Home
Jobs

997 Vulnerability Assessment Jobs - Page 16

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 12.0 years

22 - 35 Lacs

Chennai

Work from Office

We are looking for an experienced Cybersecurity Manager to lead security assessments, develop security strategies, and drive cybersecurity initiatives for our clients. The ideal candidate should have extensive experience in cybersecurity consulting, risk assessment, and compliance frameworks. Key Responsibilities: Lead security and privacy program assessments using industry-standard frameworks (NIST CSF, ISO, CIS, HIPAA, GDPR) and drive risk mitigation strategies. Develop and implement cybersecurity solutions to address security gaps and enhance maturity in privacy capabilities. Provide expert consulting on security strategy, risk management, and compliance requirements . Oversee security documentation, policy development, and compliance adherence. Conduct in-depth assessments of client environments, analyzing security posture and potential vulnerabilities. Lead client engagement meetings, manage project timelines, and ensure high-quality deliverables. Mentor and guide junior team members, fostering a strong security-focused culture. Ideal Candidate Profile: Bachelors degree in information technology , Security, Systems, Assurance, or a related field. 5+ years of cybersecurity consulting experience , with proven leadership in managing client engagements. Deep understanding of regulatory frameworks (NIST, GDPR, ISO 27001/27002, NIST 800 series) and security best practices. Strong expertise in IAM, PAM, Logging & Monitoring, Vulnerability & Patch Management, Incident Response, Asset Management, and Vendor Risk Management . Excellent stakeholder management, communication, and leadership skills. Ability to manage multiple projects and deliver within tight deadlines.

Posted 3 weeks ago

Apply

5.0 - 7.0 years

7 - 9 Lacs

Noida

Work from Office

We are seeking a highly skilled and motivated Technical Security Professional specializing in Vulnerability Assessment and Penetration Testing (VAPT), Source Code Review, API Security, and Web Application Security. As a member of our team, you will be responsible for ensuring the security and integrity of our systems, applications, and networks. Responsibilities Conduct comprehensive Vulnerability Assessments and Penetration Tests (VAPT) on various systems, networks, and applications to identify security weaknesses and potential vulnerabilities. Perform thorough Source Code Reviews to identify security flaws, coding errors, and vulnerabilities in web applications and software products. Assess and enhance API security by evaluating API designs, configurations, and implementations for potential security risks and vulnerabilities. Evaluate and enhance the security posture of web applications by conducting thorough security assessments and implementing appropriate security controls. Develop and implement security testing methodologies, tools, and procedures to improve the efficiency and effectiveness of security testing activities. Provide technical expertise and guidance to development teams, system administrators, and other stakeholders on security best practices and mitigation strategies. Collaborate with cross-functional teams to remediate identified security vulnerabilities and implement security controls to mitigate risks. Stay updated on the latest security trends, vulnerabilities, and best practices to continuously improve the security posture of our systems and applications. : Bachelor's degree in Computer Science, Information Security, or a related field. (Master degree preferred) 5 to 7 years of experience in conducting Vulnerability Assessments and Penetration Tests (VAPT) on enterprise systems, networks, and applications. 4 to 7 years of experience in performing Source Code Reviews for web applications and software products. Proficiency in using industry-standard security testing tools such as Nessus, Metasploit, Burp Suite, etc. Strong understanding of web application security principles, common vulnerabilities (e.g., OWASP Top 10), and mitigation techniques. Experience in assessing and enhancing API security, including authentication, authorization, encryption, and access control mechanisms. Knowledge of secure coding practices and common programming languages (e.g., Java, Python, C/C++, etc.). Knowledge of cloud security and DevSecOps processes. Excellent analytical and problem-solving skills with the ability to identify and mitigate complex security risks and vulnerabilities. Strong communication and interpersonal skills with the ability to effectively collaborate with cross-functional teams and stakeholders. Relevant security certifications such as CISSP, CEH, OSCP, etc., are preferred.

Posted 3 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Pune

Work from Office

Hello Visionary! We know that the only way a business thrive is if our people are growing. That’s why we always put our people first. Our global, diverse team would be happy to support you and challenge you to grow in new ways. Who knows where our shared journey will take you We are looking for Product and Solution Security Expert (PSSE) How do you craft the future Smart BuildingsWe’re looking for the makers of tomorrow, the hardworking individuals ready to help Siemens transform entire industries, cities and even countries. Get to know us from the inside, develop your skills on the job. You’ll make a difference by: 1. Integration with SDLC: Collaborate with software development teams to integrate security practices throughout the Software Development Life Cycle (SDLC). Perform security code reviews and analyze vulnerabilities during different SDLC phases. Ensure security requirements are included in the design, development, testing, and deployment stages of software projects. 2. Security Activities: Develop and implement security protocols, guidelines, and best practices for software development. Conduct threat modelling and risk assessments to identify potential security issues early in the development process. Provide guidance on secure coding practices and remediation of identified vulnerabilities. 3. Stakeholder Interaction: Work closely with key stakeholders, including product managers, project managers, and business analysts, to support and promote security activities within products. Communicate security risks, issues, and mitigation strategies effectively to both technical and non-technical stakeholders. Foster a security-aware culture within the development teams and across the organization. 4. Security Tools and Technologies: Implement and manage security tools such as static and dynamic analysis tools, intrusion detection systems, and vulnerability scanners. Stay updated with the latest security tools, trends, and best practices to enhance the organization's security posture. 5. Incident Response: Assist in the development and implementation of incident response plans and procedures. Participate in security incident investigations and provide expertise in resolving security breaches. 6. Training and Awareness: Conduct security training and awareness programs for development teams. Promote continuous improvement and knowledge sharing related to application security. You’ll win us over by: 1. Technical Skills: In-depth knowledge of application security, secure coding practices, and common vulnerabilities (e.g., OWASP Top Ten). Experience with security tools and technologies such as static analysis tools (SAST), dynamic analysis tools (DAST), and vulnerability scanners. Proficiency in programming languages such as Java, C#, Python. Understanding of DevSecOps practices and integration of security into CI/CD pipelines. Promote continuous improvement and knowledge sharing related to application security. 2. Soft Skills: Strong communication and interpersonal skills. Ability to explain complex security concepts to non-technical stakeholders. Strong analytical and problem-solving skills. Collaborative mindset and ability to work effectively with cross-functional teams. 3. Certification Preferred: Certified Secure Software Lifecycle Professional (CSSLP). Experience: Proven experience working with software development teams and integrating security practices into the SDLC. Experience interacting with key stakeholders and supporting security activities within software products. You’ll win us over by: Having An engineering degree B.E/B.Tech/MCA/M.Tech/M.Sc with good academic record. Minimum 5 years of experience in cybersecurity, with a focus on application security. We’ll support you with: Hybrid working Opportunities. Diverse and inclusive culture. Great variety of learning & development opportunities. Create a better #TomorrowWithUs! This role, based in Pune, is an individual contributor position. You may be required to visit other locations within India and internationally. In return, you'll have the opportunity to work with teams shaping the future. At Siemens, we are a collection of over 312,000 minds building the future, one day at a time, worldwide. We are dedicated to equality and welcome applications that reflect the diversity of the communities we serve. All employment decisions at Siemens are based on qualifications, merit, and business need. Bring your curiosity and imagination, and help us shape tomorrow Find out more about the Digital world of Siemens here[1] www.siemens.com/careers/digitalminds Find out more about Siemens careers at[2] www.siemens.com/careers

