59 Penetrationtesting jobs in India
Pentester - Vulnerability Assessment & Penetration Testing (VAPT)
Posted today
Job Viewed
Job Description
We are hiring a hands-on Penetration Tester to lead and execute end-to-end security assessments across Web, Infrastructure, and Cloud environments. As the technical backbone of our lean and growing VAPT practice, you’ll work closely with the Security Lead and directly engage with clients to deliver meaningful, high-impact security outcomes.
Key Responsibilities:
- Perform manual and automated penetration testing across:
- Web Applications (based on OWASP Top 10)
- Infrastructure (external/internal IPs, firewall review, patch audits)
- Cloud Environments (basic Azure/AWS – IAM, Storage, Networking)
- Identify, exploit, and report on vulnerabilities such as SSRF, RCE, IDOR, LFI, and S3 bucket exposures
- Use tools such as Burp Suite , Nmap , SQLMap , Nikto , Nessus/OpenVAS
- Write high-quality, detailed technical reports with:
- Screenshots for PoCs
- Remediation guidance
- Risk severity scoring (preferably CVSSv3 )
- Collaborate with clients to explain findings and provide actionable recommendations
- Contribute to toolchain improvements and lightweight automation (Python/Bash preferred)
Requirements
- 3–6+ years of hands-on experience in at least 2 of the following areas :
- Web Application Penetration Testing (OWASP Top 10)
- Infrastructure VAPT (internal/external, firewall, patch validation)
- Basic Cloud VAPT (AWS or Azure: IAM, Storage, Networking)
- Proficiency in:
- Manual testing techniques , fuzzing, and exploitation
- Burp Suite (Community or Pro)
- Tools like Nmap, SQLMap, Nikto, Nessus/OpenVAS
- Strong understanding of common vulnerabilities and exploitation techniques
Preferred Certifications
- CEH , eJPT , OSCP (or strong portfolio/proof of hands-on skill)
- AZ-500 or AWS Security Specialty (for cloud security exposure)
Good to Have
- Familiarity with scripting for automation (Python, Bash)
- Exposure to CVSSv3 for vulnerability scoring
- Experience with Dradis , Excel-based reporting , or similar tools
Senior Consultant - VAPT (Vulnerability Assessment & Penetration Testing)
Posted today
Job Viewed
Job Description
Apt Resources is hiring for our client, a leading cybersecurity services firm, seeking an experienced Senior Consultant – VAPT to join their expert team. The ideal candidate will have deep expertise in infrastructure and application security assessments, penetration testing, and a solid understanding of modern security threats and countermeasures.
Key Responsibilities: Infrastructure VA/PT:- Conduct black-box and grey-box vulnerability assessments and penetration tests on system/network/cloud environments.
- Map network infrastructure, discover ports/services, and audit OS, network, and security configurations.
- Use tools like NMap, Nessus, Metasploit, Kali Linux for exploiting vulnerabilities.
- Stay current with CVEs and threat intelligence relevant to supported technologies.
- Prepare and present detailed findings and mitigation plans to clients.
- Deliver cloud infrastructure security assessments and configuration audits.
- Create and deliver comprehensive, client-specific technical reports.
- Perform vulnerability assessments of Web, Mobile, and Thick-client applications based on OWASP standards.
- Combine automated scanning with manual testing techniques to detect flaws.
- Conduct phishing and spear-phishing simulations to assess end-user security awareness.
Requirements
Qualifications:- Bachelor's degree in Computer Science, IT, or a related field.
- 8–10 years of hands-on experience in VAPT.
- CEH certification is required.
- OSCP or CREST certifications are a plus.
- Experience working in an MSSP (Managed Security Services Provider) environment is preferred.
- Strong understanding of Windows, Unix/Linux systems, firewalls, VPNs, and security infrastructure.
- Expertise in tools like NMap, Metasploit, Kali Linux, Nessus, NetCat, HPing, Qualys, and RetinaCS.
- Strong understanding of CVE databases, exploit development, and countermeasures.
- Familiarity with scripting languages such as C++, C#, Perl, HTML, Shell, etc.
- Knowledge of firewalls, IPS, DNS security, VLAN, web filtering, and VPNs.
- Experience with cloud security assessment across major platforms (AWS, Azure, GCP).
- Strong communication, presentation, and documentation skills.
- Ability to work independently and lead security assessments across client environments.
- Willingness to travel overseas for project deployments.
- Exposure to RFP response preparation, solution architecture, and client-facing presentations.
Benefits
Salary: Up to INR 18 LPA
Vulnerability Assessment Penetration Testing 4 to 6
Posted today
Job Viewed
Job Description
- To carry out secure code reviews and to find out critical security flaws in the code
- Conduct penetration test and launch exploits using Burpsuite, Nessus, Metaspoilt, Backtrack penetration testing distribution tools sets
- Analyze scan reports and suggest remediation / mitigation plan
- Providing rich client specific reports
- Demonstration of proof of concepts for exploits, manual penetration testing
- Knowledge on open source and commercial security assessment tools e.g. Burpsuit, Nessus, Appscan, nmap etc.
- Security configuration review of database /servers / firewalls / switches / routers, etc
- Knowledge of operating systems preferably windows, linux etc. network equipment’s system & network hardening
Primary Skills
- Secondary Skills
- Certified with any technology such as CEH, CISSP, etc
Vulnerability Assessment Penetration Testing 4 to 6
Posted today
Job Viewed
Job Description
- To carry out secure code reviews and to find out critical security flaws in the code
- Conduct penetration test and launch exploits using Burpsuite, Nessus, Metaspoilt, Backtrack penetration testing distribution tools sets
- Analyze scan reports and suggest remediation / mitigation plan
- Providing rich client specific reports
- Demonstration of proof of concepts for exploits, manual penetration testing
- Knowledge on open source and commercial security assessment tools e.g. Burpsuit, Nessus, Appscan, nmap etc.
- Security configuration review of database /servers / firewalls / switches / routers, etc
- Knowledge of operating systems preferably windows, linux etc. network equipment’s system & network hardening
Primary Skills
- Secondary Skills
- Certified with any technology such as CEH, CISSP, etc
Ethical Hacking
Posted today
Job Viewed
Job Description
• Experience with web application vulnerability scanning tools (e.g., IBM AppScan, HP Web Inspect, Acunetix, NTO Spider, Burpsuite Pro, etc.)
• Experience with vulnerability assessment tools and penetration testing techniques (e.g., web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI, etc.)
• Experience of penetration testing on mobile platforms such as iOS, Android, Windows, and RIM.
• Solid programming/debugging skills with proficiency in one or more of the following: Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C.
• Expert-level experience and very details technical Knowledge in at least 3 of the following areas: general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; standard communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web services
• Demonstrated ability to learn and apply critical thinking to a variety of situations
• Mobile programming abilities such as Xcode, Objective-C
• One or more of the following certifications: CISSO, GWAPT, CEH, OSCP (or qualified work experience)
• Strong scripting skills (e.g., Python, Perl, Shell script, JavaScript
• Experience as a developer
• Knowledge of a Structured Query Language
Ethical Hacking developer
Posted today
Job Viewed
Job Description
• Experience with web application vulnerability scanning tools (e.g., IBM AppScan, HP Web Inspect, Acunetix, NTO Spider, Burpsuite Pro, etc.)
• Experience with vulnerability assessment tools and penetration testing techniques (e.g., web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI, etc.)
• Experience of penetration testing on mobile platforms such as iOS, Android, Windows, and RIM.
• Solid programming/debugging skills with proficiency in one or more of the following: Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C.
• Expert-level experience and very details technical Knowledge in at least 3 of the following areas: general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; standard communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web services
• Demonstrated ability to learn and apply critical thinking to a variety of situations
• Mobile programming abilities such as Xcode, Objective-C
• One or more of the following certifications: CISSO, GWAPT, CEH, OSCP (or qualified work experience)
• Strong scripting skills (e.g., Python, Perl, Shell script, JavaScript
• Experience as a developer
• Knowledge of a Structured Query Language
Ethical Hacking Analyst
Posted today
Job Viewed
Job Description
• Experience with web application vulnerability scanning tools (e.g., IBM AppScan, HP Web Inspect, Acunetix, NTO Spider, Burpsuite Pro, etc.)
• Experience with vulnerability assessment tools and penetration testing techniques (e.g., web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI, etc.)
• Experience of penetration testing on mobile platforms such as iOS, Android, Windows, and RIM.
• Solid programming/debugging skills with proficiency in one or more of the following: Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C.
• Expert-level experience and very details technical Knowledge in at least 3 of the following areas: general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; standard communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web services
• Demonstrated ability to learn and apply critical thinking to a variety of situations
• Mobile programming abilities such as Xcode, Objective-C
• One or more of the following certifications: CISSO, GWAPT, CEH, OSCP (or qualified work experience)
• Strong scripting skills (e.g., Python, Perl, Shell script, JavaScript
• Experience as a developer
• Knowledge of a Structured Query Language
Be The First To Know
About the latest Penetrationtesting Jobs in India !
Ethical Hacking Trainer
Posted today
Job Viewed
Job Description
- Trainer**
**The Job Overview**
We are hiring a full-time Certified Ethical Hacker trainer to conduct pieces of training on CyberSecurity, Ethical Hacking, and Forensics investigation.
IT Trainer's responsibilities include identifying the current educational needs and delivering the training as per IT, ITeS industry requirements.
**Job Location: Pune**
**Responsibilities**
- Conducting IT skills gap analyses among employees
- Designing technical manuals using simple language
- Performing role-specific training.
- Evaluate the effectiveness of each educational session
- Maintain updated records of training curriculum and materials
**Requirements and skills**
- Proven work experience as an IT Trainer, Technical Trainer, or similar role
- Experience designing technical course material
- Familiarity with web-based learning platforms and modern educational techniques
- Good understanding of corporate computer security principles
- Excellent communication skills with the ability to explain technical terms plainly
- Additional global certification in training (e.g. Certified Technical Trainer) is a plus
**Requirements Technical skills**
Below are some of the responsibilities a certified professional, ethical hacker is expected to assume:
- Ethical hacking and penetration testing
- Vulnerability assessment
- Malware analysis
- Work with other penetration testers and information security analysts
- Social engineering
- Database security
- Reverse engineering
- Network security
- Threat modeling and risk assessment
- Job Qualifications and Skill Sets
**Below are the qualifications expected of a certified ethical hacker trainer?**
- Bachelor’s degree in computer science, information technology security, or related field
- Security certifications, including the Certified Information Systems Security
Professional (CISSP) and Certified Ethical Hacker (CEH)
- Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring
- Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking
- Experience with common network infrastructure and security tools
- Knowledge of security testing methodologies in accordance with the EC-Council
- Ability to work in a fast-paced environment
**Amol Bagal**
Contact -
+91-XXX
**Sameer Manekar**
Contact -
**Skills Factory Learning Pvt. Ltd.**
Venkateshwara House, 1st Floor, Office # 3,
Opp. Kalinga Hotel, Near Sharada Centre,
Off Karve Road, Pune (India)
Phone: /
**Job Types**: Full-time, Regular / Permanent
**Salary**: From ₹20,000.00 per month
**Benefits**:
- Cell phone reimbursement
Schedule:
- Day shift
Supplemental Pay:
- Performance bonus
Ability to commute/relocate:
- Pune, Maharashtra: Reliably commute or planning to relocate before starting work (required)
**Education**:
- Bachelor's (preferred)
**Experience**:
- Teaching: 1 year (preferred)
- total work: 1 year (preferred)
**Language**:
- English (preferred)
**Speak with the employer**
+91
+91-XXX
Security Penetration Testing Security Architect
Posted today
Job Viewed
Job Description
- ** Project Role Description**:Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations.
- ** Management Level**:9
- ** Work Experience**:6-8 years
- ** Work location**:Bengaluru
- ** Must Have Skills**:
- ** Good To Have Skills**:
- ** Job Requirements:
**- **
- **
Professional Attributes **:Expect to have good verbal and written communication and a good team player
- **
Educational Qualification **:BE/BTech
15 years of full time education
Security Testing
Posted today
Job Viewed
Job Description
automation testing and manual Testing.
Executing manual and automated test cases. Reporting bugs and errors to development teams.
Responsible for designing test scenarios for software usability
Experience in Identify and Access Mgmt testing
Experience in Security testing ( penetration )
responsible for reviewing and implementing systematic test plans
Primary Location Hyderabad, Andhra Pradesh, India Job Type Experienced Primary Skills Qualys Years of Experience 7 Travel No