1 Opening(s)
10.0 Year(s) To 20.0 Year(s)
35.00 LPA TO 35.00 LPA
Responsibilities
Operational:
Understanding business processes and assessing the criticality of the technological solutions being used to carry out business functions.
Review business Level processes and new initiatives for Cyber security requirements and help in incorporating industry best practices.
Continuously monitor and assess execution of security policy and validate necessary controls are in place.
Support security ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
11.00 LPA TO 16.00 LPA
Job Description:
Ø Conduct real time cyber-attack simulations as part of the RED team activity.
Ø Perform Cover, overt and specialized Red Team assessment.
Ø Keep one self updated on the latest IT Security news, exploits, hacks.
Ø Prepare Threat Intelligence reports for newly discovered threat agents, exploits, attacks.
Ø Conduct vulnerability Assessment and Penetration Testing for web applications, Network, Web/ NW ...
1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
5.00 LPA TO 8.00 LPA
Job Description
CEH or equivalent Certification and Proven work experience as a CEH
In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.
Identifying and recording security flaws and breaches.
Knowledge and understanding of SIEM tools.
Manage the incident and related documents like an incident report, incident plan, etc.
Prepare the ...
1 Opening(s)
10.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
Key Areas, Roles and Responsibilities:A. General Accounting and Taxation ? Investigate, develop, implement and maintain internal systems to generate reports. ? Ensure that there is an effective system for accurate, reliable and timeous financial reporting. ? To manage, prepare and ensure completion of monthly / quarterly /annual ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
12.00 LPA TO 14.00 LPA
A day in the life -
· Perform Penetration Testing for networks (internal & external), applications, APIs & cloud assets along with Red & Purple Team assessments
· Vulnerability identification and analysis
· Collaborate with team members and stakeholders to define project scopes, review test results, and determine remediation steps
· Draft reports and ...
1 Opening(s)
10.0 Year(s) To 12.0 Year(s)
25.00 LPA TO 25.00 LPA
Job Title: Infosec Lead
Department: IT
Level/Designation Manager/Sr. Manager
Position Type: Full Time
Job Overview
This role is responsible for implementing processes such as GRC to automate and continuously monitor the information security controls, risks, etc. Evaluates the firm to ensure compliance with security standards andrelevance with industry security norms.
ROLE AND RESPONSIBILITIES
Provide a bullet point list ...
1 Opening(s)
5.0 Year(s) To 7.0 Year(s)
22.00 LPA TO 30.00 LPA
A day in the life -
· Perform Penetration Testing for networks (internal & external), applications, APIs & cloud assets along with Red & Purple Team assessments
· Vulnerability identification and analysis
· Collaborate with team members and stakeholders to define project scopes, review test results, and determine remediation steps
· Draft reports ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
25.00 LPA TO 32.00 LPA
Sr. No.
Area
Responsibility Details
1
Leadership
Understand our business and it’s applications
Lead and manage a group of employees in multiple offices
Set Strategic direction and standards for the team
Define SDLC secure practices
2
Mentor
Mentor the team with your knowledge and experience.
Design and implement Application security methodology and activities.
3
AppSec
Vulnerability assessments of our products
Take lead in identification of new ...
4 Opening(s)
1.0 Year(s) To 4.0 Year(s)
8.00 LPA TO 12.00 LPA
Sr. No.
Job Description
Duty Statements
1
Manual Testing
Perform threat modelling
Perform architectural analysis
Perform logical security assessment
Monitor third party API’s, SDK and libraries are up to date.
Generate assessment report
Report your findings as per severity
2
Automation testing
To use automated scanning tools
Review false positives and true positives
Generate assessment report
Report your findings as per severity
Analyze reports from interactive source code review tool for false positives and include it in the report.
3
Analysis and reporting
Create detailed assessment report as per company standard.
Report issues as per severity
Follow up and review the fixes
4
Ad hoc request
Work on Ad hoc request related to application security
Conduct pen. Test, Design reviews as per the request
5
Trainings and knowledge
transfer
Conduct periodic security awareness training as per the requirement bases on global standards.
Working Relationships:
Team leads
Peers
Developers
Product managers
Other security teams
Support and operations team
Infrastructure teams
Knowledge
Skills
Attributes
Understanding of OWASP Top 10,SANS Top 25 and WASC, NIST.
Black Box, Grey Box security assessment of web application, Mobile application.
Experience of identification and mitigation of vulnerabilities
Good knowledge of TCP/IP and other application and network level protocols.
Security in SDLC (Application Security)
Strong team player
Interpersonal Skills
Good communication
Active listening
Believes in team work over individual contributions
Articulation of thoughts
Able to express view assertively
Ownership and accountability
Passion
Integrity
Team work
Security Analyst :
Shift : Middle Shift 12pm to 9pm
Relevant Exp : Minimum 1 year in App Sec
Condition: 2 years Bond