1 Opening(s)
3.0 Year(s) To 10.0 Year(s)
7.00 LPA TO 15.00 LPA
Job Role:
Leading a team that performs Application Security Testing, Server Configuration Audits and Vulnerability Assessments
Ensuring that VAPT for existing applications/systems are performed as per policy, track the compliance status, following up with application/system owners for closures of the security findings.
Releasing VAPT dashboards and reports periodically to management and relevant stake ...
2 Opening(s)
4.0 Year(s) To 8.0 Year(s)
6.00 LPA TO 12.00 LPA
Responsible for Azure Cloud & On-prem Infrastructure development & maintenance
Responsible for Active Directory and O365 User Management
Device & Hardware management and maintenance across the organization.
Continuous backup, device health check & security policy updating
Responsible for Internet, Firewall & all network-related activities
Helping development team to troubleshoot & fix Infra structure related issues.
Responsible ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Web Application Security Testing
Good to Have Skills : Web Application Development
Job Requirements :
1 Experience in Web Application Security Scanning tools like IBM AppScan Tool, Qualys, Netspaker etc
2 ...
2 Opening(s)
4.0 Year(s) To 7.0 Year(s)
12.00 LPA TO 16.00 LPA
4 - 7 years of experience in operational security roles is required, with previous SOC experience stronglypreferred.ï‚· Deep familiarity with one or more SIEM tools is required.ï‚· A good knowledge of a wide variety of security products is required.ï‚· A strong understanding of technical IT concepts is required, including:o Windows ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Job Summary
We are looking for an experienced and highly skilled Penetration Tester with over 5 years of experience to join our cybersecurity team. The ideal candidate will have a deep understanding of network and application security, a strong background in ethical hacking, and the ability to identify and mitigate security ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
19.00 LPA TO 20.00 LPA
Job Title: Application Security Assessment Manager
Department: RMD
Reports to: CISO
Experience: 5-8 years of application security testing, Penetration testing and Secure Code review and managing team of Application assessors for thick clients, web and mobile applications
Required Qualification: BE / MCA/ M.Tech – IT/Cyber Security
Preferred Qualification: Professional Certification like Certified Ethical ...
1 Opening(s)
5.0 Year(s) To 7.0 Year(s)
22.00 LPA TO 30.00 LPA
A day in the life -
· Perform Penetration Testing for networks (internal & external), applications, APIs & cloud assets along with Red & Purple Team assessments
· Vulnerability identification and analysis
· Collaborate with team members and stakeholders to define project scopes, review test results, and determine remediation steps
· Draft reports ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
12.00 LPA TO 14.00 LPA
A day in the life -
· Perform Penetration Testing for networks (internal & external), applications, APIs & cloud assets along with Red & Purple Team assessments
· Vulnerability identification and analysis
· Collaborate with team members and stakeholders to define project scopes, review test results, and determine remediation steps
· Draft reports and ...
4 Opening(s)
1.0 Year(s) To 4.0 Year(s)
8.00 LPA TO 12.00 LPA
Sr. No.
Job Description
Duty Statements
1
Manual Testing
Perform threat modelling
Perform architectural analysis
Perform logical security assessment
Monitor third party API’s, SDK and libraries are up to date.
Generate assessment report
Report your findings as per severity
2
Automation testing
To use automated scanning tools
Review false positives and true positives
Generate assessment report
Report your findings as per severity
Analyze reports from interactive source code review tool for false positives and include it in the report.
3
Analysis and reporting
Create detailed assessment report as per company standard.
Report issues as per severity
Follow up and review the fixes
4
Ad hoc request
Work on Ad hoc request related to application security
Conduct pen. Test, Design reviews as per the request
5
Trainings and knowledge
transfer
Conduct periodic security awareness training as per the requirement bases on global standards.
Working Relationships:
Team leads
Peers
Developers
Product managers
Other security teams
Support and operations team
Infrastructure teams
Knowledge
Skills
Attributes
Understanding of OWASP Top 10,SANS Top 25 and WASC, NIST.
Black Box, Grey Box security assessment of web application, Mobile application.
Experience of identification and mitigation of vulnerabilities
Good knowledge of TCP/IP and other application and network level protocols.
Security in SDLC (Application Security)
Strong team player
Interpersonal Skills
Good communication
Active listening
Believes in team work over individual contributions
Articulation of thoughts
Able to express view assertively
Ownership and accountability
Passion
Integrity
Team work
Security Analyst :
Shift : Middle Shift 12pm to 9pm
Relevant Exp : Minimum 1 year in App Sec
Condition: 2 years Bond