16 Job openings found

4 Opening(s)
1.0 Year(s) To 4.0 Year(s)
8.00 LPA TO 12.00 LPA
Sr. No.  Job Description  Duty Statements  1  Manual Testing  Perform threat modelling  Perform architectural analysis  Perform logical security assessment  Monitor third party API’s, SDK and libraries are up to date.  Generate assessment report  Report your findings as per severity    2  Automation testing   To use automated scanning tools   Review false positives and true positives  Generate assessment report  Report your findings as per severity  Analyze reports from interactive source code review tool for false positives and include it in the report.  3  Analysis and reporting  Create detailed assessment report as per company standard.  Report issues as per severity  Follow up and review the fixes  4  Ad hoc request  Work on Ad hoc request related to application security  Conduct pen. Test, Design reviews as per the request  5  Trainings and knowledge  transfer  Conduct periodic security awareness training as per the requirement bases on global standards.    Working Relationships:  Team leads  Peers  Developers  Product managers  Other security teams  Support and operations team  Infrastructure teams    Knowledge  Skills  Attributes  Understanding of OWASP Top 10,SANS Top 25 and WASC, NIST.  Black Box, Grey Box security assessment of web application, Mobile application.  Experience of identification and mitigation of vulnerabilities  Good knowledge of TCP/IP and other application and network level protocols.  Security in SDLC (Application Security)  Strong team player  Interpersonal Skills  Good communication  Active listening  Believes in team work over individual contributions  Articulation of thoughts  Able to express view assertively    Ownership and accountability  Passion  Integrity  Team work     Security Analyst :   Shift : Middle Shift 12pm to 9pm Relevant Exp : Minimum 1 year in App Sec Condition: 2 years Bond
1 Opening(s)
15.0 Year(s) To 20.0 Year(s)
50.00 LPA TO 60.00 LPA
Responsibilities   Operational: Understanding business processes and assessing the criticality of the technological solutions being used to carry out business functions. Review business Level processes and new initiatives for Cyber security requirements and help in incorporating industry best practices.  Continuously monitor and assess execution of security policy and validate necessary controls are in place. Support security ...
1 Opening(s)
15.0 Year(s) To 20.0 Year(s)
70.00 LPA TO 80.00 LPA
Responsibilities   Operational: Understanding business processes and assessing the criticality of the technological solutions being used to carry out business functions. Review business Level processes and new initiatives for Cyber security requirements and help in incorporating industry best practices.  Continuously monitor and assess execution of security policy and validate necessary controls are in place. Support security ...
1 Opening(s)
10.0 Year(s) To 20.0 Year(s)
35.00 LPA TO 35.00 LPA
Responsibilities   Operational: Understanding business processes and assessing the criticality of the technological solutions being used to carry out business functions. Review business Level processes and new initiatives for Cyber security requirements and help in incorporating industry best practices.  Continuously monitor and assess execution of security policy and validate necessary controls are in place. Support security ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
11.00 LPA TO 16.00 LPA
Job Description:   Ø  Conduct real time cyber-attack simulations as part of the RED team activity. Ø  Perform Cover, overt and specialized Red Team assessment. Ø  Keep one self  updated on the latest IT Security news, exploits, hacks. Ø  Prepare Threat Intelligence reports for newly discovered threat agents, exploits, attacks. Ø  Conduct vulnerability Assessment and Penetration Testing for web applications, Network, Web/ NW ...
1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
5.00 LPA TO 8.00 LPA
Job Description CEH or equivalent Certification and Proven work experience as a CEH   In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.   Identifying and recording security flaws and breaches.   Knowledge and understanding of SIEM tools.   Manage the incident and related documents like an incident report, incident plan, etc.   Prepare the ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile