55 Security Assessments jobs in India
Vulnerability Assessment & Penetration Testing Lead
Posted today
Job Viewed
Job Description
Your potential, unleashed.
India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond.
At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters.
The team
Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks
Your work profile.
As an Assistant Manager in our Cyber Team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: -
Key Responsibilities:
- Total 3+years of experience in Cyber security
- VAPT- Web Application Security Pentesting, Mobile Application Testing, Infra Testing, Source Code Review, Cloud Configuration Review
- Certification - OSCP, CRTP, CEH, EJPT
- Understanding of basic business and information technology management processes.
- Good knowledge of TCP/ IP and Networks including Firewall, IDS/IPS, Routers, Switches, and network architecture.
- Experience of Web Application Security Testing, Infrastructure VAPT, API testing.
- Experience on Mobile Security Pen-Testing (iOS and Android).
- Experience in conducting config reviews of Windows, Linux, UNIX, Solaris, Databases, etc.
- Experience with Vulnerability Management tools: Kali Linux, Acunetix, AppScan, Nexpose, Qualys Guard, Nessus, Nmap, Metasploit, Fortify etc.
- Experience in basic scripting such as: Shell, Python, PERL, etc.
- Basic knowledge of Technologies such as: IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Sun NetManage, Cisco Works, Radius, Big Brother, F5
Desired qualifications / Education :
· B.Tech /BE /BCA / B.Sc /M.Tech - Full time
· Candidates must possess security certification of CEH, LPT, OSCP.
· Good to have security certification for GPEN, CREST
Your role as Leader
We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society.
In addition to living our purpose, Senior Executive across our organization must strive to be:
- Inspiring - Leading with integrity to build inclusion and motivation
- Committed to creating purpose - Creating a sense of vision and purpose
- Agile - Achieving high-quality results through collaboration and Team unity
- Skilled at building diverse capability - Developing diverse capabilities for the future
- Persuasive / Influencing - Persuading and influencing stakeholders
- Collaborating - Partnering to build new solutions
- Delivering value - Showing commercial acumen
- Committed to expanding business - Leveraging new business opportunities
- Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization
- Effective communication – Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities
- Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s).
- Managing change - Responding to changing environment with resilience
- Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision
- Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems
- Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte
- Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviors and attitudes to become more inclusive.
How you’ll grow
Connect for impact
Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report.
Empower to lead
You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership.
Inclusion for all
At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters.
Drive your career
At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte.
Everyone’s welcome… entrust your happiness to us
Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you.
Interview tips
We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals.
*Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices.
At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution.
In this regard, you may refer to a more detailed advisory given on our website at:
Vulnerability Assessment & Penetration Testing Specialist
Posted today
Job Viewed
Job Description
Department: Cybersecurity / Information Security
Location: Bangalore (On-site)
Employment Type: Full-time
Interested candidates can apply using the form below.
We’re hiring experienced professionals to join our Cybersecurity team in two key positions:
- VAPT Engineer (L2/L3) – leading advanced vulnerability assessment and penetration testing across enterprise and cloud environments.
- Information Security Lead – Managed Security Services – managing SOC operations, cloud security governance, risk management, and incident response.
Both roles demand strong technical depth, leadership maturity, and hands-on expertise in enterprise and cloud security ecosystems.
Experience: 5+ years (hands-on)
Reporting To: VAPT Lead
Certification: OSCP preferred
Mode: In-office
Key Responsibilities
- Lead penetration testing across web, mobile, cloud, and infrastructure (Black/Grey/White box).
- Perform manual and automated vulnerability assessments using tools like Burp Suite, Nessus, Metasploit, Nmap, and custom scripts.
- Conduct threat modeling, cloud environment reviews, and risk assessments for business-critical systems.
- Execute security testing on public, private, and hybrid cloud platforms (AWS, Azure, GCP).
- Document findings and provide actionable remediation recommendations.
- Collaborate with DevOps, IT, and Cloud Engineering teams to address vulnerabilities.
- Mentor junior engineers and review reports for accuracy.
- Stay updated with emerging threats, zero-days, and modern attack vectors.
- Align testing with OWASP, NIST, ISO 27001, and cloud security best practices.
- Participate in red team assessments and security audits.
Requirements
- Bachelor’s or Master’s in Computer Science, Cybersecurity, or related field.
- Deep understanding of network protocols, OS internals (Linux/Windows), and cloud architectures.
- Strong knowledge of cloud-native security tools (AWS Security Hub, Azure Defender, etc.).
- Hands-on scripting in Python, Bash, or PowerShell.
- Familiarity with DevSecOps, CI/CD pipelines, and container security (Docker/Kubernetes).
- Experience in secure coding, exploit development, and reverse engineering.
- Certifications like OSCP, CEH, GPEN, LPT, or CISSP are highly preferred.
Experience: 8–10+ years (with 5+ in SOC Leadership)
Certification: OSCP required
Mode: In-office
Key Responsibilities
- Lead SOC operations across L1–L3 analysts, ensuring 24/7 threat monitoring.
- Drive vulnerability management, patch governance, and proactive threat mitigation.
- Manage and secure multi-cloud environments, ensuring compliance and incident readiness.
- Oversee cloud security posture management (CSPM) and identity access governance (IAM).
- Lead incident response, RCA, and recovery for major on-prem and cloud-based incidents.
- Conduct enterprise-wide risk assessments, audits, and compliance checks.
- Ensure alignment with frameworks like NIST, GDPR, HIPAA, PCI-DSS, and ISO 27001.
- Define and implement security policies, playbooks, and automation workflows for cloud and on-prem systems.
- Present dashboards, risk reports, and threat trends to executive leadership.
- Manage relationships with technology partners, MSSPs, and cloud vendors.
Requirements
- 10+ years in Information Security, with at least 5 in SOC or Managed Security leadership.
- Deep understanding of cloud architectures, workload protection, and identity management.
- Hands-on experience with SIEM/SOAR tools (Splunk, ArcSight, Cortex XSIAM, QRadar, Microsoft Sentinel).
- Expertise in threat hunting, malware analysis, endpoint security (EDR/XDR), and cloud security monitoring.
- Proficiency in tools such as WAF, DLP, Burp Suite, and Nessus.
- Strong understanding of hybrid security models and advanced persistent threat (APT) response.
- Familiarity with ITIL or service delivery frameworks is a plus.
- Certifications such as CEH, OSCP, CISSP, or relevant cloud security credentials (CCSP, AWS Security Specialty) preferred.
Interested candidates can apply using the form below.
Please select the role you’re applying for and share your details accurately.
Or Send your resume to
Senior Vulnerability Assessment and Penetration Testing
Posted 1 day ago
Job Viewed
Job Description
Responsibilities
- Client Engagement & Leadership
- Act as a trusted security advisor for multiple high-value clients.
- Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
- Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
- Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
- Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
- Advanced Threat Modelling & Risk Assessment
- Design and maintain threat models tailored to client applications, networks, and cloud environments.
- Perform risk assessments focusing on business impact and likelihood of exploitation.
- Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
- Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
- Penetration Testing & Red Team Operations
- Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
- Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
- Design and develop custom exploits and testing tools to replicate specific attacker techniques.
- Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
- Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
- Comprehensive Reporting & Documentation
- Produce clear and technically thorough vulnerability assessment and penetration testing reports.
- Create executive-level summaries focused on business impact and compliance risks.
- Maintain structured and up-to-date testing methodologies and playbooks.
- Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
- Technical & Programming Expertise
- Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
- Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
- Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
- Capable of custom tool development and advanced exploit research to target unique client environments.
- Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
- In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
- Social Engineering & OSINT Expertise
- Design and execute social engineering and phishing simulations tailored to client environments.
- Perform physical security assessments through tactics like tailgating and badge cloning.
- Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
- Provide training and awareness recommendations based on assessment outcomes.
- Professional Attributes & Mindset
- Strong analytical, problem-solving, and creative thinking skills.
- Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
- Methodical and detail-oriented approach to testing with the ability to think like an attacker.
- Strong communication and presentation skills, able to engage both technical teams and business leadership.
- Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.
Qualifications
- 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
- Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
- Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
- Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
- In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
- Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
- Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
- Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
- Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
- Excellent communication and stakeholder management skills, able to lead client-facing engagements.
- Relevant certifications are a strong plus (e.g., OSCP, CREST, CISSP, CEH, GIAC GPEN).
Preferred Qualifications:
- Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
- Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
- Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
- Prior consulting experience in a service delivery or customer-facing environment.
- Experience with threat intelligence platforms and indicators of compromise (IoCs).
Senior Vulnerability Assessment and Penetration Testing
Posted today
Job Viewed
Job Description
- Client Engagement & Leadership
- Act as a trusted security advisor for multiple high-value clients.
- Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
- Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
- Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
- Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
- Advanced Threat Modelling & Risk Assessment
- Design and maintain threat models tailored to client applications, networks, and cloud environments.
- Perform risk assessments focusing on business impact and likelihood of exploitation.
- Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
- Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
- Penetration Testing & Red Team Operations
- Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
- Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
- Design and develop custom exploits and testing tools to replicate specific attacker techniques.
- Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
- Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
- Comprehensive Reporting & Documentation
- Produce clear and technically thorough vulnerability assessment and penetration testing reports.
- Create executive-level summaries focused on business impact and compliance risks.
- Maintain structured and up-to-date testing methodologies and playbooks.
- Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
- Technical & Programming Expertise
- Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
- Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
- Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
- Capable of custom tool development and advanced exploit research to target unique client environments.
- Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
- In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
- Social Engineering & OSINT Expertise
- Design and execute social engineering and phishing simulations tailored to client environments.
- Perform physical security assessments through tactics like tailgating and badge cloning.
- Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
- Provide training and awareness recommendations based on assessment outcomes.
- Professional Attributes & Mindset
- Strong analytical, problem-solving, and creative thinking skills.
- Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
- Methodical and detail-oriented approach to testing with the ability to think like an attacker.
- Strong communication and presentation skills, able to engage both technical teams and business leadership.
- Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.
Qualifications
- 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
- Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
- Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
- Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
- In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
- Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
- Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
- Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
- Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
- Excellent communication and stakeholder management skills, able to lead client-facing engagements.
- Relevant certifications are a strong plus (e.g., OSCP, CREST, CISSP, CEH, GIAC GPEN).
Preferred Qualifications:
- Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
- Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
- Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
- Prior consulting experience in a service delivery or customer-facing environment.
- Experience with threat intelligence platforms and indicators of compromise (IoCs).
Senior Vulnerability Assessment and Penetration Testing
Posted today
Job Viewed
Job Description
Responsibilities
- Client Engagement & Leadership
- Act as a trusted security advisor for multiple high-value clients.
- Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
- Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
- Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
- Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
- Advanced Threat Modelling & Risk Assessment
- Design and maintain threat models tailored to client applications, networks, and cloud environments.
- Perform risk assessments focusing on business impact and likelihood of exploitation.
- Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
- Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
- Penetration Testing & Red Team Operations
- Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
- Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
- Design and develop custom exploits and testing tools to replicate specific attacker techniques.
- Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
- Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
- Comprehensive Reporting & Documentation
- Produce clear and technically thorough vulnerability assessment and penetration testing reports.
- Create executive-level summaries focused on business impact and compliance risks.
- Maintain structured and up-to-date testing methodologies and playbooks.
- Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
- Technical & Programming Expertise
- Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
- Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
- Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
- Capable of custom tool development and advanced exploit research to target unique client environments.
- Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
- In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
- Social Engineering & OSINT Expertise
- Design and execute social engineering and phishing simulations tailored to client environments.
- Perform physical security assessments through tactics like tailgating and badge cloning.
- Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
- Provide training and awareness recommendations based on assessment outcomes.
- Professional Attributes & Mindset
- Strong analytical, problem-solving, and creative thinking skills.
- Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
- Methodical and detail-oriented approach to testing with the ability to think like an attacker.
- Strong communication and presentation skills, able to engage both technical teams and business leadership.
- Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.
Qualifications
- 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
- Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
- Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
- Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
- In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
- Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
- Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
- Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
- Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
- Excellent communication and stakeholder management skills, able to lead client-facing engagements.
- Relevant certifications are a strong plus (e.g., OSCP, CREST, CISSP, CEH, GIAC GPEN).
Preferred Qualifications:
- Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
- Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
- Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
- Prior consulting experience in a service delivery or customer-facing environment.
- Experience with threat intelligence platforms and indicators of compromise (IoCs).
Senior Vulnerability Assessment and Penetration Testing
Posted today
Job Viewed
Job Description
Responsibilities
- Client Engagement & Leadership
- Act as a trusted security advisor for multiple high-value clients.
- Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
- Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
- Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
- Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
- Advanced Threat Modelling & Risk Assessment
- Design and maintain threat models tailored to client applications, networks, and cloud environments.
- Perform risk assessments focusing on business impact and likelihood of exploitation.
- Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
- Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
- Penetration Testing & Red Team Operations
- Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
- Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
- Design and develop custom exploits and testing tools to replicate specific attacker techniques.
- Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
- Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
- Comprehensive Reporting & Documentation
- Produce clear and technically thorough vulnerability assessment and penetration testing reports.
- Create executive-level summaries focused on business impact and compliance risks.
- Maintain structured and up-to-date testing methodologies and playbooks.
- Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
- Technical & Programming Expertise
- Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
- Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
- Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
- Capable of custom tool development and advanced exploit research to target unique client environments.
- Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
- In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
- Social Engineering & OSINT Expertise
- Design and execute social engineering and phishing simulations tailored to client environments.
- Perform physical security assessments through tactics like tailgating and badge cloning.
- Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
- Provide training and awareness recommendations based on assessment outcomes.
- Professional Attributes & Mindset
- Strong analytical, problem-solving, and creative thinking skills.
- Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
- Methodical and detail-oriented approach to testing with the ability to think like an attacker.
- Strong communication and presentation skills, able to engage both technical teams and business leadership.
- Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.
Qualifications
- 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
- Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
- Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
- Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
- In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
- Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
- Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
- Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
- Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
- Excellent communication and stakeholder management skills, able to lead client-facing engagements.
- Relevant certifications are a strong plus (e.g., OSCP, CREST, CISSP, CEH, GIAC GPEN).
Preferred Qualifications:
- Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
- Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
- Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
- Prior consulting experience in a service delivery or customer-facing environment.
- Experience with threat intelligence platforms and indicators of compromise (IoCs).
Senior Vulnerability Assessment and Penetration Testing
Posted 2 days ago
Job Viewed
Job Description
Responsibilities
- Client Engagement & Leadership
- Act as a trusted security advisor for multiple high-value clients.
- Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
- Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
- Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
- Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
- Advanced Threat Modelling & Risk Assessment
- Design and maintain threat models tailored to client applications, networks, and cloud environments.
- Perform risk assessments focusing on business impact and likelihood of exploitation.
- Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
- Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
- Penetration Testing & Red Team Operations
- Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
- Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
- Design and develop custom exploits and testing tools to replicate specific attacker techniques.
- Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
- Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
- Comprehensive Reporting & Documentation
- Produce clear and technically thorough vulnerability assessment and penetration testing reports.
- Create executive-level summaries focused on business impact and compliance risks.
- Maintain structured and up-to-date testing methodologies and playbooks.
- Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
- Technical & Programming Expertise
- Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
- Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
- Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
- Capable of custom tool development and advanced exploit research to target unique client environments.
- Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
- In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
- Social Engineering & OSINT Expertise
- Design and execute social engineering and phishing simulations tailored to client environments.
- Perform physical security assessments through tactics like tailgating and badge cloning.
- Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
- Provide training and awareness recommendations based on assessment outcomes.
- Professional Attributes & Mindset
- Strong analytical, problem-solving, and creative thinking skills.
- Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
- Methodical and detail-oriented approach to testing with the ability to think like an attacker.
- Strong communication and presentation skills, able to engage both technical teams and business leadership.
- Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.
Qualifications
- 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
- Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
- Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
- Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
- In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
- Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
- Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
- Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
- Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
- Excellent communication and stakeholder management skills, able to lead client-facing engagements.
- Relevant certifications are a strong plus (e.g., OSCP, CREST, CISSP, CEH, GIAC GPEN).
Preferred Qualifications:
- Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
- Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
- Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
- Prior consulting experience in a service delivery or customer-facing environment.
- Experience with threat intelligence platforms and indicators of compromise (IoCs).
Be The First To Know
About the latest Security assessments Jobs in India !
Vulnerability Assessment & Penetration Testing (VAPT) Analyst
Posted today
Job Viewed
Job Description
Greetings from TCS!
We are currently planning to do a Walk-In Interview on 11-Oct-2025 (Saturday) at Chennai/Bangalore/Hyderabad.
Role **: VAPT Senior Analyst
Desired Skill Set :VAPT (Tenable, Defender, Sentinel One), Service Now VR, Bug Crowd
Experience Range : 4+ years
Joining Location : PAN India
Date - 11-Oct-2025 (Saturday)
In-Person Drive Location details.
- Hyderabad KP Venue - TCS Synergy Park, Premises No 2-56/1/36, Gachibowli, Opposite IIIT Hyderabad Campus, Seri Lingampally, RR District, Hyderabad, Telangana
- Chennai SNR Venue - Tata Consultancy Services Ltd, Sholinganallur Office Kumaran Nagar, 415/21-24, TNHB Main Rd, Chennai – .
- Bangalore PSN Venue : No:1, Crescent 3 Prestige Shantiniketan, Sadaramanagala South Taluk, Bengaluru, 3,, Thigalarapalya,, 3, ITPL Main Road, Maruthi Nagar, Krishnarajapuram, Bengaluru, Karnataka
Must-Have: VAPT (Nessus, Tenable, Defender, Sentinel One), Service Now VR, Bug Crowd
Good-to-Have: Burp Suite, Service Now VR, Vulnerability Management other vendor tools
Responsibility of / Expectations from the Role :
- Expertise and experience of conducting VAPT (Vulnerability Assessment and Penetration Testing) as per standards such as OWASP Top 10, SANS Top 25 and WASC, NIST, CISA
- Experience in Web Application Security Testing, Network security testing, Source code Review and Vulnerability Assessment and Penetration testing (SAST and DAST)
- Strong Experience of using open- source tools and commercials tools such as but not limited to Burp Suite, Metasploit, Nessus, Acunetix and open source with operating systems Windows and Linux.
- Perform research on new vulnerabilities, attack vectors, exploits, tools and industry trends for the above- mentioned services.
- CEH Certification Mandatory.
- Candidates with CISM, OSCP are preferred.
- Strong presentation and analytic skills, critical thinking and problem-solving skills are mandatory
Senior Vulnerability Assessment And Penetration Testing
Posted today
Job Viewed
Job Description
Responsibilities
- Client Engagement & Leadership
- Act as a trusted security advisor for multiple high-value clients.
- Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
- Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
- Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
- Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
- Advanced Threat Modelling & Risk Assessment
- Design and maintain threat models tailored to client applications, networks, and cloud environments.
- Perform risk assessments focusing on business impact and likelihood of exploitation.
- Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
- Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
- Penetration Testing & Red Team Operations
- Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
- Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
- Design and develop custom exploits and testing tools to replicate specific attacker techniques.
- Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
- Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
- Comprehensive Reporting & Documentation
- Produce clear and technically thorough vulnerability assessment and penetration testing reports.
- Create executive-level summaries focused on business impact and compliance risks.
- Maintain structured and up-to-date testing methodologies and playbooks.
- Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
- Technical & Programming Expertise
- Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
- Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
- Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
- Capable of custom tool development and advanced exploit research to target unique client environments.
- Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
- In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
- Social Engineering & OSINT Expertise
- Design and execute social engineering and phishing simulations tailored to client environments.
- Perform physical security assessments through tactics like tailgating and badge cloning.
- Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
- Provide training and awareness recommendations based on assessment outcomes.
- Professional Attributes & Mindset
- Strong analytical, problem-solving, and creative thinking skills.
- Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
- Methodical and detail-oriented approach to testing with the ability to think like an attacker.
- Strong communication and presentation skills, able to engage both technical teams and business leadership.
- Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.
Qualifications
- 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
- Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
- Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
- Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
- In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
- Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
- Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
- Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
- Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
- Excellent communication and stakeholder management skills, able to lead client-facing engagements.
- Relevant certifications are a strong plus (e.G., OSCP, CREST, CISSP, CEH, GIAC GPEN).
Preferred Qualifications:
- Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
- Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
- Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
- Prior consulting experience in a service delivery or customer-facing environment.
- Experience with threat intelligence platforms and indicators of compromise (IoCs).
Vulnerability Assessment and Penetration Testing Manager
Posted today
Job Viewed
Job Description
Job Title: Senior Manager – VAPT (OSCP Certified)
Location: Any Metro City in India (Hybrid) – Mumbai / Bangalore / Delhi / Chennai / Hyderabad
Travel Requirement: Frequent travel to Japan (as per project requirement)
Experience: 7+ years
Certification: Mandatory – OSCP
About the Role:
We are seeking a highly skilled and experienced Senior Manager – Vulnerability Assessment and Penetration Testing (VAPT) professional to lead and deliver advanced security assessments for our clients. The ideal candidate will possess deep technical expertise in offensive security, team leadership experience, and a strong understanding of global cybersecurity frameworks. The role requires collaboration with international teams and client stakeholders, with periodic travel to Japan.
Key Responsibilities:
- Lead and execute comprehensive Vulnerability Assessment and Penetration Testing (VAPT) engagements across web, mobile, network, cloud, and infrastructure environments.
- Manage and mentor a team of security consultants to ensure high-quality project delivery.
- Develop customized testing methodologies aligned with client environments and industry standards (OWASP, PTES, NIST, ISO 27001).
- Prepare and present detailed technical reports, risk assessments, and remediation strategies to both technical and business audiences.
- Coordinate with Japanese and Indian client stakeholders, ensuring smooth communication, delivery, and compliance with project timelines.
- Stay updated with emerging threat vectors, exploits, and mitigation techniques.
- Drive automation and process improvements in security testing and reporting.
Required Skills and Qualifications:
- Minimum 7 years of hands-on experience in VAPT, Red Teaming, and Offensive Security.
- Mandatory certification: OSCP (Offensive Security Certified Professional) .
- Strong knowledge of exploit development, threat modeling, and post-exploitation techniques.
- Proficiency in tools such as Burp Suite, Metasploit, Nmap, Nessus, Qualys, Wireshark, and other manual testing tools.
- Solid understanding of secure coding practices and common vulnerabilities (OWASP Top 10, SANS 25).
- Experience working with cloud platforms (AWS, Azure, GCP) and modern DevSecOps environments.
- Excellent communication and presentation skills for client interactions and reporting.
- Ability to work independently in hybrid and multicultural environments.
- Prior experience engaging with Japanese clients or willingness to travel and adapt to cross-cultural settings.
Preferred Qualifications:
- Additional certifications such as OSCE, CRTP, CEH (Practical), CREST, GPEN, or GWAPT .
- Exposure to IoT/OT security, API testing , or threat hunting .
- Experience in managing offshore and onsite delivery teams.