...information to development teams.
Create, maintain, and execute automated test scripts using testing frameworks and scripting languages (e.g., Selenium, Appium, Python, Java) to validate software functionality, p...
...maintain tools, scripts, and methodologies to enhance the efficiency and effectiveness of penetration testing activities.
# Participate in red teaming exercises to simulate real-world cyber-attacks and assess the ...
...will use the result of your work. Your innovative thinking as researcher and model developer will be very highly appreciated and participation... ...through efficiency, flexibility, and data ...
...updates/onboarding to issue management: findings, remediation plans, exceptions, policy management module, IT risk management module, IT Security Vulnerability Management module o updates to API integration with Ser...
...As a Web Application Security Assessment Specialist, you will be responsible for supporting the ADCI Governance team in conducting web application security assessments
Your main focus will be on Threat and Vulner...
...Application Support Analyst Front-EndResponsibilities
Provide day-to-day application-level support for production incidents and L2 support, rotational shifts may be required.
L2 Production Support responding t...
...SOC – Security Analyst ( Senior )
Reports to: Manager of Security Operations Center Department: Security
Essential Functions
Primary support for Security Infrastructure platforms focused on Requests, Inciden...
Cyber Security Analyst.
Location: Hyderabad, Madhapur (Work From Office)
Client:
Our client is a product-based organization with a primary focus on addressing Cybersecurity challenges for Enterprises across industry verticals. With rapid dig...
...Security Compliance Analyst
Job Summary:
Security Compliance Analyst to assist in the service delivery of annual HIPAA and NIST Risk Assessments... ...). This role requires a str...
...Description
~ Minimum of 3-5 years' experience in the areas of SAP vulnerability scanning, security event
management and penetration testing
Deep technical knowledge in Threat Modelling and IT Risk Asses...