Home
Jobs

538 Vulnerability Management Jobs - Page 11

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

1.0 - 5.0 years

4 - 8 Lacs

Bengaluru

Hybrid

Naukri logo

Knowledge and application: Seasoned, experienced professional; has complete knowledge and understanding of area of specialization. Uses evaluation, judgment, and interpretation to select right course of action. Problem solving: Works on problems of diverse scope where analysis of information requires evaluation of identifiable factors. Resolves and assesses a wide range of issues in creative ways and suggests variations in approach. Interaction: Enhances relationships and networks with senior internal/external partners who are not familiar with the subject matter often requiring persuasion. Works with others outside of own area of expertise, with the ability to adapt style to differing audiences and often advises others on difficult matters. Impact: Impacts short to medium term goals through personal effort or influence over team members. Accountability: Accountable for own targets with work reviewed at critical points. Work is done independently and is reviewed at critical points. Workplace type : Hybrid Working

Posted 2 weeks ago

Apply

4.0 - 8.0 years

6 - 10 Lacs

Mumbai

Hybrid

Naukri logo

Additional Career Level Description: Knowledge and application: Applies broad expertise and knowledge in highly specialized fields or several related disciplines. Leads and contributes to development of company objectives and principles to achieve goals in creative and effective ways. Recognized internally as a subject matter expert with the ability to work on significant and unique issues where analysis of situations or data requires an evaluation of intangibles. Focuses on providing through leadership and works on projects, which requires understanding of wider business. Problem solving: Requires conceptual thinking and analysis of intangibles to understand advanced issues and implications to develop solutions with longer term impacts. Interaction: Requires advising on and conveying advanced information and persuading several diverse stakeholders/audiences. Creates formal networks involving coordination among groups. Impact: Translates functional vision into plans for a discipline and guides their execution. Exercises independent judgment in methods, techniques and evaluation criteria for obtaining results. Accountability: Accountable for own or team results, which may impact the entire function. May direct the activities of project teams.

Posted 2 weeks ago

Apply

8.0 - 11.0 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Naukri logo

Dear Candidate, We are seeking an Information Security Analyst to safeguard the organizations digital assets by identifying vulnerabilities, monitoring threats, and enforcing cybersecurity policies. Key Responsibilities: Monitor systems for security breaches and anomalies. Conduct vulnerability assessments and risk analysis. Implement and manage security tools (SIEM, firewalls, antivirus). Investigate incidents and support response and recovery efforts. Ensure compliance with frameworks such as ISO 27001, NIST, and GDPR. Required Skills & Qualifications: Knowledge of networking, firewalls, and encryption. Familiarity with security tools (Splunk, Nessus, Qualys, etc.). Strong understanding of access controls, IAM, and security protocols. Security certifications preferred (e.g., CompTIA Security+, CISSP, CEH). Experience with incident response and forensic analysis is a plus. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Delivery Manager Integra Technologies

Posted 2 weeks ago

Apply

0.0 - 4.0 years

5 - 9 Lacs

Pune

Work from Office

Naukri logo

Wipro Limited (NYSEWIT, BSE507685, NSEWIPRO) is a leading technology services and consulting company focused on building innovative solutions that address clients’ most complex digital transformation needs. Leveraging our holistic portfolio of capabilities in consulting, design, engineering, and operations, we help clients realize their boldest ambitions and build future-ready, sustainable businesses. With over 230,000 employees and business partners across 65 countries, we deliver on the promise of helping our customers, colleagues, and communities thrive in an ever-changing world. For additional information, visit us at www.wipro.com. About The Role Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information ? Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails ? Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLA??s (90-95%), response time and resolution time TAT ? ? Mandatory Skills: Microsoft Vulnerability Management. Experience5-8 Years. Reinvent your world. We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 2 weeks ago

