1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...
1 Opening(s)
5.0 Year(s) To 7.0 Year(s)
22.00 LPA TO 30.00 LPA
A day in the life -
· Perform Penetration Testing for networks (internal & external), applications, APIs & cloud assets along with Red & Purple Team assessments
· Vulnerability identification and analysis
· Collaborate with team members and stakeholders to define project scopes, review test results, and determine remediation steps
· Draft reports ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
12.00 LPA TO 14.00 LPA
A day in the life -
· Perform Penetration Testing for networks (internal & external), applications, APIs & cloud assets along with Red & Purple Team assessments
· Vulnerability identification and analysis
· Collaborate with team members and stakeholders to define project scopes, review test results, and determine remediation steps
· Draft reports and ...
4 Opening(s)
1.0 Year(s) To 4.0 Year(s)
8.00 LPA TO 12.00 LPA
Sr. No.
Job Description
Duty Statements
1
Manual Testing
Perform threat modelling
Perform architectural analysis
Perform logical security assessment
Monitor third party API’s, SDK and libraries are up to date.
Generate assessment report
Report your findings as per severity
2
Automation testing
To use automated scanning tools
Review false positives and true positives
Generate assessment report
Report your findings as per severity
Analyze reports from interactive source code review tool for false positives and include it in the report.
3
Analysis and reporting
Create detailed assessment report as per company standard.
Report issues as per severity
Follow up and review the fixes
4
Ad hoc request
Work on Ad hoc request related to application security
Conduct pen. Test, Design reviews as per the request
5
Trainings and knowledge
transfer
Conduct periodic security awareness training as per the requirement bases on global standards.
Working Relationships:
Team leads
Peers
Developers
Product managers
Other security teams
Support and operations team
Infrastructure teams
Knowledge
Skills
Attributes
Understanding of OWASP Top 10,SANS Top 25 and WASC, NIST.
Black Box, Grey Box security assessment of web application, Mobile application.
Experience of identification and mitigation of vulnerabilities
Good knowledge of TCP/IP and other application and network level protocols.
Security in SDLC (Application Security)
Strong team player
Interpersonal Skills
Good communication
Active listening
Believes in team work over individual contributions
Articulation of thoughts
Able to express view assertively
Ownership and accountability
Passion
Integrity
Team work
Security Analyst :
Shift : Middle Shift 12pm to 9pm
Relevant Exp : Minimum 1 year in App Sec
Condition: 2 years Bond
1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
5.00 LPA TO 8.00 LPA
Job Description
CEH or equivalent Certification and Proven work experience as a CEH
In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.
Identifying and recording security flaws and breaches.
Knowledge and understanding of SIEM tools.
Manage the incident and related documents like an incident report, incident plan, etc.
Prepare the ...
1 Opening(s)
7.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 15.00 LPA
Profile Summary:
with 7+ years of experience working in information security.
Post-Graduate /Diploma/Degree in IT
Wide experience in OT/IoT security risk assessment and continuous monitoring, audit
Assessment of OT Security frameworks and standards, configuration and management of firewalls, network and infrastructure security.
Certifications )( any of the below preferred):
PG-DITISS, CEH, RHCE, RHCSA
Knowledge Expertise and Prior ...