Posted 3 weeks ago

Apply

7.0 - 10.0 years

9 - 12 Lacs

Bengaluru

Work from Office

Hello Visionary ! We empower our people to stay resilient and relevant in a constantly changing world. We’re looking for people who are always searching for creative ways to grow and learn. People who want to make a real impact, now and in the future. We are looking for a highly skilled and motivated Product & Solution Security Professional to join our team. The ideal candidate will be responsible for defining secure design principles and supporting cross-functional teams to ensure secure architecture, implementation, and testing of products and solutions. Key Responsibilities Integration with SDLC Collaborate with software development teams to integrate security practices throughout the Software Development Life Cycle (SDLC). Ensure security requirements are included in the design, development, testing, and deployment stages of software projects. Perform security code reviews and analyze vulnerabilities during different SDLC phases. 2. Security Activities Develop and implement security protocols, guidelines, and best practices for software development. Conduct threat modelling and risk assessments to identify potential security issues early in the development process. Provide guidance on secure coding practices and remediation of identified vulnerabilities. Stakeholder Interaction Work closely with key stakeholders, including product managers, project managers, and business analysts, to support and promote security activities within products. Communicate security risks, issues, and mitigation strategies effectively to both technical and non-technical stakeholders. Foster a security-aware culture within the development teams and across the organization . 4. Security Tools and Technologies Implement and manage security tools such as static and dynamic analysis tools and vulnerability scanners. Stay updated with the latest security tools, trends, and best practices to enhance product’s security posture. 5. Training and Awareness Conduct security training and awareness programs for development teams. Promote continuous improvement and knowledge sharing related to application security . Skills and Qualifications 1. Technical Skills: In-depth knowledge of application security, secure coding practices, and common vulnerabilities (e.g., OWASP Top Ten). Experience with security tools and technologies such as static analysis tools (SAST), dynamic analysis tools (DAST), and vulnerability scanners. Proficiency in programming languages such as Java, C#, Python. Understanding of DevSecOps practices and integration of security into CI/CD pipelines. Promote continuous improvement and knowledge sharing related to application security. 2. Soft Skills: Strong communication and interpersonal skills. Ability to explain complex security concepts to non-technical stakeholders. Strong analytical and problem-solving skills. Collaborative mindset and ability to work effectively with cross-functional teams. 3. Certification Preferred CEH, Certified Secure Software Lifecycle Professional (CSSLP) or equivalent. Experience Proven experience working with software development teams and integrating security practices into the SDLC. Experience interacting with key stakeholders and supporting security activities within software products. Having An engineering degree B.E/B.Tech/MCA/M.Tech/M.Sc with good academic record. 7 - 10 years of experience in cybersecurity, with a focus on application security. Make your mark in our exciting world at Siemens . This role, based in Bangalore , is an individual contributor position. You may be required to visit other locations within India and internationally. In return, you'll have the opportunity to work with teams shaping the future. At Siemens, we are a collection of over 312,000 minds building the future, one day at a time, worldwide. We are dedicated to equality and welcome applications that reflect the diversity of the communities we serve. All employment decisions at Siemens are based on qualifications, merit, and business need. Bring your curiosity and imagination, and help us shape tomorrow We’ll support you with Hybrid working opportunities. Diverse and inclusive culture. Variety of learning & development opportunities. Attractive compensation package. Find out more about Siemens careers at www.siemens.com/careers

Posted 3 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Proactively lead and support incident response team during an incident. Experience in advance investigation, triaging, analysis and escalation of security incidents with recommendations Hands-on basic experience with configurations and management of SIEM tools(Qradar)including log source integrations, custom parser built, fine tuning and optimizing the correlation rules and use cases recommendations Is MUST. Proven Experience on any of the Security information and event management (SIEM) tools using Qradar Data-driven threat hunting using SIEM, EDR and XDR tools Basic Experience is SOAR tools such as Qradar Resilient, PaloAlto XSOAR Identify quick defence techniques till permanent resolution. Recognize successful intrusions and compromises through review and analysis of relevant event detail information. Review incidents escalated by Level 1 analysts. Launch and track investigations to resolution. Recognize attacks based on their signatures, differentiates false positives from true intrusion attempts. Actively investigates the latest in security vulnerabilities, advisories, incidents, and penetration techniques and notifies end users when appropriate. Identify the gaps in security environment & suggest the gap closure Drive & Support Change Management Performs and reviews tasks as identified in a daily task list. Report Generation and Trend Analysis. Participate in the Weekly and Monthly governance calls to support the SOC metrics reporting Good to have hands on experience with managing SIEM solutions on public/private clouds like Amazon AWS, Microsoft Azure, etc. Willing to work in 24x7 rotational shift model including night shift. Required education Bachelor's Degree Preferred education Bachelor's Degree Required technical and professional expertise 5+ YearsHands-on experience required in Qradar SIEM and SOAR. Desired experience in Threat hunting, Threat intelligence. Worked on tools belongs to Qradar, UEBA, UAX. Bachelor’s degree in engineering/information security, or a related field. Relevant certifications such as CEH, CISSP, CISM, CompTIA CASP+, or equivalent. Proven experience to work in a SOC environment. Preferred technical and professional experience Proven experience in managing and responding to complex security incidents. Strong analytical and problem-solving skills. Excellent communication and collaboration abilities. Ability to work in a fast-paced, dynamic environment. Deep technical knowledge of security technologies and advanced threat landscapes.

Posted 3 weeks ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Mumbai

Work from Office

Person should be responsible for administration & management of three or more technologies listed Firewall, F5 WAF, F5 SSLO, Ant-DDoS, Packet Broker, Anti-Apt, IPS, etc. Managing complete administration including but not limited of creation, modification of rules and configuration, system upgrades. Handling escalated calls and providing SME support on above technologies. On-boarding of new applications in F5 SSLO, F5 WAF, Packet Broker and handle critical issues for the same. Single point of contact for above mentioned technologies. Incident management & timely escalation of incident. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Overall 4+ years of experience in the field of network security Person should be able to manage the team. Person should have good understanding on SIEM IR & should be able to guide the team. Require advance level of network security devices troubleshooting knowledge, tcpdump, log analysis etc. B. E. / B.Tech in Computer Science or Electronics & Telecommunications Preferred technical and professional experience Person should have good understanding on SIEM IR & should be able to guide the team. Require advance level of network security devices troubleshooting knowledge, tcpdump, log analysis etc.

Posted 3 weeks ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Kochi

Work from Office

Information and Data are some of the most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analysing business requirements to design and implement the best security solutions for their needs. You will apply your technical skills to find the balance between enabling and securing the client's organization with the cognitive solutions that are making IBM the fastest growing enterprise security business in the world. The ability to be a team player, Strong communication collaboration Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Application Security, Threat Modelling, Secure Code Review, Penetration Testing, Vulnerability Testing, SAST (Static Application Security Testing), DAST (Dynamic Application security Testing), DevSecOps Implemented Clean Code principles, JUnit’s * Java development, JavaScript, Python, Ruby, C++/C#, Perl etc Must have strong business acumen with ability to work with application development, QA and security teams. A strong understanding of application security frameworks The ability and skill to train other people in procedural and technical topics As a Security Consultant, you will be a key advisor for IBM’s clients, analysing business requirements to design and implement the best security solutions for their needs Preferred technical and professional experience Must have a solid understanding of application security code reviews and penetration testing & Experience with enterprise java technologiesSpring, JUnit, Hibernate 4+ years' experience in application development and security. Practical understanding and use of commercial application security tools

Posted 3 weeks ago

Apply

5.0 - 7.0 years

7 - 9 Lacs

Mumbai, Chennai, Ahmedabad

Work from Office

Key Responsibilities: Design, install, monitor, integrate, and fine-tune cybersecurity tools and systems, including but not limited to, SIEM, SOAR, EDR, E-mail Security Gateways, and network Proactively monitor the environment to detect and implement steps to mitigate cyber-attacks before they occur. Provides technical expertise regarding security-related concepts to operational teams within the Information Technology Department and the business. Review, investigate, and respond to real-time alerts within the environment. Review real-time and historical reports for security and/or compliance violations. Monitor online security-related resources for new and emerging cyber threats. Assesses new security technologies to determine potential value for the enterprise. Conducts vulnerability assessments of firm systems and networks. Manage systems owned by the Information Security Team. Required Skills and Qualifications: Technical Skills & Experience: At least 5-7 years of experience in Cybersecurity with an emphasis on data and security event correlation, incident response, and the installation, configuration, administration, and management of cybersecurity tools such as SIEM, SOAR, firewalls, and hardening of IT infrastructure in compliance with cybersecurity frameworks. Works in a highly collaborative and fast-paced work environment with other SOC and Network Operations Center (NOC), Technical Support, Telecom, Project Management and Product Development staff. Strong writing skills, as well as the ability to articulate security-related concepts to a broad range of technical and non-technical staff. Working experience with creating, implementing, and managing a threat-hunting program within a corporate environment. Education Bachelors degree in computer science, information systems, Cybersecurity or Cloud Computing UG: B.Sc in Any Specialization, B.Tech/B.E. in Any Specialization

Posted 3 weeks ago

Apply

8.0 - 11.0 years

27 - 42 Lacs

Bengaluru

Work from Office

Job Summary We are seeking a seasoned professional to manage and enhance the operations of the Saviynt platform. The ideal candidate will bring strong technical expertise leadership capabilities and a proactive approach to platform stability process improvement and stakeholder engagement. Responsibilities Key Responsibilities Platform Monitoring & Maintenance Oversee the health and performance of the Saviynt Platform including Saviynt Connect Portal and Connectors. Monitor JML (Joiner-Mover-Leaver) processes aggregation tasks and access requests. Hands on with SOD workflows tasks rules forms custom object access reviews and updates of JML configurations access requests and certification workflows. Guide the team to implement best practices for Access Management & RBAC. Play a key role in identifying areas for implementing Automations. Enhancements & Troubleshooting Implement minor enhancements and workflow changes as needed. Coordinate with the Saviynt product team for resolution of critical issues. Documentation & Compliance Maintain up-to-date SOPs runbooks and procedural documentation. Ensure timely patching of the Saviynt platform and its components. Support DR (Disaster Recovery) testing. Integration & Performance Management Manage and resolve integration issues with systems such as Active Directory and ServiceNow and any custom integrations. Periodically tune performance parameters to ensure optimal system efficiency. Operational Oversight Share service health status report to customer on daily basis validate logs and verify backups. Provide Weekly/monthly reports on incidents changes service requests and problem tickets. Attend Weekly/monthly review calls tracking actions and work towards closure. Process & Stakeholder Engagement Identify process gaps and propose remediation aligned with product and security standards. Present changes in CAB meetings participate in major incident bridges and engage with customers for requirement gathering and escalation handling. Additional Skills Strong understanding of ITIL processes. Working knowledge of NetIQ IDM is a plus. Proficiency in Microsoft Office Suite for documentation and presentations. Excellent communication skills to liaise effectively between internal teams and customers. Basic knowledge on scripting using PowerShell AD & Exchange commands. Knowledge on Active Directory Entra AD Entra AD connect for synchronization

Posted 3 weeks ago

Apply

4.0 - 8.0 years

7 - 15 Lacs

Coimbatore

Work from Office

Role & responsibilities We are looking to add a VAPT specialist to our team! This position will be conducting vulnerability assessments, penetration testing, and security audits to identify, report, and mitigate security weaknesses across applications, networks, and systems. Conduct vulnerability assessments and penetration tests on internal and external applications, networks, and systems. Develop, document, and implement testing methodologies based on industry standards and compliance requirements (e.g., OWASP, NIST, ISO 27001). Identify security risks, potential threats, and vulnerabilities and provide detailed reports with actionable recommendations. Collaborate with development, infrastructure, Network, SOC and application teams to guide them in remediating identified security issues. Perform re-testing to validate remediation actions taken to address vulnerabilities. Stay updated on emerging security threats, vulnerabilities, and tools related to penetration testing. Ensure testing activities comply with relevant security policies, regulatory requirements, and standards. Support the development of VAPT policies, standards, and guidelines. Prepare regular reports and dashboards for management and stakeholders, summarizing findings and status updates. Preferred candidate profile At least 1+ years of experience in vulnerability assessment and penetration testing in both application and network environments. In-depth knowledge of security standards, frameworks, and methodologies, such as OWASP, PTES, and MITRE ATT&CK. Proficiency with security testing tools like Burp Suite, Nessus, Metasploit, Nmap, and Wireshark. Strong understanding of network protocols, application security, and secure coding practices. Familiarity with regulatory standards, such as GDPR, HIPAA, and PCI-DSS, and how they impact VAPT requirements. Ability to communicate complex technical information to both technical and non-technical stakeholders. Relevant certifications (e.g., CEH, OSCP, GIAC GPEN, or GWAPT) are preferred. Vulnerability scanning and penetration testing Threat modeling and risk assessment Security auditing and report writing Collaboration and communication Analytical and problem-solving skills

Posted 3 weeks ago

Apply

7.0 - 9.0 years

27 - 42 Lacs

Bengaluru

Work from Office

Job Summary As a Cyber Security Specialist you will play a crucial role in safeguarding our organizations digital assets. With a focus on LDAP Ping Directory and a hybrid work model you will ensure the integrity and confidentiality of sensitive information. Your expertise will contribute to maintaining a secure environment supporting our mission to protect data and enhance trust in our services. Responsibilities Develop and implement security measures to protect the organizations digital infrastructure. Monitor and analyze security alerts to identify potential threats and vulnerabilities. Collaborate with IT teams to integrate security protocols into existing systems. Conduct regular security audits and assessments to ensure compliance with industry standards. Provide guidance and support to staff on security best practices and protocols. Investigate security breaches and incidents to determine root causes and implement corrective actions. Maintain and update security policies and procedures to reflect current threats and technologies. Utilize LDAP expertise to manage and secure directory services effectively. Work closely with stakeholders to address security concerns and implement solutions. Ensure the confidentiality integrity and availability of sensitive information. Stay informed about the latest cybersecurity trends and technologies to enhance security measures. Contribute to the development of security awareness programs for employees. Support the organizations mission by ensuring a secure and trustworthy digital environment. Qualifications Possess strong experience in LDAP and its application in cybersecurity. Have a solid understanding of cybersecurity principles and practices. Demonstrate proficiency in conducting security audits and assessments. Exhibit excellent problem-solving skills to address security challenges. Show ability to work collaboratively with cross-functional teams. Display knowledge of industry standards and compliance requirements. Have experience in developing and implementing security policies. Be familiar with security incident response and investigation techniques. Possess strong communication skills to convey security concepts effectively. Have a proactive approach to identifying and mitigating security risks. Show commitment to continuous learning and staying updated on cybersecurity trends. Demonstrate ability to manage and secure directory services using LDAP.

Posted 3 weeks ago

Apply

14.0 - 16.0 years

35 - 60 Lacs

Chennai

Work from Office

Job Summary IAM Architect Develop the overarching vision principles and architecture for the workload identity and access management system across all environments like Azure GCP hybrid on premises Responsibilities Define the types of workload identities e.g. Managed Identities Service Accounts SPIFFE identities their attributes and their lifecycle management processes. Design the framework and specific policies for controlling workload access to resources based on the principle of least privilege. Define and design secure methods for workloads to authenticate and communicate with each other. Design the integration points and processes for connecting the workload IAM system with Fords current IAM infrastructure e.g. Entra ID Drive the creation of the long-term workload IAM governance framework ensuring alignment with industry best practices and Fords policies. Serve as the subject matter expert on workload identity concepts technologies e.g. Entra Workload Identity SPIFFE-SPIRE and best practices. Assess and recommend appropriate workload identity features and tools available in Azure GCP and other relevant platforms. Design the system to meet relevant security and compliance requirements

Posted 3 weeks ago

Apply

9.0 - 14.0 years

9 - 13 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

We are looking for a highly experienced Senior Vulnerability Management Consultant (9+ years) to lead and mature our vulnerability management program. This role requires a deep understanding of cybersecurity risks, vulnerability assessment methodologies, and enterprise-scale risk prioritization. You will work cross-functionally with IT, cloud, application, and third-party teams to drive measurable improvements in our security posture. Key Responsibilities. Lead the enterprise-wide vulnerability management function, including strategy, tooling, and execution. Perform advanced vulnerability assessments across infrastructure, cloud, endpoints, and applications. Correlate vulnerability data with asset criticality, threat intelligence, and exploitability to drive risk-based prioritization. Work with stakeholders to define remediation SLAs and ensure timely issue resolution. Oversee the integration of scanning tools (e.g., Tenable, Qualys, Rapid7) into CI/CD pipelines, cloud platforms, and enterprise systems. Regularly produce executive-level dashboards and technical reports with trends, KPIs, and risk heatmaps. Advise on security architecture and control enhancements to prevent recurring vulnerabilities. Partner with GRC teams to ensure compliance with standards (ISO 27001, NIST, PCI-DSS, etc.). Evaluate and implement emerging technologies and AI-driven solutions to optimize the program. Mentor junior consultants and lead cross-team security improvement initiatives. Required Skills Experience. 9+ years of experience in cybersecurity, with at least 5+ years focused on vulnerability management. In-depth knowledge of CVSS scoring, threat intelligence integration, and vulnerability lifecycle management. Expertise with tools like Qualys, Tenable, Nessus, Nexpose, Burp Suite, or similar. Strong experience with cloud platforms (AWS, Azure, GCP) and container security (Docker, Kubernetes). Proficient in scripting (Python, PowerShell, or Bash) for automation of scanning and reporting tasks. Familiarity with enterprise IT environments: servers, endpoints, networks, firewalls, web apps. Solid understanding of patch management, asset inventory, secure configuration, and remediation governance. Effective communication and stakeholder management skills, from technical teams to executive leadership. Hands-on experience with security frameworks (e.g., NIST CSF, MITRE ATTCK, OWASP). Experience managing third-party assessments and coordinating with external vendors. Soft Skill. Good experience working with numerous external teams to track and deliver solutions. Strong detail-oriented individual able to efficiently analyze and resolve problems. Strong verbal, communication, and diplomacy skills with all levels of the business. Must be self-motivated, able to work independently, and multi-task effectively. Preferred Certifications. CISSP, OSCP, CISM, GIAC (GCIH, GSEC), CEH, or equivalent. Your benefits. We offer a hybrid work model which recognizes the value of striking a balance between in-person collaboration and remote working incl. up to 25 days per year working from abroa. We believe in rewarding performance and our compensation and benefits package includes a company bonus scheme, pension, employee shares program and multiple employee discounts (details vary by location. From career development and digital learning programs to international career mobility, we offer lifelong learning for our employees worldwide and an environment where innovation, delivery and empowerment are fostere. Flexible working, health and wellbeing offers (including healthcare and parental leave benefits) support to balance family and career and help our people return from career breaks with experience that nothing else can teachAbout Allianz Technology. Allianz Technology is the global IT service provider for Allianz and delivers IT solutions that drive the digitalization of the Group. With more than 13,000 employees located in 22 countries around the globe, Allianz Technology works together with other Allianz entities in pioneering the digitalization of the financial services industry.We oversee the full digitalization spectrum from one of the industrylargest IT infrastructure projects that includes data centers, networking and security, to application platforms that span from workplace services to digital interaction. In short, we deliver full-scale, end-to-end IT solutions for Allianz in the digital age. DI statement . Allianz Technology is proud to be an equal opportunity employer encouraging diversity in the working environment. We are interested in your strengths and experience. We welcome all applications from all people regardless of gender identity and/or expression, sexual orientation, race or ethnicity, age, nationality, religion, disability, or philosophy of life. Join us. Let\u00B4s care for tomorrow. You. IT.

Posted 3 weeks ago

Apply

3.0 - 6.0 years

6 - 15 Lacs

Mumbai

Work from Office

Who We Are At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities. The Role At Kyndryl, our Security Consultants are game-changers, constantly pushing the boundaries of what's possible and transforming the way our customers do business. We're looking for a talented individual who thrives in a dynamic environment and is ready to take on the challenge of protecting organizations from threats both known and unknown – being the defender of tomorrow’s digital world. As a Security Consultant, you'll be the guardian of confidentiality, integrity, and availability, ensuring organizations are shielded from the ever-evolving threat landscape. Your expertise will be sought after as you assess, analyze, and implement effective security measures in customer environments, leaving no stone unturned when it comes to safeguarding their most sensitive data. Collaboration will be your forte, as you work closely with clients to understand their unique security requirements and assess their current security posture. Armed with this knowledge, you'll provide expert guidance and recommendations on the best security practices, risk management strategies, and robust security policies that will fortify their defenses. You won't stop at providing advice; you'll roll up your sleeves and get hands-on. Designing and implementing security controls, policies, and procedures will be your playground. You'll work alongside cross-functional teams to deploy state-of-the-art technologies, including firewalls, intrusion detection/prevention systems, access controls, and encryption technologies, ensuring a comprehensive security framework. The thrill of uncovering vulnerabilities and risks is what motivates you. Armed with your extensive knowledge, you'll conduct thorough security assessments, leaving no stone unturned in identifying potential security breaches. Your findings will serve as the foundation for meticulous security audits and reviews, ensuring adherence to policies and procedures. Your reports and findings will be the catalyst for management decisions and actions. In the fast-paced world of cybersecurity, staying ahead of the game is crucial. That's why you'll continuously immerse yourself in the latest security threats, technologies, and best practices. Your recommendations will drive enhancements to the organization's security posture, ensuring it remains at the cutting edge of defense. Your influence won't be limited to systems alone. You'll lend your expertise to the design and review of IT infrastructure, systems, and applications, ensuring they are secure by design from inception. Not only will you make an impact within our organization, but you'll also collaborate with customers and vendors on security assessments, audits, and due diligence activities. Your knowledge and experience will be instrumental in shaping secure collaborations and partnerships. Our consultants are restless for innovation. They are at the edge of technology, changing the way our customers implement business solutions – so, if you’re a problem-solver, an innovative thinker, and a self-starter with a passion high impact assignments which align technology to business outcomes, then we want to hear from you! Apply today to join our team that has a host of exciting projects and customers waiting for you to work with them to solve complex transformation puzzles through technology. Your Future at Kyndryl As a Security Consultant at Kyndryl you will join the Kyndryl Consultant Profession, working with other Kyndryl Consultants, Architects, Project Managers, and cross-functional Technical Subject Matter Experts – presenting unlimited opportunities with unmatched support through our investment in your learning, training, and career growth Who You Are You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others. Required Skills and Experience Any Professional level active certification from OEM (F5, Citrix, ) . Hands on experience Citrix Netscalar and F5 Devices Experience on F5 Products (LB and WAF) Good Knowledge and Hands on Static and Dynamic Routing protocol : ( BGP, EIGRP, OSPF)and fail over concepts. Knowledge and hands on on LTM/GTM, GSLB, HA, Cloud XC concepts Experience on ASM will be preferred. Knowledge of SSL offloading and understanding of OWASP waf. Work from client location in Airoli, Navi Mumbai. 24*7 shift operations Implementing change request w.r.t LB and WAF technology 11.configure and troubleshoot Load balancer and WAF devices 12.Troubleshooting severity issues 13. Attending client meeting of change discussions. 14.Support in providing RCA. 15.Understanding vulnerability assessment and security hardening process. 16.Minimum 6-8years of experience 17.Attend and able to participate in architecture discussion 18.Implement and troubleshoot network and security protocols 19.Understanding of ITIL concepts. 20.Experience in ticket handling through service now. 21.The Operations Engineer will offer Level 2 and Level 3 Support that includes operation and change management. 22.Understanding and daily use of Microsoft Office 365 Suite and other productivity tools (e.g., Excel, Word, PowerPoint, SharePoint) to accomplish audit and compliance related tasks 23. Must have attained a technical Graduate Degree Like B.E Preferred Skills and Experience Strong verbal and written communications skills are a must Ability to work effectively across internal and external organizations Strong technology background is required Aptitude to acquire new technology and concepts quickly Being You Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way. What You Can Expect With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed. Get Referred! If you know someone that works at Kyndryl, when asked ‘How Did You Hear About Us’ during the application process, select ‘Employee Referral’ and enter your contact's Kyndryl email address.

Posted 3 weeks ago

Apply

0.0 - 1.0 years

5 - 8 Lacs

Ahmedabad

Work from Office

Skills: Strong understanding of web application security and OWASP Top 10 Hands-on experience with VAPT and application security tools (e.g., Burp Suite Pro, Nessus, Acunetix) Proficient in writing technical reports and documentation Familiar with secure coding practices and patch management Experience with bug bounty programs and cybersecurity incident response Education: B.Tech / B.E. / BCA / BAC in Computer Science or IT Experience: 0-1 year in Vulnerability Assessment, Penetration Testing (VAPT), and Bug Bounty (professional experience preferred) Certifications: CEH or equivalent (preferred)

Posted 3 weeks ago

Apply

5.0 - 10.0 years

11 - 15 Lacs

Noida

Work from Office

Stefanini is a leading provider of cybersecurity solutions committed to protecting our clients from digital threats and ensuring the safety of their data. As our SOC Manager, you will be pivotal in leading our Security Operations Center and driving various specialized squads to enhance our security operations. You will be at the forefront of our security initiatives, safeguarding our clients most valuable asset-their data. Position Summary The SOC Manager will oversee the day-to-day operations of the Security Operations Center, ensuring effective monitoring, detection, and response to security incidents. This role includes managing a comprehensive suite of cybersecurity services, including Managed Detection and Response (MDR), SOC as a Service, CISO Advisory, SOC Advisory, Brand Protection & External Data Leakage, Attack Surface & Vulnerability Management, and Insider Threat Detection. The SOC Manager will also be responsible for SOC gamification and executing strategic squad lab research and development. Key Responsibilities Lead and Manage the SOC Team Supervise and mentor a team of Tier-1 through Tier-3 Security Analysts and Engineers, providing guidance, training, and performance evaluations to ensure effective team management and leadership. Deployment and Oversight Oversee the deployment, configuration, and delivery of core cybersecurity services, ensuring their effective integration and operation within the SOC. Incident Response Manage the detection, investigation, and resolution of security incidents. Coordinate with other departments to mitigate and recover from security breaches. Toolset Management Ensure the effective deployment and use of cybersecurity tools and platforms, including SIEM, endpoint protection, vulnerability assessment tools, and threat intelligence feeds, and integration of Stefaninis SAI Cyber Hub platform. Security Monitoring Continuously monitor security systems and alerts to identify and respond to potential threats, utilizing the full range of managed services. Policy and Procedure Development Develop and maintain SOC policies, procedures, and playbooks to ensure a standardized approach to security operations and consistent service delivery. Reporting and Metrics Generate regular reports on security incidents, team performance, and SOC activities, providing insights and recommendations for improvements across all service areas. Stakeholder Communication Liaison between the SOC and other business units, ensuring clear communication of security issues and their impact and the status and performance of the deployed services. Continuous Improvement Stay current with the latest cybersecurity trends and technologies. Implement best practices and innovative solutions to enhance the SOCs capabilities and service offerings. SOC Gamification Oversight Implement and oversee SOC gamification strategies to enhance team engagement, motivation, and continuous skill development. Track and report on gamification metrics and progress. Strategic Squad Lab R&D Execute and manage the day-to-day operations of strategic squad lab research and development initiatives as directed by the Head of Cybersecurity. Ensure alignment with overall security objectives and innovation goals. Job Requirements Details Required Skills and Qualifications Experience At least 5 years in a service delivery role, with at least 7 years in a SOC management position. Education A Bachelors or Masters degree in Computer Science, Information Security, or a related field is highly desirable. Relevant certifications such as CISSP, CISM, or CEH are also highly desirable. Technical Proficiency In-depth knowledge of SIEM systems, endpoint security solutions, vulnerability management tools, threat intelligence platforms, incident ticketing systems, knowledge management systems, access management solutions, and asset management tools. Leadership Skills Proven ability to lead, manage, and motivate a team of security professionals. Analytical Skills Strong problem-solving and analytical skills, with the ability to think critically and make informed decisions under pressure. Communication Skills Excellent verbal and written communication skills, with the ability to convey complex security concepts to non-technical stakeholders. Attention to Detail High level of accuracy and attention to detail in all aspects of work. Adaptability Ability to work in a fast-paced, dynamic environment and adapt to changing priorities and technologies. IAM Policies and Procedures Knowledge Proficient in developing, implementing, and managing policies and procedures related to Identity and Access Management. Cloud Experience Experience with AWS, Azure, or Google Cloud, along with automation capabilities. Data Security Solid understanding of data security principles. Generative AI Experience Experience with generative AI is a plus. Preferred Qualifications Certifications CISSP, CISM, CEH, or equivalent certifications. Compliance Experience Familiarity with industry standards and regulations such as NIST 2.0, ISO 27001, NIST 800-53, NIST 800-171, HIPAA, and PCI-DSS.

Posted 3 weeks ago

Apply

3.0 - 5.0 years

0 - 0 Lacs

Karnataka

Work from Office

Job Title: Senior Security Specialist - Physical Security Assignment Manager Location: Bengaluru, Hyderabad, Pune Vacancies: 9 (3 per location) Salary: 50,000 to 55,000 (Based on interview performance) About the Role G4S Security Solutions is seeking experienced and dynamic Senior Security Specialists to lead security operations for corporate offices. The role requires a proactive and strategic approach to maintaining safety, ensuring compliance, and enhancing operational security across assigned locations. The position is integral to creating a secure work environment, managing incidents, and ensuring seamless operations in collaboration with internal and external stakeholders. Key Responsibilities 1. Security Operations Management Supervise and manage security shifts to ensure smooth operations and adherence to protocols.Provide leadership and guidance to security teams during routine duties and emergencies.Oversee compliance with security protocols for employees, contractors, and visitors. 2. Incident Management and Reporting Act as the first responder for security and safety incidents, ensuring swift and effective actions.Investigate incidents, prepare detailed reports, and coordinate follow-up measures with Site Security Managers.Maintain accurate records of incidents, audits, and risk assessments. 3. Risk Assessment and Mitigation Conduct regular security audits and vulnerability assessments to identify risks.Develop and implement mitigation strategies to address identified threats.Perform penetration testing and preventive checks to ensure system robustness. 4. Policy Implementation and Compliance Design and implement physical security strategies aligned with organizational objectives.Ensure compliance with local, state, and federal regulations.Collaborate with HR and legal teams to align security practices with company policies. 5. Team Leadership and Training Lead and mentor junior team members to foster a culture of continuous improvement.Organize and conduct training sessions on emergency preparedness, crisis management, and best practices in security. 6. Technology Integration and Oversight Leverage advanced technologies like biometric systems, surveillance tools, and cybersecurity measures to enhance security operations.Work closely with IT teams to ensure physical and digital security integration. 7. Emergency Preparedness and Crisis Management Oversee emergency drills and ensure all personnel are trained in evacuation and crisis management protocols.Develop and test comprehensive emergency response plans for various scenarios. 8. Vendor and Budget Management Evaluate and manage relationships with security vendors and service providers.Prepare and monitor budgets for security operations, ensuring cost-effective solutions. 9. Executive and Event Security Develop security protocols for executive travel and high-profile events.Coordinate logistics and manage security during sensitive situations. Candidate Profile Education Bachelor’s degree (preferably in Security Management, Criminal Justice, or related fields).Advanced certifications such as CPP (Certified Protection Professional) or PSP (Physical Security Professional) are highly preferred. Experience 8+ years of experience in corporate security, with 3-5 years in a supervisory role. Skills and Attributes Strong leadership, decision-making, and team management abilities.Expertise in security systems, incident management platforms, and workplace safety standards.Excellent verbal and written communication skills for reporting and stakeholder engagement.Analytical mindset to evaluate threats and implement preventive measures.Physically fit and able to respond to emergencies effectively. Language Requirements Fluency in English, Hindi, and local languages based on deployment (e.g., Kannada for Bengaluru). What We Offer Weekly offProvident FundMedical InsuranceGratuityLeave wages and bonus (as per company policy) Application Process Submit an updated resume via WhatsApp (include date of birth, height, and weight).Resume screening followed by a telephonic interview.Attend an in-person interview at the duty location if shortlisted.Receive an offer letter and undergo training at the G4S Training Center. Contact Information Contact Person: Abhay MulikMobile: +91 9972877452WhatsApp: +91 9113627282Email: abhay.mulik@in.g4s.com