Apply

10.0 - 20.0 years

12 - 22 Lacs

Hyderabad

Work from Office

Naukri logo

About The Role : Role Purpose The purpose of this role is to design the organisations computer and network security infrastructure and protect its systems and sensitive information from cyber threats Do 1. Design and develop enterprise cyber security strategy and architecture a. Understand security requirements by evaluating business strategies and conducting system security vulnerability and risk analyses b. Identify risks associated with business processes, operations, information security programs and technology projects c. Identify and communicate current and emerging security threats and design security architecture elements to mitigate threats as they emerge d. Identify security design gaps in existing and proposed architectures and recommend changes or enhancements e. Provide product best fit analysis to ensure end to end security covering different faucets of architecture e.g. Layered security, Zoning, Integration aspects, API, Endpoint security, Data security, Compliance and regulations f. Demonstrate experience in doing security assessment against NIST Frameworks, SANS, CIS, etc. g. Provide support during technical deployment, configuration, integration and administration of security technologies h. Demonstrate experience around ITIL or Key process-oriented domains like incident management, configuration management, change management, problem management etc. i. Provide assistance for disaster recovery in the event of any security breaches, attacks, intrusions and unusual, unauthorized or illegal activity j. Provide solution of RFPs received from clients and ensure overall design assurance i. Develop a direction to manage the portfolio of to-be-solutions including systems, shared infrastructure services, applications, hardware related to cyber risk security in order to better match business outcome objectives ii. Analyse technology environment, enterprise specifics, client requirements to set a collaboration design framework/ architecture iii. Depending on the clients need with particular standards and technology stacks create complete RFPs iv. Provide technical leadership to the design, development and implementation of custom solutions through thoughtful use of modern technology v. Define and understand current state solutions and identify improvements, options & tradeoffs to define target state solutions vi. Clearly articulate and sell architectural targets, recommendations and reusable patterns and accordingly propose investment roadmaps vii. Evaluate and recommend solutions to integrate with overall technology ecosystem viii. Tracks industry and application trends and relates these to planning current and future IT needs 2. Stakeholder coordination & audit assistance a. Liaise with stakeholders in relation to cyber security issues and provide timely support and future recommendations b. Provide assistance in maintaining an information security risk register and help with internal and external audits relating to information security c. Support audit of security best practices and implementation of security principles across the organization, to meet business goals along with customer and regulatory requirements d. Assist with the creation, maintenance and delivery of cyber security awareness training to team members and customers e. Provide training to employees on issues such as spam and unwanted or malicious emails Deliver No Performance Parameter Measure 1 Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience, CSAT, educating and suggesting right control to the customers. 2 Support sales team to create wins % of proposals with Quality Index >7, timely support of the proposals, identifying opportunities/ leads to sell services within/ outside account (lead generation), no. of proposals led

Posted 2 weeks ago

Apply

4.0 - 7.0 years

5 - 9 Lacs

Gurugram

Work from Office

Naukri logo

Join our Team About this opportunity: Ericsson invites applications for the role of Software Developer. In this challenging and fulfilled position, you will be tasked with constructing customers solutions during the building phase of the Software Development Life Cycle (SDLC). As a Software Developer, you will be responsible for performing the detailed design of application and technical architecture components and classes according to the specification provided by the System Architect. The role also involves coding Software components and contributing to the early testing phases, as well as extending your support towards system testing. What you will do: - Design and develop detailed software solutions. - Develop and integrate various software components. - Actively participate in software component and system testing. - Support in pre-sales and delivery of software. - Ensure compliance with organizations best practices for software development. - Contribute to asset creation and reuse in software design and development. The skills you bring: - Cloud Technologies (Kubernetes, Docker, AWS, Container, Microservices, spring boot). - Security. - DevSecOps. - Front End Development. - Security Reliability Model (SRM). - Application and Product security. - IT security and compliance. - Agile methodology. - Vulnerability Management. - CI/CD. - Back End Development. - Java Spring Boot Framework. - Tools for CI/CD (Git, Gerrit, Jenkins, Sonar, Helm). Why join Ericsson? What happens once you apply? Primary country and city: India (IN) || Gurgaon Req ID: 766680

Posted 2 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Naukri logo

1. Must have completed CEH certification 2. Must have expertise in DAST/SAST/API security, Network security, Mobile Security/DevSecops/Cloud Security/Vulnerability Management Mandatory Skills DAST (using Burp Suite), API security testing Good to Have Skills Network security, SAST

Posted 2 weeks ago

Apply

5.0 - 6.0 years

12 - 13 Lacs

Pune

Work from Office

Naukri logo

Manage all installed systems and infrastructure, including installation, configuration, testing, and maintenance of Linux-based operating systems. Troubleshoot, tune, upgrade, and monitor RedHat and CentOS systems, ensuring system health and performance. Perform OS upgrades for RedHat and CentOS platforms. Mitigate vulnerabilities related to the Linux OS within defined timeframes. Manage user accounts, create, delete, and modify user permissions, and configure/manage LVM, Apache, Samba, and NFS. Ensure system hardening and compliance with CIS standards. Provide support during IT audits and deliver required evidence to auditors. Enforce operating system policies to ensure security, integrity, and efficiency of system resources, applications, and operations. Support datacenter activities, including hardware break-fix coordination with OEM vendors. Address IT operations tickets and incidents in compliance with defined SLAs. Qualifications and Requirements: Certifications: Red Hat Certified Engineer (RHCE) required. AWS certification is a plus. ITIL certification preferred. Technical Skills: Proven working experience as a Linux Administrator in a large-scale environment. Experience with RedHat and CentOS platforms. Proficiency in managing LVM, Apache, Samba, and NFS. Strong understanding of security hardening techniques (CIS standards). Basic scripting knowledge (eg, Bash, Python). Experience: 5-6 years of experience in Linux system administration, supporting large and complex environments. Hands-on experience with OS patching, upgrades, and vulnerability management. Experience with cloud platforms such as AWS. Familiarity with Virtualization Platform such as VMware. Education: bachelors degree in IT, Computer Science, Computer Engineering, or a related field. Other Skills: Excellent communication and interpersonal skills. Strong problem-solving abilities. Familiarity with ITIL processes such as Incident, Change, and Problem Management. Additional Information: The role requires flexibility to work in 24x7 shifts. The candidate must be able to support datacenter operations and address hardware break-fix issues

Posted 2 weeks ago

Apply

12.0 - 15.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Advisor Project Role Description : Provide enterprise-level advice to make organizations cyber resilient. Assist in navigating the complex landscape of cyber threats, ensuring robust digital asset protection while maintaining trust with stakeholders. Must have skills : Security Governance Good to have skills : NAMinimum 12 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Advisor, you will provide enterprise-level advice to make organizations cyber resilient. Your typical day will involve engaging with various teams to assess and address cyber threats, developing strategies for digital asset protection, and ensuring that stakeholders maintain trust in the organization's security posture. You will also be responsible for staying updated on the latest cybersecurity trends and best practices to effectively guide your organization in navigating the complex landscape of cyber threats. Roles & Responsibilities:-Perform required audits and tests related to the Business Continuity Plans-Develop plans to safeguard data and intellectual property against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs-Work with Accenture's global asset and security organizations to develop solutions for clients unique problems and help implement business continuity plans and align resources, as appropriate-Deliver on key metrics (SLAs and KPIs) and contractual requirements successfully to execute run and transform projects to ensure the quality of functioning of teams to optimize security measures-Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Governance.- Strong understanding of risk management frameworks and compliance standards.- Experience in developing and implementing security policies and procedures.- Ability to conduct security assessments and audits.- Familiarity with incident response planning and execution. -Active participation in hiring of talent, operating of projects in various type and scale, execute concepts and implementation strategies for various systems to ensure practical implementation of security standards across client and industries.-Understands requirements and participates in Solution Review, Client orals, Client visits etc. to represent Accenture to help client and provide solutions to clients needs.-Document and deliver security and emergency measures policies, procedures, and tests.-Conversant on multiple CyberSecurity domains like:Identity and Access Management, Network Security, Vulnerability Management (Infra and Applications), Cloud Security, Endpoint and Email Security, SOC\SIEM, Network Security, Risk & Compliance, Data Security independent of various tools, technologies and processes. Additional Information:- The candidate should have minimum 12 years of experience in Security Governance.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

6.0 - 10.0 years

9 - 14 Lacs

Chennai, Bengaluru

Work from Office

Naukri logo

Job Title : DevOps Engineer Location: Chennai/ Bangalore Job Type: Full time Experience: 4 6 yrs Job Summary: We are seeking a skilled DevOps Engineer to join our team to streamline software development and deployment processes. The ideal candidate will work closely with development, operations, and QA teams to automate and optimize mission-critical deployments, infrastructure, and system monitoring. Your work will be crucial in ensuring the reliability, scalability, and security of our production environments. Key Responsibilities: CI/CD Pipeline Development: Design, implement, and manage continuous integration and deployment pipelines. Infrastructure as Code (IaC): Use tools like Terraform, Ansible, or CloudFormation to automate infrastructure provisioning. Cloud Infrastructure Management: Deploy and manage infrastructure on AWS, Azure, or Google Cloud Platform. Monitoring & Logging: Set up and maintain monitoring systems using tools like Prometheus, Grafana, ELK stack, or Datadog. Collaboration: Work closely with developers and other engineers to ensure high system availability and reliability. Security: Implement and maintain security best practices throughout the DevOps lifecycle. Incident Management: Troubleshoot production issues and coordinate with relevant teams to ensure prompt resolution. Automation: Continuously improve system performance and deployment efficiency through scripting and automation. Required Qualifications: Bachelor’s degree in Computer Science, Engineering, or a related field, or equivalent work experience. Proven experience as a DevOps Engineer or similar role. Proficient in scripting languages such as Python, Bash, or PowerShell. Experience with CI/CD tools like Jenkins, GitLab CI, CircleCI, or GitHub Actions. Strong understanding of containerization (Docker, Kubernetes). Familiarity with cloud platforms (AWS, GCP, Azure). Experience with configuration management tools (Ansible, Chef, Puppet). Solid understanding of networking and security principles. Preferred Qualifications: Certifications in AWS, Azure, or Kubernetes (e.g., CKA, AWS Certified DevOps Engineer). Experience with serverless architectures. Knowledge of GitOps workflows. Experience working in Agile/Scrum environments.

Posted 2 weeks ago

Apply

3.0 - 8.0 years

4 - 8 Lacs

Pune

Work from Office

Naukri logo

As an Associate Developer at IBM, you'll work with clients to co-create solutions to major real-world challenges by using best practice technologies, tools, techniques, and products to translate system requirements into the design and development of customized systems. In your role, you will be responsible for: Your primary responsibilities include: Working on the end to end feature development and solving challenges faced in the implementation. Collaborate with key stakeholders, internal and external, to understand the problems, issues with the product and features and solve the issues as per SLAs defined. Being eager to learn new technologies and implementing the same in feature development. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise Hands on extensive experience on RPG language on AS/400 System I and have worked on Production system and Application Development. 3+ years of relevant experience working on mainframes. Should have technical expertise/hands on – Assembler, COBOL, JCL, CICS, VSAM, Inter-test, Fault Analyser, File-Manager, Control-M/Any other Scheduler etc. Should have expertise working on JIRA/Confluence/SharePoint/Any Change management tool (Remedy/Myservice/Service now etc.) Message Types and Transaction flows. Preferred technical and professional experience Processing between Acquirers, Issuer & Acquiring gateways etc. Interact with different stake holders , gather and articulate the . Good communications skills to deal with the clients directly and set up calls to bring the Business and Delivery inline.

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 8 Lacs

Vadodara

Work from Office

Naukri logo

Civica develops software for local and national government, education, health and care. Over 5,000 public bodies across the globe use our software to help deliver critical services to over 100 million citizens. Our aspiration is to be a GovTech champion everywhere we work around the globe, supporting the needs of citizens and those that serve them every day. Building on 21 years of continuous growth and success, were at a pivotal point on our journey to realise that aspiration. As a company, we re passionate about what we do and the citizens we help to serve. If you too would like to help champion the use of technology in public services, to improve outcomes for citizens and public sector organisations, then Civica is the right place for you. We will help you unlock the best version of yourself, achieve growth in your career whilst making a real difference to people and communities. Why will you love this opportunity as Security Operations Centre (SOC) at Civica As a vital member of our dynamic Security Operations Centre (SOC) team, comprising Analysts, Engineers, and a SOC Manager, youll take the lead in monitoring our SIEM and various security systems to safeguard both CIVICA Group and our valued customers. Your keen eye will assess real-time and historical logs across multiple technologies, helping to uncover potential attack patterns, instances of compromise, and security vulnerabilities. Working closely with your team, youll swiftly determine the most effective response to security events and incidents, while meticulously documenting every step taken to contain and resolve the issues. Youll also manage internal customer requests, particularly in relation to phishing, spam, and Anti-virus challenges. Additionally, youll evaluate risks using a Surface Attack Tool, develop and utilize OSINT tools to gather open-source intelligence from various published sources, and collaborate with different business units to inform, mitigate, or remediate any issues. In this role, youll be in charge of supervising Microsoft Sentinel and Microsoft Defender systems, while also managing other technologies as needed, including IPS, Email Gateways, Web Filtering services, and Antivirus solutions. You ll be on the lookout for patterns of misuse or recurring issues, working together with the team to contain, control, and resolve any incidents. Plus, you ll have the chance to identify opportunities for improvement in our personnel, processes, or technology to enhance the teams overall effectiveness. A deep understanding of security principles Use of Microsoft Sentinel and/or Defender Minimum 3 years experience working in IT, with at least 1 year in a security-based role. Any recognised certific

