2,644 Offensive Security Certified Professional jobs in India
Information Security Professional
Posted 1 day ago
Job Viewed
Job Description
BNP Paribas is a top-ranking
Information Security Professional
Posted 1 day ago
Job Viewed
Job Description
**About BNP Paribas Group**:
- BNP Paribas is a top-ranking
Information Security Professional - Hcpl4128
Posted 1 day ago
Job Viewed
Job Description
Qualification - B.E./BCA/BSC - IT
Application Vulnerability Management and Application Security
Conduct Vulnerability Assessment and Penetration Test as and when required.
Coordinate with respective stakeholders (Internal/External) to carry out VAPT assessment for entire Application (Web and Mobile), API and thick client landscape.
Hands on exp with security and Anti-Virus tools like EDR/XDR, patching, NIST Standards, etc.,
Co-ordination with Internal and External team for the timely closure.
Co-ordination with Internal and External team for the timely closure.
Enhance various information security controls implementation and raising incident to alert the organization.
Ensure timely closure of VAPT observation highlighted during assessment of Application, API and thick clients as per regulatory guidelines.
Ensure the timely closure of SOC tickets with proper closure comment.
Coordinating with Application Team (Internal/external) for implementation of security controls
Review the security controls and its applicability regularly to take corrective action where applicable.
Information security
Posted today
Job Viewed
Job Description
Common accountabilities:
- Works autonomously within defined processes and procedures or methodologies, takes standard decisions and may support the development of solutions to complex problems of a recurring nature.
- Receives instruction, guidance and direction from more senior level roles or manager, with regular monitoring on the status of the assignments.
- May have specialized formal education or the equivalent work experience and has the required technical and functional skills and basic knowledge of the business.
Specific accountabilities:
Test strategy
* Attend to specification/architecture reviews (also on customer specification reviews when applicable), and provide feedback along with any potential impact, risk, issue or missed gap based on experience,
* Define test strategy and test plan containing test cases (functional and non-functional), ensure traceability with specifications and customer requirements,
* Ensure compliance of test strategy with CI/CD guidelines, Green IT guidelines and all quality guidelines (SDL, STDL), QA best practices/standards from the industry (ISTQB.),
Test expertise
* Design test cases and write test case scripts
* Prepare test environment, test data, and execute test cases
* Provide sign-off (go/no-go) on tested features based on defined exit criteria
Test automation
* Assess necessity to automate subset of (or all) test scripts
* Use test automation framework and contribute to its improvement
Defect management
* Open defects for software or documentation, assign relevant level of severity based on the importance of the issue, provide relevant investigation and information in order to fix defects
* Check defect fix, and give go/no-go for the load of production defects
Reporting
* Report and communicate on test activities to the line organization, software developers and product definitions analysts
* Provide visibility on testing campaign/milestones to all stakeholders
Quality assurance ambassador
* Show accountability for the project, product or release quality control
Technicity
* Efficiently use QA tooling stack and frameworks
* Be proactive about any issue/change that is likely to affect QA peers daily job
Continuous and sustainable improvement
* Participate to the understanding, measurement and reduction of the environmental impact of the tested applications and associated QA activities
Information Security
Posted 1 day ago
Job Viewed
Job Description
- **Technical / job functional knowledge**
- Understanding and working knowledge of control frameworks based on industry best practices such as ISO27001, PCI-DSS, GDPR.
- Responsible for conducting timely security assessments of third-party suppliers, recording results accurately and initiating appropriate assurance responses.
- Support the production of high quality, informative and accurate reports in respect of third-party assurance assessments.
- Provide advice and guidance to stakeholders on Information/Cyber Security Minimum Requirements.
- Conduct audits to verify the compliance to organizations security standards
- Assist in the improvement of risk management and Cyber Security controls.
- IT and cybersecurity policies and standards.
- Third Party Risk Frameworks
- Regulatory compliance
- Technology resiliency
- Data protection
Immediate joiner are preferred.
Experience : 1year minimum
Job Location : Mumbai
Contact Name : Swati/Arpita
Contact Number:
+91-XXX
/
Schedule:
- Monday to Friday
Ability to commute/relocate:
- Vashi, Navi Mumbai - , Maharashtra: Reliably commute or planning to relocate before starting work (required)
**Experience**:
- total work: 1 year (preferred)
**Speak with the employer**
+91
+91-XXX
Information Security
Posted 1 day ago
Job Viewed
Job Description
Thoucentric is a niche management consulting firm focused on helping organizations overcome business challenges, maximize growth & overall performance through effective problem solving, efficient people, process and technology solutioning, end to end execution and management.
We have been certified
**Great Place to Work **by AIM
** **and have been ranked as
**"50 Best Firms for Data Scientists to Work For"**
We help clients with Business Consulting, Program & Project Management, Digital Transformation, Product Management, Process & Technology Solutioning and Execution including Analytics & Emerging Tech areas cutting across functional areas such as Supply Chain, Finance & HR, Sales & Distribution.
We are a group of seasoned professionals having diverse industry, solution and product experience thereby making us effective business liaisons.
**We are 400+ consultants strong coming with strong diverse background fueling our growth story in India and across four other global locations viz. US, UK, Singapore and Australia.**
At Thoucentric, we work on various problem statements.
- The most popular ones are
- ** Building capabilities** that address a market need, **basis our ongoing research **effort.**
- ** Solving a specific use case** for a current or potential client **based on challenges on-**ground.**
- ** Developing new systems **that help be a better employer and a better partner to clients.
- All of these need the **best of minds to work on them day-to-day;** and **we do exactly that!**
- Your c**ontribution to organization development is as important** as outward facing consulting.
- ** We are invested in both, employee growth and client success!**
**About the Role**:
- This position is responsible for establishing and maintaining a corporate wide information security management program to ensure that information assets are adequately protected.
- The position is responsible for identifying, evaluating, and reporting on information security risks in a manner that meets compliance and regulatory requirements, and aligns with and supports the risk posture of the enterprise.
- Strategic Support and Management
- Develop, implement, and monitor a strategic, comprehensive enterprise information security and IT risk management program to ensure that the integrity, confidentiality, and availability of information is owned, controlled, or processed by the organization.
- Develop, maintain, and publish up-to-date information security policies, standards, and guidelines. Oversee the approval, training, and dissemination of security policies and practices.
- Create, communicate, and implement a risk-based process for vendor risk management, including the assessment and treatment for risks that may result from partners, consultants, and other service providers.
- Develop and manage information security budgets and monitor them for variances.
- Create and manage information security and risk management awareness training programs for all employees, contractors, and approved system users.
- Create a framework for roles and responsibilities regarding information ownership, classification, accountability and protection
- Provide strategic risk guidance for IT projects, including the evaluation and recommendation of technical controls.
- Liaise with the enterprise architecture team to ensure alignment between the security and enterprise architectures, thus coordinating the strategic planning implicit in these architectures.
- Manage security incidents and events to protect corporate IT assets, including intellectual property, regulated data, and the company's reputation.
- Monitor the external threat environment for emerging threats and advise relevant stakeholders on the appropriate courses of action.
Security Liaison
- Liaise among the information security team and corporate compliance, audit, legal and HR management teams as required.
- Manage security issues and incidents, and participate in problem and change management forums. Ensuring timely reporting and adequate participation in investigation for ICT security incidents
- Work with various stakeholders to identify information asset owners to classify data and systems as part of a control framework implementation.
- Work with the IT and business stakeholders to define metrics and reporting strategies that effectively communicate successes and progress of the security program.
Architecture Support- Research, evaluate, design, test, recommend or plan the implementation of new or updated information security hardware or software, and analyze its impact on the existing environment; provide technical and managerial expertise for the administration of security tools.
- Work with the enterprise architecture team to ensure that there is a convergence of business, technical and security requirements; liaise with IT management to align existing technical installed base and skills with future architectural requirement
**Requirements**:
**Education qual
Information Security
Posted 1 day ago
Job Viewed
Job Description
**Role Description**: Join our team in Mumbai, Noida, NCR as a full-time Information Security Consultant, where you will be immersed in a dynamic on-site role. As an integral part of our organization, you will take charge of critical tasks such as conducting thorough security assessments, auditing information systems, and playing a key role in the formulation and implementation of policies, procedures, and essential solutions. Your responsibilities extend to performing risk assessments, providing insightful recommendations, and actively contributing to the ongoing efforts to mitigate identified risks. This role demands not only a deep understanding of information security practices but also the ability to translate that knowledge into effective strategies that enhance our overall security framework. If you are passionate about information security and possess the skills to drive positive change, we invite you to be part of our team and contribute to the continued success of our organization.
**Responsibilities**:
- Understanding of the ISO 27001 standard, with expertise in both its implementation and auditing processes.
- Knowledgeable in ISMS Policy, Procedure and SOP creation, Review and Update.
- Proficient in conducting thorough risk assessments.
- Familiarity with Business Continuity principles and practices.
- Collaborate effectively with diverse client stakeholders to ensure alignment with Information Security Management policies, procedures, guidelines, and processes.
- Take ownership of creating ISMS-related documents/checklists, conducting audits, and driving ISM activities.
- Showcase industry expertise, displaying a profound understanding of the industry, emerging trends, issues, challenges, key players, and leading practices.
- Maintain a client-centric focus by efficiently addressing client needs and fostering productive relationships with client personnel.
**Qualifications**:
- 2 to 5 years of experience in IT Audit, ITGC, ISO 27001 Consulting, regulatory compliance.
- Assessment experience in RBI, SEBI, IRDAI, NPCI, GRC Compliance.
- Excellent interpersonal and communication skills to work effectively with clients and internal teams.
- Any bachelor’s or master’s degree.
- Certification in information security, such as ISO 27001, CISA is preferred.
Be The First To Know
About the latest Offensive security certified professional Jobs in India !
Senior Information Security Analyst - Information Security
Posted 9 days ago
Job Viewed
Job Description
Location: Bhubaneswar, Odisha, IN
Our client, a leading financial services firm, is seeking a highly competent Senior Information Security Analyst to join their dedicated security operations center in **Bhubaneswar, Odisha**. This is a critical on-site role, vital for maintaining the integrity and security of sensitive data.
The Senior Information Security Analyst will be responsible for identifying, assessing, and mitigating information security risks across the organization's IT infrastructure. The ideal candidate will possess extensive knowledge of cybersecurity principles, threat intelligence, vulnerability management, incident response, and security frameworks.
Key Responsibilities:
- Monitor and analyze security alerts from various security tools (SIEM, IDS/IPS, EDR).
- Investigate security incidents, conduct forensic analysis, and implement containment and eradication strategies.
- Perform vulnerability assessments and penetration testing on systems and applications.
- Develop and implement security policies, standards, and procedures.
- Manage and maintain security infrastructure, including firewalls, intrusion detection systems, and antivirus solutions.
- Conduct risk assessments and develop mitigation plans to address identified vulnerabilities.
- Stay current with emerging threats, vulnerabilities, and security technologies.
- Develop and deliver security awareness training to employees.
- Participate in security audits and ensure compliance with regulatory requirements.
- Collaborate with IT teams to implement security best practices in system design and deployment.
- Develop and refine incident response plans and playbooks.
- Contribute to the continuous improvement of the organization's security posture.
Qualifications:
- Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field.
- Minimum of 6 years of experience in information security, cybersecurity operations, or risk management.
- In-depth knowledge of cybersecurity principles, threats, and attack vectors.
- Hands-on experience with SIEM tools (e.g., Splunk, LogRhythm), IDS/IPS, and endpoint security solutions.
- Experience with vulnerability scanning tools (e.g., Nessus, Qualys) and penetration testing methodologies.
- Familiarity with security frameworks (e.g., NIST, ISO 27001) and compliance requirements.
- Strong analytical and problem-solving skills with meticulous attention to detail.
- Excellent communication and interpersonal skills, with the ability to work effectively in a team.
- Relevant certifications such as CISSP, CISM, CEH, or GSEC are highly desirable.
- Ability to work under pressure and respond effectively to security incidents.
This is a critical role in protecting our client's digital assets in **Bhubaneswar**. If you are a dedicated security professional committed to safeguarding information, we encourage you to apply.
Associate Professional Information Security
Posted 1 day ago
Job Viewed
Job Description
- Understands a broad spectrum of Identity & Access Management technology to provide part or all detailed technical design which meets customer requirements.
- Develop maintainable, scalable, and secure source code that meets business requirements and team standards.
- Experience in configuring SailPoint IdentityIQ including tasks, workflows, provisioning workflows, certifications, and policies.
- Expertise in design and implementation of SailPoint role management, entitlements, RBAC, and birthright.
- Expert in onboarding Applications on SailPoint IIQ including experience with deployment of Application connectors of type Webservices, Mainframe, SAP, JDBC.
- Extensive experience in troubleshooting and debugging issues on SailPoint IIQ with deep knowledge of the Log4J framework.
- Contributes actively in a collaborative environment ensuring the overall success of projects.
- Solve complex technical issues and problems.
- Provides production support and participates in on-call rotation.
- Works within the project team to support iterative development and maintenance support that delivers a high-quality product.
- Supports product owner interactions with customers and development teams to define requirements.
- Contributes to the production of support documentation.
- Performs troubleshooting on defects or discrepancies in requirements identified and resolved with appropriate partners.
- Identify and implements appropriate continuous improvement opportunities.
- Plans work out appropriately, effectively communicates, and responds to escalations/inquiries.
- Supports IT Help Desk issue resolution for related systems and processes
- Conducts unit test case development
- Conducts impact analysis
- Performs functional/system integration testing support.
- Support Build and Deployment activities.
- Able to communicate and present complex issues with assurance and confidence. Demonstrates the use of consulting skills including questioning, listening, ideas development, permission, and rapport, and influencing.
Able to discuss (within own area of expertise) requirements with a customer, and to challenge and clarify when appropriate. From the requirements, able to develop a high-level design or plan, and then estimate the amount of effort required to deliver. Able to advise the engagement owner about the risks associated with this work package
Professional 2 Information Security
Posted 1 day ago
Job Viewed
Job Description
- Responsible for implementing part or all the technical solution to the client, in accordance with an agreed technical design. Occasionally responsible for providing a detailed technical design for enterprise solutions.
- Understands a broad spectrum of Privileged Access Management technology to provide part or all detailed technical design which meets customer requirements.
- Develop maintainable, scalable, and secure source code that meets business requirements and team standards.
- Able to communicate and present complex issues with assurance and confidence. Demonstrates the use of consulting skills including questioning, listening, ideas development, permission, and rapport, and influencing.
- Able to discuss (within own area of expertise) requirements with a customer, and to challenge and clarify when appropriate. From the requirements, able to develop a high-level design or plan, and then estimate the amount of effort required to deliver. Able to advise the engagement owner about the risks associated with this work package.
- Experience in configuring and supporting various PAM tools primiarily HashiCorp/CyberArk/Beyondtrust administration and management activities with custom defined compliance platform management solutions.
- Expertise in design and implementation of PAM solution.
- Is required to work as an expert and main point of contact for the