62 Vulnerability Scanners jobs in India
Infrastructure Security Assessment - VAPT Specialist
Posted today
Job Viewed
Job Description
Who We Are
At Kyndryl, we design, build, manage and modernize the mission-critical technology systems that the world depends on every day. So why work at Kyndryl? We are always moving forward – always pushing ourselves to go further in our efforts to build a more equitable, inclusive world for our employees, our customers and our communities.
The Role
Are you passionate about protecting companies from cyber threats? Do you want to be part of a team that safeguards the digital assets of cutting-edge organizations? Look no further – Kyndryl is seeking a Cybersecurity Specialist to join our team of talented Technical Specialists.
As a Cybersecurity Specialist, you will be at the forefront of protecting Kyndryl's customers’ computer systems and networks from unauthorized access, use, disclosure, disruption, modification, or destruction. You will use a variety of tools and techniques to defend against a wide range of cyber threats, such as malware, ransomware, phishing attacks, and data breaches.
But that's not all – at Kyndryl, you will also have the opportunity to implement new cybersecurity systems and policies to ensure the protection of our customers’ data and assets. You will monitor and review potential threats from various cybersecurity systems and conduct proof-of-concepts (POCs) with new cyber security software to evaluate its effectiveness and potential integration into the organization's systems.
Not only will you be responsible for ensuring the security of Kyndryl's customers’ network and systems, but you will also enrich the organization’s knowledge towards potential cyber threats and best practices. You will provide automation scripts for threat hunting in customer environments using lessons learned from Cyber-attacks.
You will also have the opportunity to conduct penetration testing and threat and vulnerability assessments of applications, operating systems, and networks, responding to cybersecurity breaches and identifying intrusions. You will research and evaluate cybersecurity threats and perform root cause analysis, all while assisting in the creation and implementation of security solutions.
Additionally, you will have the opportunity to work in the area of security innovation, creating and experimenting with “outside the box” ideas that could change the trajectory of cyber security.
This is a unique opportunity to work with cutting-edge technology, be part of a dynamic team, and make a significant impact in the world of cybersecurity. If you're up for the challenge, apply now to join Kyndryl's cybersecurity team!
Your Future at Kyndryl
Every position at Kyndryl offers a way forward to grow your career. We have opportunities that you won’t find anywhere else, including hands-on experience, learning opportunities, and the chance to certify in all four major platforms. Whether you want to broaden your knowledge base or narrow your scope and specialize in a specific sector, you can find your opportunity here.
Who You Are
You’re good at what you do and possess the required experience to prove it. However, equally as important – you have a growth mindset; keen to drive your own personal and professional development. You are customer-focused – someone who prioritizes customer success in their work. And finally, you’re open and borderless – naturally inclusive in how you work with others.
Required Skills and Experience:
• Drive implementation of advanced Qualys platform features such as Threat Protection, Patch Management, Cloud View, and Multi-Vector EDR where applicable.
• Collaborate with IT operations and patch management teams to automate ticket generation and remediation workflows via integration with ITSM tools (e.g., ServiceNow).
• Develop automation scripts or leverage Qualys APIs for:
- Automated remediation tracking
- Alerting for critical vulnerabilities
- Integrating patching schedules and validation
• Maintain remediation SLAs by:
- Following up with asset owners
· Escalating overdue items
- Providing weekly status reports to the lead
• Participate in continuous security integration into DevSecOps for infrastructure components.
• Provide detailed reporting and dashboards for vulnerability trends, SLA adherence, and recurring risk patterns.
• Contribute to audit readiness by mapping Qualys findings to compliance frameworks (e.g., NIST, ISO, business specific regulations).
Being You
Diversity is a whole lot more than what we look like or where we come from, it’s how we think and who we are. We welcome people of all cultures, backgrounds, and experiences. But we’re not doing it single-handily: Our Kyndryl Inclusion Networks are only one of many ways we create a workplace where all Kyndryls can find and provide support and advice. This dedication to welcoming everyone into our company means that Kyndryl gives you – and everyone next to you – the ability to bring your whole self to work, individually and collectively, and support the activation of our equitable culture. That’s the Kyndryl Way.
What You Can Expect
With state-of-the-art resources and Fortune 100 clients, every day is an opportunity to innovate, build new capabilities, new relationships, new processes, and new value. Kyndryl cares about your well-being and prides itself on offering benefits that give you choice, reflect the diversity of our employees and support you and your family through the moments that matter – wherever you are in your life journey. Our employee learning programs give you access to the best learning in the industry to receive certifications, including Microsoft, Google, Amazon, Skillsoft, and many more. Through our company-wide volunteering and giving platform, you can donate, start fundraisers, volunteer, and search over 2 million non-profit organizations. At Kyndryl, we invest heavily in you, we want you to succeed so that together, we will all succeed.
penetration testing
Posted today
Job Viewed
Job Description
- Total Yrs. of Experience 5+Yrs Relevant Yrs. of experience 5+Yrs of penetration testing hands on experience Detailed JD (Roles and Responsibilities) Minimum Experience: 4+Yrs of penetration testing hands on experience
- Hands on manual pen testing experience - Web, API, Secure code analysis.
- Hands on with manual exploitation skills.
- Security Testing Tools experience - Fortify, BurpSuite Pro, Postman, SOAP UI, etc.
- Knowledge on Linux, Devsecops.
- Domain: Security Standards - OWASP Top 10 scenarios
- Onshore- offshore model, working with customer directly.
- Stakeholder coordination
- Security Testing Certifications - CEH, BurpSuite certified Mandatory skills Minimum Experience: 4+Yrs of penetration testing hands on experience
- Hands on manual pen testing experience - Web, API, Secure code analysis.
- Hands on with manual exploitation skills.
- Security Testing Tools experience - Fortify, BurpSuite Pro, Postman, SOAP UI, etc.
- Knowledge on Linux, Devsecops.
- Domain: Security Standards - OWASP Top 10 scenarios
- Onshore- offshore model, working with customer directly.
- Stakeholder coordination
- Security Testing Certifications - CEH, BurpSuite certified
Skills Required
Fortify, Postman, Soap Ui, Linux, DevSecOps
Penetration Testing
Posted today
Job Viewed
Job Description
Roles & responsibilities:
- Works on problems of diverse scope where analysis of data requires evaluation of identifiable factors
- Demonstrates good judgment in selecting methods and techniques for obtaining solutions.
- Networks with senior internal and external personnel in own area of expertise.
- Supervision - Normally receives little instruction on day-to-day work, general instructions on new assignments.
- Experience with vulnerability exploit techniques and tools. - Ability to setup, configure and utilize ethical hacking tools and exploits.
- Ability to develop exploits and demonstrate impacts to others
- Proficient in research and analysis of security intelligence data, system/application/network configurations and logs
- Ability to understand and execute complex analysis of intelligence data as well as systems/application/network configurations and logs to determine preliminary threats, targets and evaluate risk appropriately.
- Ability to apply controls to safely traverse the dark web for research purposes.
- Experience with activities involving APT Threats - Ability to describe various tools, techniques, and procedures (TTPs) associated with threat actors known to operate in the financial services domain.
Skills Required
Penetration Testing
Penetration Testing
Posted today
Job Viewed
Job Description
- Key Responsibilities:
- Penetration Testing:
- Conduct regular penetration testing (manual and automated) to identify vulnerabilities in applications, networks, and systems.
- Perform tests on a wide range of environments including web applications , network infrastructure , cloud environments , and IoT devices .
- Simulate attacks (internal and external) to identify potential attack vectors and exploit vulnerabilities to assess the system's security.
- Use various penetration testing tools such as Metasploit , Burp Suite , Kali Linux , Nmap , Wireshark , etc.
- Vulnerability Assessments:
- Identify, analyze, and assess system and application vulnerabilities.
- Conduct security assessments to ensure proper configuration and identification of weaknesses in the environment.
- Provide detailed findings and recommendations for fixing vulnerabilities based on risk and impact.
- Reporting and Documentation:
- Provide clear, concise, and comprehensive penetration testing reports , including findings, risk assessments, and actionable recommendations.
- Present findings to stakeholders in a manner that is understandable to both technical and non-technical audiences.
- Maintain accurate documentation of all tests, activities, and findings for regulatory compliance and auditing purposes.
- Collaboration and Support:
- Work closely with development teams and IT operations to assist in remediation efforts and to verify that identified vulnerabilities are addressed.
- Assist in creating security policies and best practices to ensure the organization's security posture remains robust.
- Provide expert advice and support during security incident investigations and help with incident response .
- Security Research and Continuous Learning:
- Stay updated with the latest penetration testing methodologies , security vulnerabilities, and emerging threats.
- Participate in bug bounty programs and Capture The Flag (CTF) challenges to sharpen skills and remain informed on current attack vectors and exploits.
- Contribute to the development and improvement of internal penetration testing frameworks .
- Compliance and Risk Management:
- Ensure that penetration testing activities comply with internal security policies and relevant industry regulations (e.g., ISO 27001 , GDPR , NIST , PCI DSS ).
- Provide input and recommendations on security architecture and assist with compliance audits and assessments.
- Collaborate with the security team to develop strategies for managing identified risks and vulnerabilities.
- Required Qualifications:
- Bachelor's degree in Computer Science , Information Security , Network Security , or a related field, or equivalent practical experience.
- 3+ years of experience in penetration testing , ethical hacking , or cybersecurity roles.
- Proven experience with common penetration testing tools (e.g., Burp Suite , Metasploit , Nmap , Wireshark , OWASP ZAP ).
- Strong knowledge of network protocols (e.g., TCP/IP , DNS , HTTP ), web application security , and network security .
- Experience with cloud security (e.g., AWS , Azure , Google Cloud ).
- Solid understanding of vulnerability management and risk assessments .
- Experience with various operating systems including Linux , Windows , and macOS .
- Understanding of web application firewalls (WAF) and security features like SSL/TLS , HTTP headers , and authentication mechanisms .
- Familiarity with ethical hacking standards and OWASP Top 10 .
- Ability to effectively communicate security findings to both technical and non-technical stakeholders.
Skills Required
Aws, Azure, Tcp/ip, Dns, Http
Penetration Testing
Posted today
Job Viewed
Job Description
- Person should know the vulnerability and the remediation in depth so that he can suggest the same to all the stakeholders.
- Expert in Burp Suite tool.
**Role Purpose**
The purpose of this role is to analyse, identify, rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive information
**͏**:
- Very good in reporting as per the best practices.
- Person should know the vulnerability and the remediation in depth so that he can suggest the same to all the stakeholders.
- Expert in Burp Suite tool.
**J͏ob Description**:
**Deliver**:
**No.**
**Performance Parameter**
**Measure**
1.
Customer centricity
Timely security breach solutioning to end users, Internal stakeholders & external customers experience
2.
Process Adherence
Adherence to SLA's (90-95%), response time and resolution time TAT
**͏**:
Very good in reporting as per the best practices.
Person should know the vulnerability and the remediation in depth so that he can suggest the same to all the stakeholders.
Expert in Burp Suite tool.
**͏**:
Reinvent your world.¿We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.
Senior Penetration Testing
Posted today
Job Viewed
Job Description
Job Title: Senior Penetration Testing
Experience:3-7 Years
NoticePeriod: Immediate to 15 days
Location: Bangalore
JD:
·Lead engagements from kickoff with productowners through scoping engagements, penetration testing and reporting whileadhering to the agreed scope and deadlines.
·Minimum 3+ years of experience in productpenetration testing.
·3+ years of experience in web, mobile (BothAndroid & iOS) and thick client penetration testing domains.
·Perform exploit and vulnerability research on products.
·Knowledge of TCP/IP, OSI Layer, IPv4 & IPv6,Network Protocols and Wireless Communication skills
·preferred.
·Knowledge of at least one scripting languagesuch as python, shell script, ruby, javascript etc.
·Research fuzz testing tools and conductpenetration test on a variety of products via communication interfaces such asModbus, Wi-Fi, Bluetooth, and others.
·Ability to develop detailed PoCs, train productteam and promote security awareness.
·Stay up to date on the latest exploits andsecurity trends.
Cybersecurity Penetration Testing
Posted today
Job Viewed
Job Description
Automotive Cybersecurity Penetration Test Engineers & Leads
Cybersecurity Skills
o Good understanding of ASPICE - SWE.4, SWE.5, SWE.6, SYS.4, SYS.5
o Strong understanding of cybersecurity testing of automotive ECUs
o Experience in developing test scenarios and understanding of use cases for features like secure boot, secure diagnostics, secure debug, PKI infrastructure, HSM, key manager, ECU secure modes, Firewall, Secure on-board communication etc.
o Good work experience with UDS protocol
o Experience in creating test setup, test plans, test cases, procedures, script, test execution and reporting, and analysis of test reports
o Experience with cybersecurity test automation, fuzz testing, penetration testing
o Understanding of cybersecurity lifecycle and standards ( ISO 21434 , UNECE WP.29, GM/T, NIST)
Desired Skills
o Good understanding of OEM cybersecurity end to end process and eco system, tools and methods.
o Good understanding of automotive product development lifecycle
o Strong experience in automotive embedded system validation
o Experience in testing various interfaces like CAN/CAN FD, Ethernet, Flexray, BT, Wi-Fi, GPS JTAG, UART, SPI etc.
o Good understanding of RTOS, QNX, Linux, Android, various platform softwares and testing their security features
o Good experience in CAPL Scripting, python scripting, XML etc.
o ISTQB certification
o Vector VT / dSPACE test systems
o Vector CANoe
o Functional Validation of Body, Chassis, Powertrain, Infotainment, Telematics
o vTESTstudio / CAPL / Python
Be The First To Know
About the latest Vulnerability scanners Jobs in India !
Penetration Testing Methodologies
Posted today
Job Viewed
Job Description
We are looking for an experienced Penetration Testing Methodologies professional to join our cybersecurity team in India. The ideal candidate will have a strong background in identifying and mitigating security vulnerabilities through comprehensive penetration testing.
Responsibilities- Conduct penetration tests on web applications, networks, and systems to identify vulnerabilities.
- Develop and maintain penetration testing methodologies and frameworks.
- Prepare detailed reports on findings and provide actionable recommendations for remediation.
- Collaborate with development and security teams to ensure secure coding practices are followed.
- Stay updated with the latest security trends, vulnerabilities, and attack vectors.
- Educate and train team members on penetration testing techniques and best practices.
- 4-14 years of experience in penetration testing or cybersecurity roles.
- Proficiency in using penetration testing tools such as Burp Suite, Metasploit, Nmap, and OWASP ZAP.
- Strong understanding of network protocols, web applications, and security architectures.
- Knowledge of programming and scripting languages such as Python, Java, or Bash.
- Experience with vulnerability assessment and risk management methodologies.
- Certifications such as CEH, OSCP, or GPEN are highly desirable.
- Excellent analytical, problem-solving, and communication skills.
Education
PGDM, Doctor of Psychology (Psy. D./D. Psych.), Bachelor Of Computer Application (B.C.A), Masters in Technology (M.Tech/M.E), Bachelors of Law (B.L/L.L.B), Doctor of Physical Therapy, PGP, Master of Law (M.L/L.L.M), MBBS, Bachelor of Homeopathic Medicine and Surgery (BHMS), Bachelor of Business Administration (B.B.A), Doctor of Optometry, Doctor of Business Administration (DBA), Doctor of Medicine (M.D/M.S), Master OF Business Administration (M.B.A), Post Graduate Diploma in Computer Applications (PGDCA), Master in Computer Application (M.C.A), Post Graduate Programme in Management for Executives (PGPX), Doctor of Pharmacy (PharmD), Doctor of Veterinary Medicine (DVM), Bachelor of Dental Surgery (B.D.S), Bachelor of Ayurvedic Medicine and Surgery (BAMS), Doctor of Dental Surgery/Medicine (DDS/DMD), Doctor of Nursing Practice (DNP), Bachelor Of Technology (B.Tech/B.E), Master of Library & Information Science (MLIS), Doctor of Public Health (DrPH), Master of Public Administration (MPA)
Skills Required
Vulnerability Assessment, Web Application Testing, Social Engineering, Risk Analysis, Wireless Security, Scripting Languages
Cybersecurity Penetration Testing
Posted today
Job Viewed
Job Description
Automotive Cybersecurity Penetration Test Engineers & Leads
Cybersecurity Skills
o Good understanding of ASPICE - SWE.4, SWE.5, SWE.6, SYS.4, SYS.5
o Strong understanding of cybersecurity testing of automotive ECUs
o Experience in developing test scenarios and understanding of use cases for features like secure boot, secure diagnostics, secure debug, PKI infrastructure, HSM, key manager, ECU secure modes, Firewall, Secure on-board communication etc.
o Good work experience with UDS protocol
o Experience in creating test setup, test plans, test cases, procedures, script, test execution and reporting, and analysis of test reports
o Experience with cybersecurity test automation, fuzz testing, penetration testing
o Understanding of cybersecurity lifecycle and standards ( ISO 21434 , UNECE WP.29, GM/T, NIST)
Desired Skills
o Good understanding of OEM cybersecurity end to end process and eco system, tools and methods.
o Good understanding of automotive product development lifecycle
o Strong experience in automotive embedded system validation
o Experience in testing various interfaces like CAN/CAN FD, Ethernet, Flexray, BT, Wi-Fi, GPS JTAG, UART, SPI etc.
o Good understanding of RTOS, QNX, Linux, Android, various platform softwares and testing their security features
o Good experience in CAPL Scripting, python scripting, XML etc.
o ISTQB certification
o Vector VT / dSPACE test systems
o Vector CANoe
o Functional Validation of Body, Chassis, Powertrain, Infotainment, Telematics
o vTESTstudio / CAPL / Python
Penetration Testing Engineer
Posted today
Job Viewed
Job Description
In this vital role, you will be responsible for conducting authorized security tests on IT infrastructure to evaluate the strength of its systems against potential cyberattacks. You will perform security testing, including penetration testing and code reviews, to identify and exploit vulnerabilities. The ideal candidate will have a deep understanding of common vulnerabilities and penetration testing methodologies, using both automated tools and manual techniques to simulate real-world attacks. You will then work with the organization to prioritize, remediate, and report on identified issues, strengthening the overall security posture.
Roles & Responsibilities- Security Testing & Vulnerability Assessment: Conduct security testing on networks, systems, applications, and infrastructure. You will use automated tools (Burp Suite, OWASP ZAP, Acunetix ) and manual techniques to identify weaknesses such as SQL Injection, Cross-Site Scripting (XSS) , and Cross-Site Request Forgery (CSRF) .
- Exploitation & Post-Exploitation: Attempt to exploit discovered vulnerabilities to demonstrate their impact and prove their existence. You will perform advanced post-exploitation tasks to simulate real-world attack scenarios, such as retrieving sensitive data or elevating user privileges.
- Documentation & Reporting: Document identified vulnerabilities in detail, explaining how they were found, their severity, and their potential impact. You will include proof-of-concept (PoC) for critical vulnerabilities and offer actionable solutions for fixing them.
- Prioritization & Communication: Use risk-based prioritization to categorize issues by their severity and business impact. You will present findings to stakeholders, security teams, and management, explaining the business risk and potential impacts.
- Mentorship & Collaboration: Guide and support junior team members by offering technical advice and conducting code reviews. You will also work with third-party security vendors for audits and external assessments.
- Continuous Learning: Continuously learn about the latest vulnerabilities, exploits, and security trends to enhance the organization's security posture.
- Strong knowledge of common vulnerabilities (OWASP Top 10, SANS Top 25 ), network protocols, encryption standards, and common penetration testing methodologies (ISSAF, OSSTMM, PTES ).
- Familiarity with tools like Burp Suite, OWASP ZAP , and Metasploit .
- A deep understanding of web application architecture, databases, and authentication mechanisms.
- Familiarity with industry standards and compliance requirements (e.g., PCI-DSS, NIST, ISO 27001 ).
- Proficiency in scripting and automation (Python, Bash ) is a plus.
- Experience with threat intelligence and incorporating emerging threats into penetration testing practices is a plus.
- A Bachelor's degree in Computer Science, Cybersecurity, or an Information Systems-related field.
- Relevant certifications such as eJPT, eCPPT, eWPT, OSCP, OSWA, or GWAPT are preferred.
- Problem-Solving: The ability to think critically and creatively when testing and attempting to exploit vulnerabilities.
- Communication: Strong communication skills to present findings to a variety of audiences and guide junior team members.
- Proactiveness: A high degree of initiative and self-motivation to continuously learn and stay updated with the latest security trends.
Skills Required
Penetration Testing, Security Testing, Documentation, Testing Methodologies, Web Application Architecture, Python, Bash