Posted 2 weeks ago

Apply

6.0 - 12.0 years

17 - 18 Lacs

Bengaluru

Work from Office

Naukri logo

Vulnerability Management Job Description Scanning, tracking, recording and reporting vulnerabilities using Tenable Security Center and Vulcan Cyber. Validate and triage identified vulnerabilities. Track remediation efforts to their completion. Contribute to team strategy in managing threats and vulnerabilities Prepare and present reports that document vulnerability trends within our environments key areas for improvement Should administer, operate, update, patch, configure, develop, integrate, install, troubleshoot and maintain vulnerability management systems, tools, tactics, techniques and procedures Familiarity with Vulnerability Management tools such as Tenable SC Develop scripts to automate the system installation of required patches and configurations to remediate identified system vulnerabilities via SCCM. Provide regular reporting on patch management program and overall operation status of patch compliance via SCCM. Knowledge on SCCM/Endpoint Configuration

Posted 2 weeks ago

Apply

3.0 - 5.0 years

15 - 19 Lacs

Bengaluru

Work from Office

Naukri logo

Not Applicable Specialism Risk Management Level Senior Associate & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisations security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purposeled and valuesdriven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us . At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations & Summary A career within Cybersecurity and Privacy services, will provide you with the opportunity to help our clients implement an effective cybersecurity programme that protects against threats, propels transformation, and drives growth. As companies pivot toward a digital business model, exponentially more data is generated and shared among organisations, partners and customers. We play an integral role in helping our clients ensure they are protected by developing transformation strategies focused on security, efficiently integrate and manage new or existing technology systems to deliver continuous operational improvements and increase their cybersecurity investment, and detect, respond, and remediate threats Responsibilities Minimum 35 years of experience Strong communication and presentation skills Basic knowledge on Cybersecurity and Network concepts. Good understanding and working exposure towards endpoint security, data security, network security and cloud security. Previous or current experience in managing a highlevel corporate breach. Understanding of Mitre Framework and Cyber kill chain techniques and how to implement it in the client infrastructure to detect and mitigate threats, Exposure towards technologies such as SIEM, EDR, Email Security, DLP, Vulnerability Management and Network Monitoring technologies (CrowdStrike, Palo Alto, Digital Guardian, Proofpoint) Good to have knowledge and experience on malware analysis, reverse engineering and performing deep dive forensic investigations. Willing to learn and put in the thought process to solve complex problems within the Security domain. Willing to work in 24/7 rotational shift. Good to have certifications such as CEH, GCIH, Network & Security Fundamentals. Mandatory Skill Sets SIEM , EDR , Crowdstike , Mitre , DLP , Proofpoint Preferred Skill Sets SIEM , EDR , Crowdstike , Mitre , DLP , Proofpoint Years of Experience 3+ Years Educational Qualification BE, B.Tech, M.Tech, MCA, MBA graduates. Education Degrees/Field of Study required Bachelor of Technology, Bachelor of Engineering, Master of Business Administration Degrees/Field of Study preferred Required Skills SoCs Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, Information Security, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion Detection System (IDS), IT Operations, Learning Agility, Malware Analysis, Malware Detection Tools {+ 16 more} No

Posted 2 weeks ago

Apply

3.0 - 6.0 years

5 - 9 Lacs

Hyderabad

Work from Office

Naukri logo

Ability to understand the technical implications and impact of various types of vulnerabilities on servers and applications including remote code execution, elevation of privilege, information disclosure. Ability to assess the risk associated with vulnerabilities, including impact and exploitability Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 3 plus years of experience Experience in vulnerability management, security operations, or a related field with a proven track record of identifying and mitigating vulnerabilities. Practical experience with vulnerability scanning, risk assessment, and patch management processes. Proficiency with vulnerability scanning tools such as Nessus, Qualys, Rapid7 Preferred technical and professional experience Vulnerability AssessmentExperience in conducting vulnerability assessments and penetration testing Application Hands-on experience withTenable.SC (or an equivalent VM platform) including administration of Nessus remote and agent-based scans, profile creation and maintenance Skills in prioritizing vulnerabilities based on their severity, potential impact, and the organization’s risk profile, experience with ASM solution

Posted 2 weeks ago

Apply

3.0 - 5.0 years

5 - 7 Lacs

Hyderabad

Work from Office

Naukri logo

Role Purpose The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information Do Ensuring customer centricity by providing apt cybersecurity Monitoring and safeguarding the log sources and security access Planning for disaster recovery in the event of any security breaches Monitor for attacks, intrusions and unusual, unauthorized or illegal activity Performs moderately complex log reviews and forensic analysis to identify unauthorized or unacceptable access to data or systems Conduct security assessments, risk analysis and root cause analysis of security incidents Handling incidents escalated by the L1 team in 24x7 rotational shifts Use advanced analytics tools to determine emerging threat patterns and vulnerabilities Completing all tactical security operations tasks associated with this engagement. Analyses all the attacks and come up with remedial attack analysis Conduct detailed analysis of incidents and create reports and dashboards Stakeholder coordination & audit assistance Liaise with stakeholders in relation to cyber security issues and provide future recommendations Maintain an information security risk register and assist with internal and external audits relating to information security Assist with the creation, maintenance and delivery of cyber security awareness training for colleagues Advice and guidance to employees on issues such as spam and unwanted or malicious emails Deliver No. Performance Parameter Measure 1. Customer centricity Timely security breach solutioning to end users, Internal stakeholders & external customers experience 2. Process Adherence Adherence to SLAs (90-95%), response time and resolution time TAT Mandatory Skills: Vulnerability Management.

Posted 2 weeks ago

Apply

2.0 - 5.0 years

3 - 7 Lacs

Mumbai

Work from Office

Naukri logo

The primary responsibility of this role is to provide advanced incident analysis and management within our SOC environment, while also leading the development and training of the L1 SOC team in incident analysis, parsers creation, rule views, and report management. The ideal candidate will have a strong background in cybersecurity, incident response, and leadership skills. Responsibilities: Advanced Incident Analysis: Utilize advanced tools and techniques to analyze and investigate security incidents detected within the organization's networks and systems. Incident Response: Lead incident response efforts, coordinating with internal and external stakeholders to mitigate and remediate security incidents promptly. Team Leadership: Provide mentorship and guidance to the L1 SOC team, assisting in the development of their skills in incident analysis, parser creation, rule views, and report management. Parser Creation: Develop and maintain parsers to enhance the capability of the SOC's security information and event management (SIEM) system in detecting and correlating security events. Rule View Management: Manage and optimize rule views within the SIEM platform to ensure accurate and timely detection of security threats. Report Management: Oversee the generation and distribution of security reports, including incident reports, trend analysis, and recommendations for improvement. Collaboration: Work closely with other teams within the organization, including IT operations, network engineering, and application development, to improve overall security posture and incident response capabilities. Qualifications: Bachelor's degree in Computer Science, Information Security, or a related field. Equivalent work experience may be considered. Minimum of 3 years of experience in a SOC environment, with a focus on incident analysis and response. Strong understanding of cybersecurity principles, including threat detection, malware analysis, and vulnerability management. Experience with SIEM platforms (e.g., Securonix, QRadar) and familiarity with creating and managing parsers and rule views. Leadership experience, with the ability to mentor and motivate team members effectively. Excellent communication skills, both written and verbal, with the ability to convey complex technical concepts to non-technical stakeholders.

Posted 2 weeks ago

Apply

0.0 - 2.0 years

4 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

Monitoring and Incident Triage: Monitor endpoint security alerts and events generated by Crowdstrike and Trendmicro. Perform initial triage and analysis of security alerts to identify potential threats and incidents. Escalate critical incidents to Level 2 or appropriate teams for further investigation and resolution. Troubleshooting and Support: Provide first-line support for endpoint security-related inquiries and issues reported by end-users or other teams. Assist in troubleshooting endpoint security tool-related problems, including software configuration issues, policy enforcement, and detection rule tuning. Document and track support tickets/incidents in the ticketing system, ensuring timely resolution and effective communication with stakeholders. Endpoint Protection Management: Assist in the deployment, installation, and configuration of Crowdstrike and TrendMicro endpoint security solutions across the organization. Ensure endpoint security agents are properly installed, updated, and functioning correctly on all managed devices. Conduct regular health checks and maintenance tasks to ensure the integrity and effectiveness of endpoint security controls. User Education and Awareness: Collaborate with the cybersecurity awareness team to develop educational materials and resources related to endpoint security best practices. Documentation and Knowledge Sharing: Maintain up-to-date documentation of endpoint security configurations, procedures, and troubleshooting guidelines. Contribute to the knowledge base by documenting common issues, resolutions, and best practices for future reference.

Posted 2 weeks ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Hyderabad

Work from Office

Naukri logo

Under the direction of the Security Administration Manager, the Security Administration Engineer will manage and administer security technologies and provide security management services, requirements, direction, and support. The Security Administration Engineer is responsible for the quality control within the Security infrastructure and tools. This includes building and defending scalable, secure, and robust systems; defining security requirements for operational systems and networks; helping the organization understand advanced cyber threats; and helping to create strategies to protect networks. This role will be responsible for execution of the vulnerability management program and assist the Security Administration Manager with improving processes and reducing the time remediate vulnerabilities. This leader must be current and keep current with changing technology, industry best practices, and standard security frameworks. Assign remediation tasks and assist application owners and remediation teams by providing vulnerability analysis and remediation prioritization. Maintain the vulnerability scanning infrastructure, scan schedules, and risk scoring adjustments Participates in direct support of security systems and tools, including installation, configuration, security, and maintenance. Implements upgrades, enhancements, and fixes following established change management procedures. Maintains security tool disaster recovery and DEV/Test environments. Execute and improve vulnerability management processes (vulnerability scanning, remediation, exceptions, etc.) and maintain process documentation. Participates as a technical lead in the execution of the security program roadmap across the enterprise by providing expert guidance and solutions engineering services as part of initiatives and day-to-day operations. Stays current with emerging identity technologies, solutions and best practices. Advises Security Administration Manager on related risk and security posture. Performs troubleshooting and remediation of security tool issues. Participates in scheduled and unscheduled after-hours system maintenance and support. Performs rotational on-call duty. Provides implementation assistance for onboarding new security tools and processes. Updates team training documentation, technical processes, and testing plans. Education/Certifications Preferred: CompTIA Security+ Technical/Soft skills Required: Thorough understanding of vulnerability management concepts and processes. Demonstratesstrongproblemsolving,analytical,interpersonalandownershipskills. Proficiency with cloud, hybrid cloud, and on-prem Security Administration models. Thoroughunderstandingofsecurityprotocols/methodologiesandcontrols. Preferred: Knowledge of all aspects of the software development lifecycle Knowledge of web development technologies EXPERIENCE Preferred: Microsoft Defender - Endpoint Vulnerability Management Delinea Privilege Manager 2+years of experience in an information securityrole LEADERSHIP SKILLS Required: Strong leadership skills and the ability to work effectively with business managers, Enterprise Architecture, IT engineering and IT operations staff. Ability to break down technically complex and ambiguous concepts and rationalize into simple concepts and ideas. Ability to understand and articulate business imperatives as well as the business impact of security tools, technologies and policies. Ability to mentor and provide coaching to team members.

Posted 2 weeks ago

Apply

5.0 - 9.0 years

9 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

Atlas Energy - Cybersecurity Analyst Security Analyst - Threat Management and Vulnerability Assessment Seeking a skilled Security Analyst (4-6 years) specializing in threatmanagement and vulnerability assessments. The ideal candidate will haveexperience with Defender for Cloud (migration from L1 to L2), Rapid7, andIntune, and a foundational understanding of Operational Technology (OT)systems, particularly the Dragos platform. This role involves advanced threatdetection and remediation, vulnerability assessments, patching, and hardeningtasks. Qualifications: - Experience with Defender for Cloud and Rapid7. - Proficiency in vulnerability assessments, patch management, and systemhardening. - Familiarity with Intune and Rapid7 agent deployment issues. - Basic understanding of OT systems and security, particularly the Dragosplatform. - NIST controls implementation. - Excellent communication and documentation abilities. Shift Timing - US CST hours

Posted 2 weeks ago

Apply

5.0 - 9.0 years

9 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

Dedicated lead to work with the Happiest Minds Shared SOC team and ITteam to enhance the overall Incident response processes Run any critical incident response along with SOC and IT team Review and update the use caserepository as applicable to Happiest Minds Environment Work on root causeanalysis and remediations for alerts/incidents raised by customers Review andupdate existing automation playbooks Continuous updates of detectiontechniques Periodic threat hunting Use cases to prioritize based on thefindings from the threat and vulnerability management program

Posted 2 weeks ago

Apply

4.0 - 7.0 years

11 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Windows, Linux OS We are looking for a skilled and proactive Security Analyst to join our Server and Vulnerability Management team The ideal candidate will possess expertise in identifying, assessing, and mitigating vulnerabilities across operating and non-operating systems The role requires proficiency in BigFix and Qualys, along with experience in providing solutions for vulnerabilities A strong background in scripting and the ability to conduct impact analysis for critical non-OS vulnerabilities is essential

Posted 2 weeks ago

Apply

5.0 - 9.0 years

9 - 14 Lacs

Bengaluru

Work from Office

Naukri logo

Implementation and Deployment: - Design and deploy IDS (ARMIS)solutions tailored to OT environments. - Develop comprehensive deploymentarchitectures, ensuring seamless integration with existing systems. - Configure and optimize network andfirewall settings to support IDS deployments. Data Network Security - IDS, Cybersecurity.

Posted 2 weeks ago

Apply

7.0 - 12.0 years

11 - 16 Lacs

Bengaluru

Work from Office

Naukri logo

Aqua, Vulnerability Assessment, Vulnerability Mitigation - Applicants should possess 7+ years of demonstrated experience in cybersecurity, network engineering, and/or infrastructure engineering 5 of the years must include hands on experience in one or many of the following areas - threat intelligence, server vulnerability management and container vulnerability management - 3 plus years experience administering cloud container vulnerability solutions like Aqua or Wix is required Candidates without this experience will not be considered - 3+ years working with container technologies and container vulnerabilities is required Candidates without this experience will not be considered - Experience with scanning solutions such as Rapid7, Qualys, or Tenable scanning is desired - Understanding of MITRE ATTCK and OWASP frameworks is desired - Understanding of malware and common attack types is desired

Posted 2 weeks ago

Apply

4.0 - 6.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Naukri logo

This will be an Individual Contributor role to start and can evolve over time based on how this function matures. You will play a critical role in the companys tech infrastructure, processes which will be fully aligned with regulatory, security and business continuity standards. Key Responsibilities Draft, coordinate monitor IT processes policies to ensure compliance as per IT Act, regulatory bodies (e.g. RBI, SEBI, GDPR, UIDAI etc.), info security (ISM) guidelines and other applicable laws with respect to Technology, in coordination with internal external stakeholders Prepare update business-wise IT infra details required by the Compliance/Legal teams for regulatory filings and 3rd party audits Conduct vendor risk assessment audits ensure identified gaps are proactively filled Introduce new processes policies by conducting market studies surveys relevant to our business Plan, formulate, coordinate, implement monitor the cyber crisis management plan (CCMP) Incident Management and resolution Interface with external auditors and set up processes to ensure all Infosec audits go smoothly Formulate, implement, review monitor BCP Requirements 4-6 years of experience, including being SPOC for Infosec audits In-depth knowledge of technology, security, risk, and compliance best practices Strong capability in interfacing with both technology and business teams Detailed understanding of security monitoring, threat intelligence vulnerability management A self-driven attitude with a strong sense of ownership Experience with RBI and/or SEBI (preferred) audits is a big plus Assisting the team to conduct Technology Committee Assisting the Risk Officer to conduct independent assessments of the business functions Provide timely data for Risk Management Committee

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies