts to non-technical stakeholders. Project Management Ability to manage multiple projects and priorities in a fast-paced environment. EEO Statement NCR Atleos is an equal-opportunity employer. It is NCR Atleos policy to hire, train, promote, and pay associates based on their job-related qualifications, ability, and performance, without regard to race, color, creed, religion, national origin, citizenship status, sex, sexual orientation, gender identity/expression, pregnancy, marital status, age, mental or physical disability, genetic information, medical condition, military or veteran status, or any other factor protected by law. Statement to Third Party Agencies To ALL recruitment agenciesNCR Atleos only accepts resumes from agencies on the NCR Atleos preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Atleos employees, or any NCR Atleos facility. NCR Atleos is not responsible for any fees or charges associated with unsolicited resumes.

Posted 3 days ago

Apply

3.0 - 6.0 years

6 - 11 Lacs

Gurugram

Work from Office

Naukri logo

About NCR Atleos Responsible for planning and performing Application Risk Assessments, as per the guidelines provided by regulations and standards. Build expertise on security governance and compliance that includes all Cloud providers and Cloud security monitoring. Build tool expertise on tools - Wiz, Algosec, Fortinet, Forscout, etc. Effectively collaborates and communicates with the stakeholders and ensure satisfaction Foster teamwork. Train and coach team members to ensure effective knowledge management activity. EEO Statement NCR Atleos is an equal-opportunity employer. It is NCR Atleos policy to hire, train, promote, and pay associates based on their job-related qualifications, ability, and performance, without regard to race, color, creed, religion, national origin, citizenship status, sex, sexual orientation, gender identity/expression, pregnancy, marital status, age, mental or physical disability, genetic information, medical condition, military or veteran status, or any other factor protected by law. Statement to Third Party Agencies To ALL recruitment agenciesNCR Atleos only accepts resumes from agencies on the NCR Atleos preferred supplier list. Please do not forward resumes to our applicant tracking system, NCR Atleos employees, or any NCR Atleos facility. NCR Atleos is not responsible for any fees or charges associated with unsolicited resumes.

Posted 3 days ago

Apply

3.0 - 8.0 years

10 - 20 Lacs

Chennai

Remote

Naukri logo

At FourKites we have the opportunity to tackle complex challenges with real-world impacts. Whether its medical supplies from Cardinal Health or groceries for Walmart, the FourKites platform helps customers operate global supply chains that are efficient, agile and sustainable. Join a team of curious problem solvers that celebrates differences, leads with empathy and values inclusivity. We are seeking an experienced Security Engineer with a strong background in DevOps, DevSecOps, and cloud infrastructure management. The ideal candidate will have hands-on expertise in AWS, GCP, Azure, and microservices architecture, combined with a deep understanding of security principles and best practices. You will be responsible for implementing and securing cloud-based environments, deploying infrastructure with automation tools, and ensuring that security is embedded throughout the development lifecycle. What youll be doing: Cloud Infrastructure & Security Architect and secure highly available, scalable, and fault-tolerant systems across AWS, GCP, and Azure environments. Design and implement cloud security solutions, focusing on compute, network, storage, content delivery, administration, and security. Implement security controls for Kubernetes clusters, containerized applications, and cloud-native services. DevOps & Automation: Leverage automation technologies (Ansible, Chef, Puppet, Jenkins, Docker) to manage infrastructure and deployment pipelines. Develop, deploy, and maintain infrastructure-as-code solutions with tools such as CloudFormation, Terraform, and AWS/GCP/Azure CLI. Enable CI/CD pipelines for secure application delivery while ensuring security is integrated into the build and deployment processes. Programming & Application Security: Implement and secure microservices architecture using tools such as AWS Lambda, Docker, Kubernetes, and serverless technologies. Develop and maintain secure, scalable applications using programming languages such as C++, C#, Java, and Python. Monitoring & Threat Detection: Continuously monitor cloud environments to identify and mitigate security threats and vulnerabilities. Conduct risk assessments and threat modeling for cloud applications and infrastructure. Use monitoring tools (e.g., AWS CloudWatch, GCP Stackdriver, Azure Monitor) to detect and respond to potential security incidents. Collaboration & Reporting: Collaborate with cross-functional teams including business leaders, engineers, and other security professionals to design and implement security solutions. Communicate security risks, mitigations, and incident reports to both technical and non-technical stakeholders. Produce detailed documentation of security policies, procedures, and technical implementations. Who you are: 3+ years of IT experience with a strong focus on DevOps, DevSecOps, and cloud security engineering. Strong hands-on experience with cloud platforms such as AWS, GCP, and Azure, and familiarity with their foundational services (e.g., EC2, DynamoDB, API Gateway, RDS, Lambda, CloudFront, etc.). Strong experience in Kubernetes security controls is a must. CKA/ CKAD/ CKS preferred. In-depth knowledge of Kubernetes, microservices, container orchestration, and security controls. Experience designing, deploying, and securing cloud-native applications with a focus on scalability, high availability, and load balancing. CISSP (Certified Information Systems Security Professional) or equivalent industry-recognized security certifications. Or AWS Associate or higher certifications (e.g., AWS Certified Solutions Architect Associate). Or equivalent certifications would work Technical Skills : Expertise in implementing security best practices in cloud environments and DevOps pipelines. Familiarity with container security tools and methodologies. Strong analytical, troubleshooting, and problem-solving skills with the ability to quickly identify and address security threats. Excellent verbal and written communication skills to effectively engage with stakeholders at all levels. Strong teamwork orientation, collaborating with multidisciplinary teams to achieve organizational goals. Additional Requirements: Ability to work in a fast-paced environment and manage multiple tasks concurrently. A proactive approach to learning new technologies and staying up-to-date with industry trends in cloud security. FourKites is the #1 supply chain visibility platform in the world, extending visibility beyond transportation into yards, warehouses, stores and beyond. Tracking more than 2.5 million shipments daily across road, rail, ocean, air, parcel and courier, and reaching over 185 countries, FourKites combines real-time data and powerful machine learning to help companies digitize their end-to-end supply chains. More than 1,000 of the worlds most recognized brands including 9 of the top-10 CPG and 18 of the top-20 food and beverage companies trust FourKites to transform their business and create more agile, efficient and sustainable supply chains. Benefits Medical benefits start on the first day of employment 36 PTO days (Sick, Casual and Earned), five recharge days, two volunteer days Home Office setups and Technology reimbursement Lifestyle & Family benefits Ongoing learning & development opportunities (Professional development program, Toast Master club, etc.)

Posted 3 days ago

Apply

1.0 - 4.0 years

2 - 4 Lacs

Mumbai

Work from Office

Naukri logo

HackIT Technology & Advisory Services is looking for Security Analyst - Red Team to join our dynamic team and embark on a rewarding career journey Gather, interpret, and analyze data to identify trends, patterns, and opportunities that support strategic decision-making Prepare clear, actionable reports, dashboards, and visualizations using tools like Excel, SQL, Power BI, or Tableau Collaborate with stakeholders to define business problems and recommend data-driven solutions Ensure data integrity, validate findings, and document methodologies Present insights to management and cross-functional teams in a concise and impactful manner Stay updated on industry best practices, tools, and emerging trends to enhance analysis quality and business outcomes

Posted 3 days ago

Apply

3.0 - 6.0 years

15 - 25 Lacs

Pune

Remote

Naukri logo

DevSecOps Engineer/Senior Engineer Experience: 3 - 6 Years Exp Salary : INR 10-25 Lacs per annum Preferred Notice Period : Within 30 Days Shift : 10:00AM to 6:00PM IST Opportunity Type: Remote Placement Type: Permanent (*Note: This is a requirement for one of Uplers' Clients) Must have skills required : container security OR Cloud Security OR Security Automation and Vulnerability Assessment and Security Information and Event Management (SIEM) FourKites, Inc. (One of Uplers' Clients) is Looking for: DevSecOps Engineer who is passionate about their work, eager to learn and grow, and who is committed to delivering exceptional results. If you are a team player, with a positive attitude and a desire to make a difference, then we want to hear from you. Role Overview Description We are seeking an experienced Security Engineer with a strong background in DevOps, DevSecOps, and cloud infrastructure management. The ideal candidate will have hands-on expertise in AWS, GCP, Azure, and microservices architecture, combined with a deep understanding of security principles and best practices. You will be responsible for implementing and securing cloud-based environments, deploying infrastructure with automation tools, and ensuring that security is embedded throughout the development lifecycle. What youll be doing - Cloud Infrastructure & Security: Architect and secure highly available, scalable, and fault-tolerant systems across AWS, GCP, and Azure environments. Design and implement cloud security solutions, focusing on compute, network, storage, content delivery, administration, and security. Implement security controls for Kubernetes clusters, containerized applications, and cloud-native services. DevOps & Automation: Leverage automation technologies (Ansible, Chef, Puppet, Jenkins, Docker) to manage infrastructure and deployment pipelines. Develop, deploy, and maintain infrastructure-as-code solutions with tools such as CloudFormation, Terraform, and AWS/GCP/Azure CLI. Enable CI/CD pipelines for secure application delivery while ensuring security is integrated into the build and deployment processes. Programming & Application Security: Implement and secure microservices architecture using tools such as AWS Lambda, Docker, Kubernetes, and serverless technologies. Develop and maintain secure, scalable applications using programming languages such as C++, C#, Java, and Python. Monitoring & Threat Detection: Continuously monitor cloud environments to identify and mitigate security threats and vulnerabilities. Conduct risk assessments and threat modeling for cloud applications and infrastructure. Use monitoring tools (e.g., AWS CloudWatch, GCP Stackdriver, Azure Monitor) to detect and respond to potential security incidents. Collaboration & Reporting: Collaborate with cross-functional teams including business leaders, engineers, and other security professionals to design and implement security solutions. Communicate security risks, mitigations, and incident reports to both technical and non-technical stakeholders. Produce detailed documentation of security policies, procedures, and technical implementations. Who you are - 3+ years of IT experience with a strong focus on DevOps, DevSecOps, and cloud security engineering. Strong hands-on experience with cloud platforms such as AWS, GCP, and Azure, and familiarity with their foundational services (e.g., EC2, DynamoDB, API Gateway, RDS, Lambda, CloudFront, etc.). Strong experience in Kubernetes security controls is a must. CKA/ CKAD/ CKS preferred. In-depth knowledge of Kubernetes, microservices, container orchestration, and security controls. Experience designing, deploying, and securing cloud-native applications with a focus on scalability, high availability, and load balancing. CISSP (Certified Information Systems Security Professional) or equivalent industry-recognized security certifications. Or AWS Associate or higher certifications (e.g., AWS Certified Solutions Architect Associate). Or equivalent certifications would work Technical Skills - Expertise in implementing security best practices in cloud environments and DevOps pipelines. Familiarity with container security tools and methodologies. Strong analytical, troubleshooting, and problem-solving skills with the ability to quickly identify and address security threats. Excellent verbal and written communication skills to effectively engage with stakeholders at all levels. Strong teamwork orientation, collaborating with multidisciplinary teams to achieve organizational goals. Additional Requirements - Ability to work in a fast-paced environment and manage multiple tasks concurrently. A proactive approach to learning new technologies and staying up-to-date with industry trends in cloud security. Benefits - Medical benefits start on the first day of employment 36 PTO days (Sick, Casual and Earned), five recharge days, two volunteer days Home Office setups and Technology reimbursement Lifestyle & Family benefits Ongoing learning & development opportunities (Professional development program, Toast Master club, etc.) How to apply for this opportunity: Easy 3-Step Process: 1. Click On Apply! And Register or log in on our portal 2. Upload updated Resume & Complete the Screening Form 3. Increase your chances to get shortlisted & meet the client for the Interview! About Our Client: FourKites is the global leader in AI-driven supply chain transformation technologies, helping the world's biggest brands and businesses turn data into action like never before. FourKites' Intelligent Control Tower breaks down enterprise silos by creating a real-time digital twin of orders, shipments, inventory and assets. About Uplers: Our goal is to make hiring and getting hired reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant product and engineering job opportunities and progress in their career. (Note: There are many more opportunities apart from this on the portal.) So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!

Posted 3 days ago

Apply

3.0 - 6.0 years

15 - 25 Lacs

Hyderabad

Remote

Naukri logo

DevSecOps Engineer/Senior Engineer Experience: 3 - 6 Years Exp Salary : INR 10-25 Lacs per annum Preferred Notice Period : Within 30 Days Shift : 10:00AM to 6:00PM IST Opportunity Type: Remote Placement Type: Permanent (*Note: This is a requirement for one of Uplers' Clients) Must have skills required : container security OR Cloud Security OR Security Automation and Vulnerability Assessment and Security Information and Event Management (SIEM) FourKites, Inc. (One of Uplers' Clients) is Looking for: DevSecOps Engineer who is passionate about their work, eager to learn and grow, and who is committed to delivering exceptional results. If you are a team player, with a positive attitude and a desire to make a difference, then we want to hear from you. Role Overview Description We are seeking an experienced Security Engineer with a strong background in DevOps, DevSecOps, and cloud infrastructure management. The ideal candidate will have hands-on expertise in AWS, GCP, Azure, and microservices architecture, combined with a deep understanding of security principles and best practices. You will be responsible for implementing and securing cloud-based environments, deploying infrastructure with automation tools, and ensuring that security is embedded throughout the development lifecycle. What youll be doing - Cloud Infrastructure & Security: Architect and secure highly available, scalable, and fault-tolerant systems across AWS, GCP, and Azure environments. Design and implement cloud security solutions, focusing on compute, network, storage, content delivery, administration, and security. Implement security controls for Kubernetes clusters, containerized applications, and cloud-native services. DevOps & Automation: Leverage automation technologies (Ansible, Chef, Puppet, Jenkins, Docker) to manage infrastructure and deployment pipelines. Develop, deploy, and maintain infrastructure-as-code solutions with tools such as CloudFormation, Terraform, and AWS/GCP/Azure CLI. Enable CI/CD pipelines for secure application delivery while ensuring security is integrated into the build and deployment processes. Programming & Application Security: Implement and secure microservices architecture using tools such as AWS Lambda, Docker, Kubernetes, and serverless technologies. Develop and maintain secure, scalable applications using programming languages such as C++, C#, Java, and Python. Monitoring & Threat Detection: Continuously monitor cloud environments to identify and mitigate security threats and vulnerabilities. Conduct risk assessments and threat modeling for cloud applications and infrastructure. Use monitoring tools (e.g., AWS CloudWatch, GCP Stackdriver, Azure Monitor) to detect and respond to potential security incidents. Collaboration & Reporting: Collaborate with cross-functional teams including business leaders, engineers, and other security professionals to design and implement security solutions. Communicate security risks, mitigations, and incident reports to both technical and non-technical stakeholders. Produce detailed documentation of security policies, procedures, and technical implementations. Who you are - 3+ years of IT experience with a strong focus on DevOps, DevSecOps, and cloud security engineering. Strong hands-on experience with cloud platforms such as AWS, GCP, and Azure, and familiarity with their foundational services (e.g., EC2, DynamoDB, API Gateway, RDS, Lambda, CloudFront, etc.). Strong experience in Kubernetes security controls is a must. CKA/ CKAD/ CKS preferred. In-depth knowledge of Kubernetes, microservices, container orchestration, and security controls. Experience designing, deploying, and securing cloud-native applications with a focus on scalability, high availability, and load balancing. CISSP (Certified Information Systems Security Professional) or equivalent industry-recognized security certifications. Or AWS Associate or higher certifications (e.g., AWS Certified Solutions Architect Associate). Or equivalent certifications would work Technical Skills - Expertise in implementing security best practices in cloud environments and DevOps pipelines. Familiarity with container security tools and methodologies. Strong analytical, troubleshooting, and problem-solving skills with the ability to quickly identify and address security threats. Excellent verbal and written communication skills to effectively engage with stakeholders at all levels. Strong teamwork orientation, collaborating with multidisciplinary teams to achieve organizational goals. Additional Requirements - Ability to work in a fast-paced environment and manage multiple tasks concurrently. A proactive approach to learning new technologies and staying up-to-date with industry trends in cloud security. Benefits - Medical benefits start on the first day of employment 36 PTO days (Sick, Casual and Earned), five recharge days, two volunteer days Home Office setups and Technology reimbursement Lifestyle & Family benefits Ongoing learning & development opportunities (Professional development program, Toast Master club, etc.) How to apply for this opportunity: Easy 3-Step Process: 1. Click On Apply! And Register or log in on our portal 2. Upload updated Resume & Complete the Screening Form 3. Increase your chances to get shortlisted & meet the client for the Interview! About Our Client: FourKites is the global leader in AI-driven supply chain transformation technologies, helping the world's biggest brands and businesses turn data into action like never before. FourKites' Intelligent Control Tower breaks down enterprise silos by creating a real-time digital twin of orders, shipments, inventory and assets. About Uplers: Our goal is to make hiring and getting hired reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant product and engineering job opportunities and progress in their career. (Note: There are many more opportunities apart from this on the portal.) So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!

Posted 3 days ago

Apply

3.0 - 6.0 years

15 - 25 Lacs

Chennai

Remote

Naukri logo

DevSecOps Engineer/Senior Engineer Experience: 3 - 6 Years Exp Salary : INR 10-25 Lacs per annum Preferred Notice Period : Within 30 Days Shift : 10:00AM to 6:00PM IST Opportunity Type: Remote Placement Type: Permanent (*Note: This is a requirement for one of Uplers' Clients) Must have skills required : container security OR Cloud Security OR Security Automation and Vulnerability Assessment and Security Information and Event Management (SIEM) FourKites, Inc. (One of Uplers' Clients) is Looking for: DevSecOps Engineer who is passionate about their work, eager to learn and grow, and who is committed to delivering exceptional results. If you are a team player, with a positive attitude and a desire to make a difference, then we want to hear from you. Role Overview Description We are seeking an experienced Security Engineer with a strong background in DevOps, DevSecOps, and cloud infrastructure management. The ideal candidate will have hands-on expertise in AWS, GCP, Azure, and microservices architecture, combined with a deep understanding of security principles and best practices. You will be responsible for implementing and securing cloud-based environments, deploying infrastructure with automation tools, and ensuring that security is embedded throughout the development lifecycle. What youll be doing - Cloud Infrastructure & Security: Architect and secure highly available, scalable, and fault-tolerant systems across AWS, GCP, and Azure environments. Design and implement cloud security solutions, focusing on compute, network, storage, content delivery, administration, and security. Implement security controls for Kubernetes clusters, containerized applications, and cloud-native services. DevOps & Automation: Leverage automation technologies (Ansible, Chef, Puppet, Jenkins, Docker) to manage infrastructure and deployment pipelines. Develop, deploy, and maintain infrastructure-as-code solutions with tools such as CloudFormation, Terraform, and AWS/GCP/Azure CLI. Enable CI/CD pipelines for secure application delivery while ensuring security is integrated into the build and deployment processes. Programming & Application Security: Implement and secure microservices architecture using tools such as AWS Lambda, Docker, Kubernetes, and serverless technologies. Develop and maintain secure, scalable applications using programming languages such as C++, C#, Java, and Python. Monitoring & Threat Detection: Continuously monitor cloud environments to identify and mitigate security threats and vulnerabilities. Conduct risk assessments and threat modeling for cloud applications and infrastructure. Use monitoring tools (e.g., AWS CloudWatch, GCP Stackdriver, Azure Monitor) to detect and respond to potential security incidents. Collaboration & Reporting: Collaborate with cross-functional teams including business leaders, engineers, and other security professionals to design and implement security solutions. Communicate security risks, mitigations, and incident reports to both technical and non-technical stakeholders. Produce detailed documentation of security policies, procedures, and technical implementations. Who you are - 3+ years of IT experience with a strong focus on DevOps, DevSecOps, and cloud security engineering. Strong hands-on experience with cloud platforms such as AWS, GCP, and Azure, and familiarity with their foundational services (e.g., EC2, DynamoDB, API Gateway, RDS, Lambda, CloudFront, etc.). Strong experience in Kubernetes security controls is a must. CKA/ CKAD/ CKS preferred. In-depth knowledge of Kubernetes, microservices, container orchestration, and security controls. Experience designing, deploying, and securing cloud-native applications with a focus on scalability, high availability, and load balancing. CISSP (Certified Information Systems Security Professional) or equivalent industry-recognized security certifications. Or AWS Associate or higher certifications (e.g., AWS Certified Solutions Architect Associate). Or equivalent certifications would work Technical Skills - Expertise in implementing security best practices in cloud environments and DevOps pipelines. Familiarity with container security tools and methodologies. Strong analytical, troubleshooting, and problem-solving skills with the ability to quickly identify and address security threats. Excellent verbal and written communication skills to effectively engage with stakeholders at all levels. Strong teamwork orientation, collaborating with multidisciplinary teams to achieve organizational goals. Additional Requirements - Ability to work in a fast-paced environment and manage multiple tasks concurrently. A proactive approach to learning new technologies and staying up-to-date with industry trends in cloud security. Benefits - Medical benefits start on the first day of employment 36 PTO days (Sick, Casual and Earned), five recharge days, two volunteer days Home Office setups and Technology reimbursement Lifestyle & Family benefits Ongoing learning & development opportunities (Professional development program, Toast Master club, etc.) How to apply for this opportunity: Easy 3-Step Process: 1. Click On Apply! And Register or log in on our portal 2. Upload updated Resume & Complete the Screening Form 3. Increase your chances to get shortlisted & meet the client for the Interview! About Our Client: FourKites is the global leader in AI-driven supply chain transformation technologies, helping the world's biggest brands and businesses turn data into action like never before. FourKites' Intelligent Control Tower breaks down enterprise silos by creating a real-time digital twin of orders, shipments, inventory and assets. About Uplers: Our goal is to make hiring and getting hired reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant product and engineering job opportunities and progress in their career. (Note: There are many more opportunities apart from this on the portal.) So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!

Posted 3 days ago

Apply

3.0 - 6.0 years

15 - 25 Lacs

Bengaluru

Remote

Naukri logo

DevSecOps Engineer/Senior Engineer Experience: 3 - 6 Years Exp Salary : INR 10-25 Lacs per annum Preferred Notice Period : Within 30 Days Shift : 10:00AM to 6:00PM IST Opportunity Type: Remote Placement Type: Permanent (*Note: This is a requirement for one of Uplers' Clients) Must have skills required : container security OR Cloud Security OR Security Automation and Vulnerability Assessment and Security Information and Event Management (SIEM) FourKites, Inc. (One of Uplers' Clients) is Looking for: DevSecOps Engineer who is passionate about their work, eager to learn and grow, and who is committed to delivering exceptional results. If you are a team player, with a positive attitude and a desire to make a difference, then we want to hear from you. Role Overview Description We are seeking an experienced Security Engineer with a strong background in DevOps, DevSecOps, and cloud infrastructure management. The ideal candidate will have hands-on expertise in AWS, GCP, Azure, and microservices architecture, combined with a deep understanding of security principles and best practices. You will be responsible for implementing and securing cloud-based environments, deploying infrastructure with automation tools, and ensuring that security is embedded throughout the development lifecycle. What youll be doing - Cloud Infrastructure & Security: Architect and secure highly available, scalable, and fault-tolerant systems across AWS, GCP, and Azure environments. Design and implement cloud security solutions, focusing on compute, network, storage, content delivery, administration, and security. Implement security controls for Kubernetes clusters, containerized applications, and cloud-native services. DevOps & Automation: Leverage automation technologies (Ansible, Chef, Puppet, Jenkins, Docker) to manage infrastructure and deployment pipelines. Develop, deploy, and maintain infrastructure-as-code solutions with tools such as CloudFormation, Terraform, and AWS/GCP/Azure CLI. Enable CI/CD pipelines for secure application delivery while ensuring security is integrated into the build and deployment processes. Programming & Application Security: Implement and secure microservices architecture using tools such as AWS Lambda, Docker, Kubernetes, and serverless technologies. Develop and maintain secure, scalable applications using programming languages such as C++, C#, Java, and Python. Monitoring & Threat Detection: Continuously monitor cloud environments to identify and mitigate security threats and vulnerabilities. Conduct risk assessments and threat modeling for cloud applications and infrastructure. Use monitoring tools (e.g., AWS CloudWatch, GCP Stackdriver, Azure Monitor) to detect and respond to potential security incidents. Collaboration & Reporting: Collaborate with cross-functional teams including business leaders, engineers, and other security professionals to design and implement security solutions. Communicate security risks, mitigations, and incident reports to both technical and non-technical stakeholders. Produce detailed documentation of security policies, procedures, and technical implementations. Who you are - 3+ years of IT experience with a strong focus on DevOps, DevSecOps, and cloud security engineering. Strong hands-on experience with cloud platforms such as AWS, GCP, and Azure, and familiarity with their foundational services (e.g., EC2, DynamoDB, API Gateway, RDS, Lambda, CloudFront, etc.). Strong experience in Kubernetes security controls is a must. CKA/ CKAD/ CKS preferred. In-depth knowledge of Kubernetes, microservices, container orchestration, and security controls. Experience designing, deploying, and securing cloud-native applications with a focus on scalability, high availability, and load balancing. CISSP (Certified Information Systems Security Professional) or equivalent industry-recognized security certifications. Or AWS Associate or higher certifications (e.g., AWS Certified Solutions Architect Associate). Or equivalent certifications would work Technical Skills - Expertise in implementing security best practices in cloud environments and DevOps pipelines. Familiarity with container security tools and methodologies. Strong analytical, troubleshooting, and problem-solving skills with the ability to quickly identify and address security threats. Excellent verbal and written communication skills to effectively engage with stakeholders at all levels. Strong teamwork orientation, collaborating with multidisciplinary teams to achieve organizational goals. Additional Requirements - Ability to work in a fast-paced environment and manage multiple tasks concurrently. A proactive approach to learning new technologies and staying up-to-date with industry trends in cloud security. Benefits - Medical benefits start on the first day of employment 36 PTO days (Sick, Casual and Earned), five recharge days, two volunteer days Home Office setups and Technology reimbursement Lifestyle & Family benefits Ongoing learning & development opportunities (Professional development program, Toast Master club, etc.) How to apply for this opportunity: Easy 3-Step Process: 1. Click On Apply! And Register or log in on our portal 2. Upload updated Resume & Complete the Screening Form 3. Increase your chances to get shortlisted & meet the client for the Interview! About Our Client: FourKites is the global leader in AI-driven supply chain transformation technologies, helping the world's biggest brands and businesses turn data into action like never before. FourKites' Intelligent Control Tower breaks down enterprise silos by creating a real-time digital twin of orders, shipments, inventory and assets. About Uplers: Our goal is to make hiring and getting hired reliable, simple, and fast. Our role will be to help all our talents find and apply for relevant product and engineering job opportunities and progress in their career. (Note: There are many more opportunities apart from this on the portal.) So, if you are ready for a new challenge, a great work environment, and an opportunity to take your career to the next level, don't hesitate to apply today. We are waiting for you!

Posted 3 days ago

Apply

Exploring Vulnerability Assessment Jobs in India

Vulnerability assessment is a crucial aspect of cybersecurity, and the demand for professionals with this skill set is on the rise in India. Organizations are becoming increasingly aware of the importance of securing their systems against potential threats, making vulnerability assessment roles highly sought after in the job market.

Top Hiring Locations in India

  1. Bangalore
  2. Mumbai
  3. Delhi
  4. Hyderabad
  5. Pune

These cities are known for their thriving IT industries and are hotspots for companies looking to bolster their cybersecurity measures.

Average Salary Range

The salary range for vulnerability assessment professionals in India can vary based on experience and location. On average, entry-level professionals can expect to earn around INR 4-6 lakhs per annum, while experienced professionals with several years of experience can earn upwards of INR 12 lakhs per annum.

Career Path

In the field of vulnerability assessment, a typical career progression may look something like this: - Junior Vulnerability Analyst - Vulnerability Analyst - Senior Vulnerability Analyst - Vulnerability Assessment Team Lead - Vulnerability Assessment Manager

With each step up the ladder, professionals take on more responsibilities and lead larger projects within the organization.

Related Skills

In addition to expertise in vulnerability assessment, professionals in this field are often expected to have knowledge of: - Penetration testing - Network security - Incident response - Security compliance frameworks

Having a well-rounded skill set can make you a more attractive candidate for vulnerability assessment roles.

Interview Questions

  • What is the difference between vulnerability scanning and penetration testing? (basic)
  • How would you prioritize vulnerabilities based on severity? (medium)
  • Can you explain the concept of CVE (Common Vulnerabilities and Exposures)? (medium)
  • What tools do you use for vulnerability assessment? (basic)
  • How do you stay updated on the latest security threats and vulnerabilities? (basic)
  • Can you walk us through a recent vulnerability assessment project you worked on? (medium)
  • What is OWASP and how does it relate to vulnerability assessment? (medium)
  • How do you handle false positives in vulnerability scanning? (medium)
  • What is the difference between CVSS v2 and CVSS v3? (advanced)
  • Have you ever conducted a social engineering test as part of a vulnerability assessment? (advanced)
  • How do you ensure compliance with industry regulations during a vulnerability assessment? (medium)
  • What is the role of threat intelligence in vulnerability assessment? (medium)
  • How do you communicate vulnerabilities and risks to non-technical stakeholders? (medium)
  • Can you explain the concept of zero-day vulnerabilities? (medium)
  • How do you approach vulnerability assessment for cloud environments? (medium)
  • Have you worked with any bug bounty programs? If so, can you share your experience? (advanced)
  • What steps do you take to secure IoT devices from vulnerabilities? (medium)
  • How do you conduct a physical security assessment as part of a vulnerability assessment? (advanced)
  • Can you discuss a time when you identified a critical vulnerability that had been overlooked by others? (advanced)
  • How do you track and prioritize remediation efforts for identified vulnerabilities? (medium)
  • What role does threat modeling play in vulnerability assessment? (medium)
  • How do you assess the security posture of third-party vendors or partners? (medium)
  • Can you explain the concept of a buffer overflow vulnerability? (medium)
  • How do you ensure that vulnerability assessment tools are not impacting the performance of the systems being scanned? (basic)

Closing Remark

As you venture into the world of vulnerability assessment jobs in India, remember to continuously upskill and stay informed about the latest trends in cybersecurity. By honing your skills and preparing thoroughly for interviews, you can confidently pursue opportunities in this dynamic and rewarding field. Good luck!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies