55 Security Assessments jobs in India

Vulnerability Assessment & Penetration Testing Lead

Bengaluru, Karnataka Deloitte

Posted today

Job Viewed

Tap Again To Close

Job Description

Your potential, unleashed.

India’s impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realize your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond.

At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters.

The team

Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks

Your work profile.

As an Assistant Manager in our Cyber Team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations: -

Key Responsibilities:

  • Total 3+years of experience in Cyber security
  • VAPT- Web Application Security Pentesting, Mobile Application Testing, Infra Testing, Source Code Review, Cloud Configuration Review
  • Certification - OSCP, CRTP, CEH, EJPT
  • Understanding of basic business and information technology management processes.
  • Good knowledge of TCP/ IP and Networks including Firewall, IDS/IPS, Routers, Switches, and network architecture.
  • Experience of Web Application Security Testing, Infrastructure VAPT, API testing.
  • Experience on Mobile Security Pen-Testing (iOS and Android).
  • Experience in conducting config reviews of Windows, Linux, UNIX, Solaris, Databases, etc.
  • Experience with Vulnerability Management tools: Kali Linux, Acunetix, AppScan, Nexpose, Qualys Guard, Nessus, Nmap, Metasploit, Fortify etc.
  • Experience in basic scripting such as: Shell, Python, PERL, etc.
  • Basic knowledge of Technologies such as: IPSEC, SSL, SSH, VPN, Ethernet Token Ring, WAP, SMTP, FTP, Frame Relay, WAN, ATM, FDDI, DSL, ISDN, HP Openview, Sun NetManage, Cisco Works, Radius, Big Brother, F5

Desired qualifications / Education :

· B.Tech /BE /BCA / B.Sc /M.Tech - Full time

· Candidates must possess security certification of CEH, LPT, OSCP.

· Good to have security certification for GPEN, CREST

Your role as Leader

We expect our people to embrace and live our purpose by challenging themselves to identify issues that are most important for our clients, our people, and for society.

In addition to living our purpose, Senior Executive across our organization must strive to be:

  • Inspiring - Leading with integrity to build inclusion and motivation
  • Committed to creating purpose - Creating a sense of vision and purpose
  • Agile - Achieving high-quality results through collaboration and Team unity
  • Skilled at building diverse capability - Developing diverse capabilities for the future
  • Persuasive / Influencing - Persuading and influencing stakeholders
  • Collaborating - Partnering to build new solutions
  • Delivering value - Showing commercial acumen
  • Committed to expanding business - Leveraging new business opportunities
  • Analytical Acumen - Leveraging data to recommend impactful approach and solutions through the power of analysis and visualization
  • Effective communication – Must be well abled to have well-structured and well-articulated conversations to achieve win-win possibilities
  • Engagement Management / Delivery Excellence - Effectively managing engagement(s) to ensure timely and proactive execution as well as course correction for the success of engagement(s).
  • Managing change - Responding to changing environment with resilience
  • Managing Quality & Risk - Delivering high quality results and mitigating risks with utmost integrity and precision
  • Strategic Thinking & Problem Solving - Applying strategic mindset to solve business issues and complex problems
  • Tech Savvy - Leveraging ethical technology practices to deliver high impact for clients and for Deloitte
  • Empathetic leadership and inclusivity - creating a safe and thriving environment where everyone's valued for who they are, use empathy to understand others to adapt our behaviors and attitudes to become more inclusive.

How you’ll grow

Connect for impact

Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report.

Empower to lead

You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership.

Inclusion for all

At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters.

Drive your career

At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte.

Everyone’s welcome… entrust your happiness to us

Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you.

Interview tips

We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals.

*Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices.

At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution.

In this regard, you may refer to a more detailed advisory given on our website at:

This advertiser has chosen not to accept applicants from your region.

Vulnerability Assessment & Penetration Testing Specialist

Bengaluru, Karnataka Terralogic

Posted today

Job Viewed

Tap Again To Close

Job Description

Department: Cybersecurity / Information Security

Location: Bangalore (On-site)

Employment Type: Full-time

Interested candidates can apply using the form below.


About the Roles

We’re hiring experienced professionals to join our Cybersecurity team in two key positions:

  1. VAPT Engineer (L2/L3) – leading advanced vulnerability assessment and penetration testing across enterprise and cloud environments.
  2. Information Security Lead – Managed Security Services – managing SOC operations, cloud security governance, risk management, and incident response.


Both roles demand strong technical depth, leadership maturity, and hands-on expertise in enterprise and cloud security ecosystems.


1. VAPT Engineer (L2/L3)

Experience: 5+ years (hands-on)

Reporting To: VAPT Lead

Certification: OSCP preferred

Mode: In-office

Key Responsibilities

  • Lead penetration testing across web, mobile, cloud, and infrastructure (Black/Grey/White box).
  • Perform manual and automated vulnerability assessments using tools like Burp Suite, Nessus, Metasploit, Nmap, and custom scripts.
  • Conduct threat modeling, cloud environment reviews, and risk assessments for business-critical systems.
  • Execute security testing on public, private, and hybrid cloud platforms (AWS, Azure, GCP).
  • Document findings and provide actionable remediation recommendations.
  • Collaborate with DevOps, IT, and Cloud Engineering teams to address vulnerabilities.
  • Mentor junior engineers and review reports for accuracy.
  • Stay updated with emerging threats, zero-days, and modern attack vectors.
  • Align testing with OWASP, NIST, ISO 27001, and cloud security best practices.
  • Participate in red team assessments and security audits.

Requirements

  • Bachelor’s or Master’s in Computer Science, Cybersecurity, or related field.
  • Deep understanding of network protocols, OS internals (Linux/Windows), and cloud architectures.
  • Strong knowledge of cloud-native security tools (AWS Security Hub, Azure Defender, etc.).
  • Hands-on scripting in Python, Bash, or PowerShell.
  • Familiarity with DevSecOps, CI/CD pipelines, and container security (Docker/Kubernetes).
  • Experience in secure coding, exploit development, and reverse engineering.
  • Certifications like OSCP, CEH, GPEN, LPT, or CISSP are highly preferred.



2. Information Security Lead – Managed Security Services

Experience: 8–10+ years (with 5+ in SOC Leadership)

Certification: OSCP required

Mode: In-office


Key Responsibilities

  • Lead SOC operations across L1–L3 analysts, ensuring 24/7 threat monitoring.
  • Drive vulnerability management, patch governance, and proactive threat mitigation.
  • Manage and secure multi-cloud environments, ensuring compliance and incident readiness.
  • Oversee cloud security posture management (CSPM) and identity access governance (IAM).
  • Lead incident response, RCA, and recovery for major on-prem and cloud-based incidents.
  • Conduct enterprise-wide risk assessments, audits, and compliance checks.
  • Ensure alignment with frameworks like NIST, GDPR, HIPAA, PCI-DSS, and ISO 27001.
  • Define and implement security policies, playbooks, and automation workflows for cloud and on-prem systems.
  • Present dashboards, risk reports, and threat trends to executive leadership.
  • Manage relationships with technology partners, MSSPs, and cloud vendors.

Requirements

  • 10+ years in Information Security, with at least 5 in SOC or Managed Security leadership.
  • Deep understanding of cloud architectures, workload protection, and identity management.
  • Hands-on experience with SIEM/SOAR tools (Splunk, ArcSight, Cortex XSIAM, QRadar, Microsoft Sentinel).
  • Expertise in threat hunting, malware analysis, endpoint security (EDR/XDR), and cloud security monitoring.
  • Proficiency in tools such as WAF, DLP, Burp Suite, and Nessus.
  • Strong understanding of hybrid security models and advanced persistent threat (APT) response.
  • Familiarity with ITIL or service delivery frameworks is a plus.
  • Certifications such as CEH, OSCP, CISSP, or relevant cloud security credentials (CCSP, AWS Security Specialty) preferred.


How to Apply

Interested candidates can apply using the form below.

Please select the role you’re applying for and share your details accurately.

Or Send your resume to

This advertiser has chosen not to accept applicants from your region.

Senior Vulnerability Assessment and Penetration Testing

Kochi, Kerala Art Technology and Software

Posted 1 day ago

Job Viewed

Tap Again To Close

Job Description

Responsibilities


  • Client Engagement & Leadership
  • Act as a trusted security advisor for multiple high-value clients.
  • Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
  • Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
  • Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
  • Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
  • Advanced Threat Modelling & Risk Assessment
  • Design and maintain threat models tailored to client applications, networks, and cloud environments.
  • Perform risk assessments focusing on business impact and likelihood of exploitation.
  • Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
  • Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
  • Penetration Testing & Red Team Operations
  • Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
  • Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
  • Design and develop custom exploits and testing tools to replicate specific attacker techniques.
  • Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
  • Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
  • Comprehensive Reporting & Documentation
  • Produce clear and technically thorough vulnerability assessment and penetration testing reports.
  • Create executive-level summaries focused on business impact and compliance risks.
  • Maintain structured and up-to-date testing methodologies and playbooks.
  • Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
  • Technical & Programming Expertise
  • Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
  • Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
  • Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
  • Capable of custom tool development and advanced exploit research to target unique client environments.
  • Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
  • In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
  • Social Engineering & OSINT Expertise
  • Design and execute social engineering and phishing simulations tailored to client environments.
  • Perform physical security assessments through tactics like tailgating and badge cloning.
  • Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
  • Provide training and awareness recommendations based on assessment outcomes.
  • Professional Attributes & Mindset
  • Strong analytical, problem-solving, and creative thinking skills.
  • Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
  • Methodical and detail-oriented approach to testing with the ability to think like an attacker.
  • Strong communication and presentation skills, able to engage both technical teams and business leadership.
  • Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.



Qualifications


  • 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
  • Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
  • Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
  • Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
  • In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
  • Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
  • Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
  • Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
  • Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
  • Excellent communication and stakeholder management skills, able to lead client-facing engagements.
  • Relevant certifications are a strong plus (e.g., OSCP, CREST, CISSP, CEH, GIAC GPEN).



Preferred Qualifications:

  • Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
  • Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
  • Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
  • Prior consulting experience in a service delivery or customer-facing environment.
  • Experience with threat intelligence platforms and indicators of compromise (IoCs).
This advertiser has chosen not to accept applicants from your region.

Senior Vulnerability Assessment and Penetration Testing

Kochi, Kerala Art Technology and Software

Posted today

Job Viewed

Tap Again To Close

Job Description

Responsibilities

- Client Engagement & Leadership
- Act as a trusted security advisor for multiple high-value clients.
- Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
- Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
- Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
- Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
- Advanced Threat Modelling & Risk Assessment
- Design and maintain threat models tailored to client applications, networks, and cloud environments.
- Perform risk assessments focusing on business impact and likelihood of exploitation.
- Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
- Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
- Penetration Testing & Red Team Operations
- Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
- Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
- Design and develop custom exploits and testing tools to replicate specific attacker techniques.
- Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
- Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
- Comprehensive Reporting & Documentation
- Produce clear and technically thorough vulnerability assessment and penetration testing reports.
- Create executive-level summaries focused on business impact and compliance risks.
- Maintain structured and up-to-date testing methodologies and playbooks.
- Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
- Technical & Programming Expertise
- Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
- Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
- Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
- Capable of custom tool development and advanced exploit research to target unique client environments.
- Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
- In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
- Social Engineering & OSINT Expertise
- Design and execute social engineering and phishing simulations tailored to client environments.
- Perform physical security assessments through tactics like tailgating and badge cloning.
- Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
- Provide training and awareness recommendations based on assessment outcomes.
- Professional Attributes & Mindset
- Strong analytical, problem-solving, and creative thinking skills.
- Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
- Methodical and detail-oriented approach to testing with the ability to think like an attacker.
- Strong communication and presentation skills, able to engage both technical teams and business leadership.
- Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.

Qualifications

- 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
- Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
- Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
- Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
- In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
- Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
- Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
- Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
- Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
- Excellent communication and stakeholder management skills, able to lead client-facing engagements.
- Relevant certifications are a strong plus (e.g., OSCP, CREST, CISSP, CEH, GIAC GPEN).

Preferred Qualifications:

- Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
- Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
- Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
- Prior consulting experience in a service delivery or customer-facing environment.
- Experience with threat intelligence platforms and indicators of compromise (IoCs).
This advertiser has chosen not to accept applicants from your region.

Senior Vulnerability Assessment and Penetration Testing

Kochi, Kerala Art Technology and Software

Posted today

Job Viewed

Tap Again To Close

Job Description

Responsibilities


  • Client Engagement & Leadership
  • Act as a trusted security advisor for multiple high-value clients.
  • Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
  • Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
  • Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
  • Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
  • Advanced Threat Modelling & Risk Assessment
  • Design and maintain threat models tailored to client applications, networks, and cloud environments.
  • Perform risk assessments focusing on business impact and likelihood of exploitation.
  • Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
  • Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
  • Penetration Testing & Red Team Operations
  • Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
  • Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
  • Design and develop custom exploits and testing tools to replicate specific attacker techniques.
  • Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
  • Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
  • Comprehensive Reporting & Documentation
  • Produce clear and technically thorough vulnerability assessment and penetration testing reports.
  • Create executive-level summaries focused on business impact and compliance risks.
  • Maintain structured and up-to-date testing methodologies and playbooks.
  • Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
  • Technical & Programming Expertise
  • Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
  • Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
  • Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
  • Capable of custom tool development and advanced exploit research to target unique client environments.
  • Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
  • In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
  • Social Engineering & OSINT Expertise
  • Design and execute social engineering and phishing simulations tailored to client environments.
  • Perform physical security assessments through tactics like tailgating and badge cloning.
  • Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
  • Provide training and awareness recommendations based on assessment outcomes.
  • Professional Attributes & Mindset
  • Strong analytical, problem-solving, and creative thinking skills.
  • Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
  • Methodical and detail-oriented approach to testing with the ability to think like an attacker.
  • Strong communication and presentation skills, able to engage both technical teams and business leadership.
  • Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.



Qualifications


  • 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
  • Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
  • Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
  • Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
  • In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
  • Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
  • Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
  • Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
  • Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
  • Excellent communication and stakeholder management skills, able to lead client-facing engagements.
  • Relevant certifications are a strong plus (e.g., OSCP, CREST, CISSP, CEH, GIAC GPEN).



Preferred Qualifications:

  • Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
  • Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
  • Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
  • Prior consulting experience in a service delivery or customer-facing environment.
  • Experience with threat intelligence platforms and indicators of compromise (IoCs).
This advertiser has chosen not to accept applicants from your region.

Senior Vulnerability Assessment and Penetration Testing

Kochi, Kerala Art Technology and Software

Posted today

Job Viewed

Tap Again To Close

Job Description

Responsibilities


  • Client Engagement & Leadership
  • Act as a trusted security advisor for multiple high-value clients.
  • Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
  • Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
  • Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
  • Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
  • Advanced Threat Modelling & Risk Assessment
  • Design and maintain threat models tailored to client applications, networks, and cloud environments.
  • Perform risk assessments focusing on business impact and likelihood of exploitation.
  • Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
  • Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
  • Penetration Testing & Red Team Operations
  • Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
  • Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
  • Design and develop custom exploits and testing tools to replicate specific attacker techniques.
  • Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
  • Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
  • Comprehensive Reporting & Documentation
  • Produce clear and technically thorough vulnerability assessment and penetration testing reports.
  • Create executive-level summaries focused on business impact and compliance risks.
  • Maintain structured and up-to-date testing methodologies and playbooks.
  • Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
  • Technical & Programming Expertise
  • Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
  • Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
  • Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
  • Capable of custom tool development and advanced exploit research to target unique client environments.
  • Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
  • In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
  • Social Engineering & OSINT Expertise
  • Design and execute social engineering and phishing simulations tailored to client environments.
  • Perform physical security assessments through tactics like tailgating and badge cloning.
  • Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
  • Provide training and awareness recommendations based on assessment outcomes.
  • Professional Attributes & Mindset
  • Strong analytical, problem-solving, and creative thinking skills.
  • Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
  • Methodical and detail-oriented approach to testing with the ability to think like an attacker.
  • Strong communication and presentation skills, able to engage both technical teams and business leadership.
  • Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.



Qualifications


  • 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
  • Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
  • Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
  • Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
  • In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
  • Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
  • Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
  • Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
  • Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
  • Excellent communication and stakeholder management skills, able to lead client-facing engagements.
  • Relevant certifications are a strong plus (e.g., OSCP, CREST, CISSP, CEH, GIAC GPEN).



Preferred Qualifications:

  • Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
  • Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
  • Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
  • Prior consulting experience in a service delivery or customer-facing environment.
  • Experience with threat intelligence platforms and indicators of compromise (IoCs).
This advertiser has chosen not to accept applicants from your region.

Senior Vulnerability Assessment and Penetration Testing

Kochi, Kerala Art Technology and Software

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

Responsibilities


  • Client Engagement & Leadership
  • Act as a trusted security advisor for multiple high-value clients.
  • Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
  • Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
  • Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
  • Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
  • Advanced Threat Modelling & Risk Assessment
  • Design and maintain threat models tailored to client applications, networks, and cloud environments.
  • Perform risk assessments focusing on business impact and likelihood of exploitation.
  • Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
  • Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
  • Penetration Testing & Red Team Operations
  • Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
  • Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
  • Design and develop custom exploits and testing tools to replicate specific attacker techniques.
  • Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
  • Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
  • Comprehensive Reporting & Documentation
  • Produce clear and technically thorough vulnerability assessment and penetration testing reports.
  • Create executive-level summaries focused on business impact and compliance risks.
  • Maintain structured and up-to-date testing methodologies and playbooks.
  • Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
  • Technical & Programming Expertise
  • Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
  • Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
  • Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
  • Capable of custom tool development and advanced exploit research to target unique client environments.
  • Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
  • In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
  • Social Engineering & OSINT Expertise
  • Design and execute social engineering and phishing simulations tailored to client environments.
  • Perform physical security assessments through tactics like tailgating and badge cloning.
  • Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
  • Provide training and awareness recommendations based on assessment outcomes.
  • Professional Attributes & Mindset
  • Strong analytical, problem-solving, and creative thinking skills.
  • Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
  • Methodical and detail-oriented approach to testing with the ability to think like an attacker.
  • Strong communication and presentation skills, able to engage both technical teams and business leadership.
  • Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.



Qualifications


  • 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
  • Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
  • Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
  • Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
  • In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
  • Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
  • Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
  • Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
  • Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
  • Excellent communication and stakeholder management skills, able to lead client-facing engagements.
  • Relevant certifications are a strong plus (e.g., OSCP, CREST, CISSP, CEH, GIAC GPEN).



Preferred Qualifications:

  • Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
  • Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
  • Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
  • Prior consulting experience in a service delivery or customer-facing environment.
  • Experience with threat intelligence platforms and indicators of compromise (IoCs).
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Security assessments Jobs in India !

Vulnerability Assessment & Penetration Testing (VAPT) Analyst

Tata Consultancy Services

Posted today

Job Viewed

Tap Again To Close

Job Description

Greetings from TCS!


We are currently planning to do a Walk-In Interview on 11-Oct-2025 (Saturday) at Chennai/Bangalore/Hyderabad.


Role **: VAPT Senior Analyst

Desired Skill Set :VAPT (Tenable, Defender, Sentinel One), Service Now VR, Bug Crowd

Experience Range : 4+ years

Joining Location : PAN India


Date - 11-Oct-2025 (Saturday)

In-Person Drive Location details.


  1. Hyderabad KP Venue - TCS Synergy Park, Premises No 2-56/1/36, Gachibowli, Opposite IIIT Hyderabad Campus, Seri Lingampally, RR District, Hyderabad, Telangana
  2. Chennai SNR Venue - Tata Consultancy Services Ltd, Sholinganallur Office Kumaran Nagar, 415/21-24, TNHB Main Rd, Chennai – .
  3. Bangalore PSN Venue : No:1, Crescent 3 Prestige Shantiniketan, Sadaramanagala South Taluk, Bengaluru, 3,, Thigalarapalya,, 3, ITPL Main Road, Maruthi Nagar, Krishnarajapuram, Bengaluru, Karnataka


Must-Have: VAPT (Nessus, Tenable, Defender, Sentinel One), Service Now VR, Bug Crowd

Good-to-Have: Burp Suite, Service Now VR, Vulnerability Management other vendor tools

Responsibility of / Expectations from the Role :


  • Expertise and experience of conducting VAPT (Vulnerability Assessment and Penetration Testing) as per standards such as OWASP Top 10, SANS Top 25 and WASC, NIST, CISA
  • Experience in Web Application Security Testing, Network security testing, Source code Review and Vulnerability Assessment and Penetration testing (SAST and DAST)
  • Strong Experience of using open- source tools and commercials tools such as but not limited to Burp Suite, Metasploit, Nessus, Acunetix and open source with operating systems Windows and Linux.
  • Perform research on new vulnerabilities, attack vectors, exploits, tools and industry trends for the above- mentioned services.
  • CEH Certification Mandatory.
  • Candidates with CISM, OSCP are preferred.
  • Strong presentation and analytic skills, critical thinking and problem-solving skills are mandatory
This advertiser has chosen not to accept applicants from your region.

Senior Vulnerability Assessment And Penetration Testing

Art Technology and Software

Posted today

Job Viewed

Tap Again To Close

Job Description

Responsibilities


  • Client Engagement & Leadership
  • Act as a trusted security advisor for multiple high-value clients.
  • Manage end-to-end security assessment projects, including scoping, execution, reporting, and remediation guidance.
  • Conduct technical and executive-level briefings to communicate findings, risks, and strategic recommendations clearly.
  • Translate complex technical vulnerabilities into business risk insights to help clients prioritize actions.
  • Collaborate closely with client stakeholders to ensure security recommendations are practical and actionable.
  • Advanced Threat Modelling & Risk Assessment
  • Design and maintain threat models tailored to client applications, networks, and cloud environments.
  • Perform risk assessments focusing on business impact and likelihood of exploitation.
  • Develop attack scenarios based on the latest threat intelligence and real-world attacker techniques.
  • Guide clients in integrating security into their software development lifecycle (SDLC) and cloud infrastructure designs.
  • Penetration Testing & Red Team Operations
  • Lead advanced black-box, grey-box, and white-box penetration testing engagements for web applications, APIs, networks, and cloud environments.
  • Conduct sophisticated Red Team exercises to simulate targeted attack campaigns.
  • Design and develop custom exploits and testing tools to replicate specific attacker techniques.
  • Perform social engineering tests (phishing campaigns, physical security assessments) in controlled and ethical scenarios.
  • Provide detailed post-exercise analysis, including actionable remediation strategies and long term improvement plans.
  • Comprehensive Reporting & Documentation
  • Produce clear and technically thorough vulnerability assessment and penetration testing reports.
  • Create executive-level summaries focused on business impact and compliance risks.
  • Maintain structured and up-to-date testing methodologies and playbooks.
  • Contribute to internal knowledge base, documenting research, custom tools, and successful testing strategies.
  • Technical & Programming Expertise
  • Expert in vulnerability assessment and exploitation techniques across a wide range of technologies.
  • Proficient in security testing tools such as Burp Suite, Nessus, Metasploit, Nmap, OpenVAS, Cobalt Strike, Wireshark, and tcpdump.
  • Strong scripting and automation skills (Python, Bash, PowerShell) to automate repetitive testing tasks and tool workflows.
  • Capable of custom tool development and advanced exploit research to target unique client environments.
  • Strong knowledge of application security vulnerabilities (OWASP Top 10, SANS Top 25) and attack surface analysis.
  • In-depth understanding of cloud security risks, identity and access management, and container security (Docker, Kubernetes).
  • Social Engineering & OSINT Expertise
  • Design and execute social engineering and phishing simulations tailored to client environments.
  • Perform physical security assessments through tactics like tailgating and badge cloning.
  • Apply Open Source Intelligence (OSINT) techniques to gather reconnaissance data for assessments.
  • Provide training and awareness recommendations based on assessment outcomes.
  • Professional Attributes & Mindset
  • Strong analytical, problem-solving, and creative thinking skills.
  • Ethical hacker mindset with a continuous drive to research emerging threats, attack techniques, and defense bypass methods.
  • Methodical and detail-oriented approach to testing with the ability to think like an attacker.
  • Strong communication and presentation skills, able to engage both technical teams and business leadership.
  • Proactively innovate by developing new tools, scripts, or methodologies to improve testing efficiency and depth.



Qualifications


  • 7+ years of hands-on experience in Vulnerability Assessment, Penetration Testing, and security consulting.
  • Strong technical expertise in application security, network security, cloud security (AWS, Azure, GCP), and infrastructure security testing.
  • Proven experience using VAPT tools such as Burp Suite, Nessus, Qualys, Nmap, Metasploit, Nikto, OpenVAS, etc.
  • Solid knowledge of exploitation techniques, post-exploitation frameworks, and manual testing methodologies.
  • In-depth knowledge of web application vulnerabilities (OWASP Top 10) and network protocol analysis.
  • Experience conducting cloud security assessments, including misconfigurations, IAM permissions analysis, and container security.
  • Proficiency in scripting and automation (Python, Bash, PowerShell) to customize tests and tools.
  • Familiarity with security frameworks and standards such as NIST, ISO 27001, MITRE ATT&CK.
  • Strong reporting and documentation skills, able to translate technical findings into business friendly recommendations.
  • Excellent communication and stakeholder management skills, able to lead client-facing engagements.
  • Relevant certifications are a strong plus (e.G., OSCP, CREST, CISSP, CEH, GIAC GPEN).



Preferred Qualifications:

  • Certifications such as OSCP, GPEN, CREST CRT, CRTO are highly desirable.
  • Experience in DevSecOps, CI/CD pipeline security, or automated security testing frameworks.
  • Familiarity with industry compliance frameworks like PCI-DSS, GDPR, HIPAA, SOC2, and ISO 27001.
  • Prior consulting experience in a service delivery or customer-facing environment.
  • Experience with threat intelligence platforms and indicators of compromise (IoCs).
This advertiser has chosen not to accept applicants from your region.

Vulnerability Assessment and Penetration Testing Manager

Cubical Operations LLP

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Title: Senior Manager – VAPT (OSCP Certified)

Location: Any Metro City in India (Hybrid) – Mumbai / Bangalore / Delhi / Chennai / Hyderabad

Travel Requirement: Frequent travel to Japan (as per project requirement)

Experience: 7+ years

Certification: Mandatory – OSCP

About the Role:

We are seeking a highly skilled and experienced Senior Manager – Vulnerability Assessment and Penetration Testing (VAPT) professional to lead and deliver advanced security assessments for our clients. The ideal candidate will possess deep technical expertise in offensive security, team leadership experience, and a strong understanding of global cybersecurity frameworks. The role requires collaboration with international teams and client stakeholders, with periodic travel to Japan.

Key Responsibilities:

  • Lead and execute comprehensive Vulnerability Assessment and Penetration Testing (VAPT) engagements across web, mobile, network, cloud, and infrastructure environments.
  • Manage and mentor a team of security consultants to ensure high-quality project delivery.
  • Develop customized testing methodologies aligned with client environments and industry standards (OWASP, PTES, NIST, ISO 27001).
  • Prepare and present detailed technical reports, risk assessments, and remediation strategies to both technical and business audiences.
  • Coordinate with Japanese and Indian client stakeholders, ensuring smooth communication, delivery, and compliance with project timelines.
  • Stay updated with emerging threat vectors, exploits, and mitigation techniques.
  • Drive automation and process improvements in security testing and reporting.

Required Skills and Qualifications:

  • Minimum 7 years of hands-on experience in VAPT, Red Teaming, and Offensive Security.
  • Mandatory certification: OSCP (Offensive Security Certified Professional) .
  • Strong knowledge of exploit development, threat modeling, and post-exploitation techniques.
  • Proficiency in tools such as Burp Suite, Metasploit, Nmap, Nessus, Qualys, Wireshark, and other manual testing tools.
  • Solid understanding of secure coding practices and common vulnerabilities (OWASP Top 10, SANS 25).
  • Experience working with cloud platforms (AWS, Azure, GCP) and modern DevSecOps environments.
  • Excellent communication and presentation skills for client interactions and reporting.
  • Ability to work independently in hybrid and multicultural environments.
  • Prior experience engaging with Japanese clients or willingness to travel and adapt to cross-cultural settings.

Preferred Qualifications:

  • Additional certifications such as OSCE, CRTP, CEH (Practical), CREST, GPEN, or GWAPT .
  • Exposure to IoT/OT security, API testing , or threat hunting .
  • Experience in managing offshore and onsite delivery teams.
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Security Assessments Jobs