Posted 3 weeks ago

Apply

3.0 - 8.0 years

15 - 25 Lacs

Bengaluru

Work from Office

Hi We have the below opening with one of our prestigious client. If you are interested and willing to explore opportunity, Please shared your CV to vivitha.d@randstad,in Exp: 3+ Years Location: Bangalore Mode of work: 5 Days Work from office Shift time- 5:30 am or 7:30 am ( 9 Hours) Need only OSCP Certified candidates Role Description Responsibilities: Oversee and conduct tests for system vulnerabilities, such as: SOE Security Assessments Source Code Review Security Risk (ISO27k) & Privacy Impact (APP) Assessments NCSC Cyber Essentials Plus Assessments Red Team Attack Simulations Firewall and Password Audits Vulnerability Assessments (Internal, External, Web Application, and Database) Penetration Testing (Internal, External, Web Application, Database, Mobile, and Wireless) Provide complex technical advice, recommendations, and consultancy on networks, products, and services supplied to our managed service customers Compiling and presenting reports on the test results. Lead the design, implementation, operation, and maintenance of security management systems. Support internal security initiatives or mentoring junior team members Role Description Requirements: Minimum 3 years experience as a security consultant or penetration tester An existing penetration testing certification, such as OSCP, OSCE, or CREST is mandatory Experience delivering at least 6 of the different types of engagements listed above Extensive knowledge and experience within the IT Security industry Knowledge of a range of consulting and security vendor solution offerings Nice-to-have: Defence Force experience is desirable Hold a current active security clearance (NV-1 or NV-2) is desirable

Posted 3 weeks ago

Apply

5.0 - 10.0 years

10 - 20 Lacs

Dubai, Chennai, Bengaluru

Work from Office

We're Hiring! I am excited to share some amazing career opportunities at Happiest Minds. Take your Security career to the next level with Happiest Minds, ! Join a dynamic team, where Security Meets Innovation, and grow with us. Be recognized in a Great Place to Work Certified environment Interested professionals can directly reach out to me ankita.patari@happiestminds.com or can apply in below post Primary Skills : Manual Penetration Testing using OWASP checklists, Penetration Testing, Cloud Security Assessment, Cybersecurity, Security Configuration Review, Source Code Review Job Description: 4 to 6 years of experience conducting Application Security assessments Experienced in conducting Manual and Automated DAST for Web, API & Thick client covering OWASP Top 10 Experienced in conducting Manual code review Experienced in Mobile VAPT (Both static and Dynamic) Knowledge of Infra VAPT or at least VA and configuration review Knowledge in Container / Docker security / Cloud Audit is a plus Certifications suck as CEH, CRTP, OSCP is preferred Good communication skills, ability to explain vulnerabilities to business users in simple terms. Notice: Immediate to 15 days Location: ENBD Bangalore or ENBD Chennai or Dubai Location: Bangalore/Chennai/Dubai Experience: 4-6 Years Thanks & Regards, Ankita Ghosh

Posted 3 weeks ago

Apply

4.0 - 8.0 years

8 - 14 Lacs

Bengaluru

Work from Office

Job Title : Cybersecurity Test Engineer About the Role : Looking for Cybersecurity Test Engineer who will be working closely with Hardware, Software and Systems engineering teams to deliver the next generation of Automotive SOC's. Ideal candidate is someone who has strong knowledge and hands on experience with Cybersecurity ISO 21434 standards. He/she should be able to Validate Cybersecurity features for Automotive SOC's and its applications. Responsibilities : - Perform penetration testing of SoC Automotive products. - Establish the Security goals and requirements. - Verification strategies in compliance with ISO 21434. - Develop test specifications, test cases, and test plans for security vulnerability testing. - Scan vulnerabilities with regards to CVSS levels and patch fixing from NIST database. - Perform code-level fuzz testing using open source tools. - Support documentation of test results and collaborate with the development team. - Participate in automating test process within CI/CD environments. - Setup and maintain traceability in compliance with Automotive SPICE requirements. - Experience in tools like OpenVAS, Nmap , wireshark, penetration testing for embedded systems. - Experience in Automotive domain is a must. - Practical experience performing TARA, security concepts and other Cybersecurity Artefacts mentioned in IS021434.

Posted 3 weeks ago

Apply

8.0 - 10.0 years

10 - 12 Lacs

Mumbai

Work from Office

Sales Specialist Meet the Team Indian enterprise sector is going through huge digital transformation. Areas like Cloud adaption, Sophisticated Analytics, AI, IOT, Block chain & Robotic Process Automation, Information Security are key building block towards this transformation. You would be responsible for Building Cisco Security Business pipeline & achieve the Security Annual targets in the large enterprise segment Your Impact Lead Large Customer Engagement with CISO level conversation within Ciscos top enterprises and conglomerate. Support Sales Account Management (AMs) as Cyber Security Sales Specialist in large sophisticated projects (comprising of Zero Trust Architecture, Securing cloud work loads, transforming SOC, Micro segmentation and others) Understand the client/sector requirements and Map Cisco Security products & Services & Build Solution Stack for Sales Account Managers Understand NIST, CERTIN guidelines, mitre att&ck framework, OT Security. Good understanding of Cisco Security products. Well engaged with Tier-1 & Tier-2 SI Drive Cisco Security product sales within commercial segment in Manufacturing, PSU, ITeS, Digital Native and Pharma Who You'll Work With GSSO SE team Account Manager Product Engineering BU across vertical Regional SE Team Regional Channel Team Minimum Qualifications 8-10 Years of experience in Security OEM / Service Provider Environment in managing Sales/ Pre-Sales/Product Management function Good understanding of business scenarios with solution expertise to formulate a realistic and executable strategy for Security adoption among enterprises. Possess blend of technology expertise across various cyber security vendors, enterprise networks, datacenter, cloud networking and Information systems security. Good connects with Cybersecurity decision makers in enterprises

Posted 3 weeks ago

Apply

5.0 - 10.0 years

13 - 16 Lacs

Pune

Work from Office

Project description Security is a global organization within Group Technology Infrastructure and Security Engineering. Our services focus on preventing and detecting cyber threats and securing our IT systems. We provide consolidated and reliable security services that implement secure design principles and create best-fit solutions. You will be working in the Cyber Technology service team, providing security products and services for the Cyber Hygiene space - specifically for Infrastructure Scanning and vulnerability assessment. We provide consolidated and reliable security hygiene controls to our clients using the latest technology. As a Cyber Security Engineer, you will play a vital role in creating Infrastructure Scanning and Security Remediation capabilities, determining required IT business solutions, and assisting in implementing them. We offer flexibility in the workplace and equal opportunities to all our team members. Responsibilities Perform vulnerability scanning to discover and analyze vulnerabilities and characterize risks to networks, OS, application, databases etc. (to meet scan coverage targets) Stakeholder engagement to recommend appropriate remedial actions to mitigate risks and validate remedial actions and ensure compliance with regulatory requirements. Perform vulnerability management system administration functions, as required Maintain proficiency in vulnerability management best practices Onboarding new attack surface to vulnerability scanning process Documentation management and continuous service improvement Skills Must have - 5-10 years relevant experience Degree in related discipline or qualified by experience Well-developed oral and written English communication skills Team player with ability to work collaboratively with others and aptitude for self-development Experience using commercial vulnerability scanning solutions such as Rapid7, Qualys, Tenable etc. Expertise with administration of networks, windows and or Linux operating systems An understanding of IT Security Risk, attack vector Nice to have N/A Other Languages EnglishC1 Advanced Seniority Regular

Posted 3 weeks ago

Apply

3.0 - 7.0 years

16 - 20 Lacs

Pune

Work from Office

Project description Security is a global organization within Group Technology Infrastructure and Security Engineering. Our services focus on preventing and detecting cyber threats and securing our IT systems. We provide consolidated and reliable security services that implement secure design principles and create best-fit solutions. You will be working in the Cyber Technology service team, providing security products and services for the Cyber Hygiene space - specifically for Infrastructure Scanning and vulnerability assessment. We provide consolidated and reliable security hygiene controls to our clients using the latest technology. As a Cyber Security Engineer, you will play a vital role in creating Infrastructure Scanning and Security Remediation capabilities, determining required IT business solutions, and assisting in implementing them. We offer flexibility in the workplace and equal opportunities to all our team members. Responsibilities Sound cloud security knowledge, specialized in Azure. Hands on experience on cloud security tools like Wiz.io. Evaluate & assess vulnerabilities/ threats published on internet's cyber space and analysis the relevance to organization. Emergency vulnerability management process. Analysis Zero days, vulnerabilities exploited in the wild to safeguard organization IT landscape. Collaborate with technology, platform, and security teams to mitigate the emerging threats. Conduct assessment on security advisories and support vulnerability advisory process. Maintain & improve existing severity risk rating mechanism and provide sustainable ways for risk mitigation. Skills Must have Ideally up to eight years of hands-on experience with vulnerability scanning tools. Certifications like CEH, OSCP etc will be additional advantage. Good knowledge of CVE's, EPSS, vulnerabilities and exploits. Proven experience in vulnerability management and in depth understanding of vulnerability management lifecycle. Potentially, experience with other security processes e.g. vulnerability scanning or configuration management Prioritisation of complex technical tasks Good at communicating and documenting technical information (MS Teams, Confluence, Gitlab) Skills to collaborate & manage technology partners and other security counterparts. Technical communication and documentation skills Nice to have N/A Other Languages EnglishC1 Advanced Seniority Senior

Posted 3 weeks ago

Apply

2.0 - 7.0 years

7 - 11 Lacs

Mumbai

Work from Office

As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. * Responsible for security researcher to provide insight and understanding of new and existing information security threats * Responsible to participate in recommending improvements to SOC security process, procedures, policies, security incident management and vulnerability management processes * You will be involved in evaluating, recommending, implementing, and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems * Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements * Work in a 24x7 Security Operation Centre (SOC) environment Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * Minimum 2+ years’ experience in SIEM. * Proven expertise in handling the daily monitoring of Information Security events on the QRadar / ArcSight / Splunk console platform * Proficient in monitoring security events from various SOC channels (SIEM, Tickets, Email and Phone), based on the security event severity to handle the service support teams, tier2 information security specialists * Expertise in threat modelling and Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach. Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications

Posted 3 weeks ago

Apply

5.0 - 8.0 years

8 - 12 Lacs

Chennai

Work from Office

Job Title: Client Data Protection Opportunity Support (CDPOS) Specialist + Level 09/10 + CF Location: India Management Level: 09 Specialist/10 Senior Analyst Must have skill :Information Security process and procedures As part of the CDPOS Client Response team, the CDPOS RFP Specialist is primarily responsible for supporting Accenture business development teams to respond to a) client Information Security (IS) and Vendor questionnaires (which are commonly issued as part of Request for Proposal (RFP) process), b) reviewing client Information Security policies / standards, c) completing client Risk Management market surveys, and d) supporting IS and DP conversations with both Client and Accenture Account teams. The role sits within the pre-contract, business development space interfacing with multiple stakeholders common to the contract development process (Solution Architects, Legal, Contract Management and Security leads). The Specialist will act as an Information Security Subject Matter Expert who will support multiple Accenture business development teams (operating across multiple countries) to respond to client information security and data privacy requests related to Accenture IS policies / standards / processes and recognized security frameworks. Key Responsibilities: Respond to client security questionnaires and management market surveys Liaise with account business development team, IT and technical teams to understand specific client security requirements set out in security questionnaire / market survey and determine appropriate responses that meet both client technical requirements and Accenture Information Security standards. Agree a project schedule to respond to requirements and communicate progress with key stakeholders. Perform quality checks on final information security submission Participate in client meetings focused on Information Security controls (if required) Establish and maintain effective working relationships across multiple stakeholders who interact with the Accenture business development process - account management, business development, technical / solution leads, Information Security, Legal and Finance representatives Contribute to the creation of high-quality and reusable IS solutions by updating the CDPOS RFP database with new information security related proposal data (new product release documents / new responses created / changes to Accenture IS Standards & Policies and other Accenture wide developments) Continually build own knowledge on the features of Accenture products, IS practice, services and commonly used IT concepts to respond to client and account questions that are technical in nature Skills and Experience: Possess an understanding and awareness of typical information security framework and common information security standards Demonstrate working knowledge of the Accenture business development process (with practical experience working with stakeholders in the process being an advantage) Be comfortable challenging account executives who are most commonly above peer group - influencing executive decisions and addressing conflicts and challenges Developed an appreciation of Information security best practices, auditing, and overall risk management Possess strong organizational skills with the ability to handle multiple work activities under tight, short-term deadlines (whilst meeting account and qualitative expectations) Demonstrate effective prioritization and time management capability Achieved work experience assessing and implementing information security and data protection controls Strong relationship development skills with an ability to influence and interact with organizational leadership and account executive across multiple countries Preferably hold at least one recognized security certification such as ISO 27001 LA, CISSP, CISA, CISM or CRISC Demonstrate good verbal and written communication skills Possess a good knowledge of MS Office applications (Excel, Word, Power Point) About Our Company | AccentureQualification Good to have skill: Overview on ITIL Experience: Minimum of 1yr

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies