1 Opening(s)
3.0 Year(s) To 10.0 Year(s)
7.00 LPA TO 15.00 LPA
Job Role:
Leading a team that performs Application Security Testing, Server Configuration Audits and Vulnerability Assessments
Ensuring that VAPT for existing applications/systems are performed as per policy, track the compliance status, following up with application/system owners for closures of the security findings.
Releasing VAPT dashboards and reports periodically to management and relevant stake ...
2 Opening(s)
4.0 Year(s) To 8.0 Year(s)
6.00 LPA TO 12.00 LPA
Responsible for Azure Cloud & On-prem Infrastructure development & maintenance
Responsible for Active Directory and O365 User Management
Device & Hardware management and maintenance across the organization.
Continuous backup, device health check & security policy updating
Responsible for Internet, Firewall & all network-related activities
Helping development team to troubleshoot & fix Infra structure related issues.
Responsible ...
3 Opening(s)
3.0 Year(s) To 9.0 Year(s)
5.00 LPA TO 20.00 LPA
Role : Security Architect
Role Description : Define the security architecture, ensuring that it meets the business requirements and performance goals.
Must have Skills : Web Application Security Testing
Good to Have Skills : Web Application Development
Job Requirements :
1 Experience in Web Application Security Scanning tools like IBM AppScan Tool, Qualys, Netspaker etc
2 ...
1 Opening(s)
15.0 Year(s) To 20.0 Year(s)
Not Disclosed by Recruiter
JOB DESCRIPTION
1. Information Security Risk Management: Identifying and assessing information securityrisks within the bank's operations and technology infrastructure.2 .Developing risk treatment plan to mitigate and address identified risks and fine tunebased on the risk posture3. Vendor and Third-Party Risk Management: Assessing and managing the security risksassociated with third-party vendors and ...
2 Opening(s)
4.0 Year(s) To 7.0 Year(s)
12.00 LPA TO 16.00 LPA
4 - 7 years of experience in operational security roles is required, with previous SOC experience stronglypreferred.ï‚· Deep familiarity with one or more SIEM tools is required.ï‚· A good knowledge of a wide variety of security products is required.ï‚· A strong understanding of technical IT concepts is required, including:o Windows ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Job Summary
We are looking for an experienced and highly skilled Penetration Tester with over 5 years of experience to join our cybersecurity team. The ideal candidate will have a deep understanding of network and application security, a strong background in ethical hacking, and the ability to identify and mitigate security ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
19.00 LPA TO 20.00 LPA
Job Title: Application Security Assessment Manager
Department: RMD
Reports to: CISO
Experience: 5-8 years of application security testing, Penetration testing and Secure Code review and managing team of Application assessors for thick clients, web and mobile applications
Required Qualification: BE / MCA/ M.Tech – IT/Cyber Security
Preferred Qualification: Professional Certification like Certified Ethical ...
1 Opening(s)
5.0 Year(s) To 7.0 Year(s)
22.00 LPA TO 30.00 LPA
A day in the life -
· Perform Penetration Testing for networks (internal & external), applications, APIs & cloud assets along with Red & Purple Team assessments
· Vulnerability identification and analysis
· Collaborate with team members and stakeholders to define project scopes, review test results, and determine remediation steps
· Draft reports ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
12.00 LPA TO 14.00 LPA
A day in the life -
· Perform Penetration Testing for networks (internal & external), applications, APIs & cloud assets along with Red & Purple Team assessments
· Vulnerability identification and analysis
· Collaborate with team members and stakeholders to define project scopes, review test results, and determine remediation steps
· Draft reports and ...