Get new jobs by email
- ...DESCRIPTION-SENIOR INFORMATION SECUIRTY ANALYST What we are looking for... ...of Policybazaar's security landscape/posture Execution... ...similar Experienced in DAST, SAST and Infra VAPTand infrastructure... ...knowledge about the Cyber threat Intelligence and Source Code Review...Suggested
- ...cover all aspects of application security. You will apply your web... ...software architecture and design reviews, conduct black box and white box... ...to adopt secure design and coding practices Develop and extend... ...application vulnerabilities Source Code Review / SAST either...Suggested
- ...Job Description We are seeking an Offensive Security Analyst to conduct advanced assessments across Web, Mobile, APIs, and authentication protocols. The role involves penetration testing, source code reviews, red teaming, and adversary emulations on diverse infrastructures...Suggested
- Position Summary: The Web Application Security Analyst/Engineer is responsible for ensuring the... ...detection, vulnerability assessment, secure coding, WAF management, and cloud security... ...application security testing methodologies (DAST, SAST, and SCA). Experience in penetration...SuggestedWorldwide
- ...business units in the areas of technology, sourcing, procurement, legal, finance, and human... ...have an amazing opportunity for an IT Security Analyst (Web & API Penetration Testing), available... ...). Strategic & Architecture Review: Conduct Threat Modeling sessions during...SuggestedRemote jobFlexible hours
- ...Major Objectives Of The Job Execute Security Testing & Assessments Vulnerability Assessment and Penetration Testing ( systems,... ...networks, web-based and mobile) Forensics Redteaming Secure Code Review (SAST, DAST) Secure Config Review (Cloud, On-Premise) Ensure...Suggested
- ...seeking a Senior Information Security Engineer. In This Role, You... ...applications, and endpoint security Review and correlate security logs... ...drafting application security coding standards. ~ Ability to... ...application security. Validate SAST, DAST and SCA scans and...Suggested
- ...Job Summary The Primary responsibility is to review the security controls in place at Milliman global office locations (aka Practices) to ensure implementation is in place and security threats are identified and remediated within established timeframes. Reviews are conducted...SuggestedContract workWork at officeLocal areaRemote job
Rs 6 - 8 lakhs p.a.
...Responsibilities Include: Conduct regular security assessments (SAST/SCA/DAST) utilizing both automated and... ...security design and architectural reviews for new and existing applications to... ...vulnerabilities and secure coding practices. Demonstrated experience...Suggested- ...Authorization Expertise: 8+ years of experience in application security with focus on authentication and authorization Deep... ...be considered Key Competencies Deep analytical skills for reviewing authentication and authorization flows Strong understanding of...Suggested
Rs 5.5 - 10.5 lakhs p.a.
...Responsibilities: Analyze application security control requirements and develop automation... ...compliance with security standards. Review SAST and SCA findings, challenge developer analysis... ...development teams in implementing secure coding practices and resolving vulnerabilities....Suggested- ...are looking for a Product & Application Security Analyst to work closely with product, engineering... ...threat modeling, application security reviews, vulnerability management, secure SDLC support... ...application security testing including SAST, DAST, dependency scanning, and secrets...Suggested
- ...We are currently looking for a Security Operations Center Analyst , and the key responsibilities are the... ...intelligence from tools, logs, and other data sources, ensuring strong documentation is in... ...hacking techniques, malicious code trends, botnets, exploits, malware, DDoS...SuggestedFull timeRemote job
- ...Securities Roles and Responsibilities Job Description Internal... ...confidentiality with Yubi are permitted to review materials in this document. By... ...of any kind. Role: SOC Analyst In this role, you are... ...security tools, and available data sources on a day to day basis to...SuggestedImmediate start
Rs 4 - 7 lakhs p.a.
...Microsoft Sentinel, QRadar) and other security monitoring tools. Analyze... ...logs and threat intelligence sources. Maintain and tune SOC... ...reports, and support post-incident reviews. Collaborate with IT,... ...experience in a SOC or cybersecurity analyst role. ~ Familiarity with...Suggested- ...RESPONSIBILITIES Monitor and investigate security alerts to identify unwanted activity and security... ...including SIEM and EDR. Preform ad hoc coding for threat hunting, evidence analysis,... ...Security Operations processes improvement. Review Incident Response policies and procedures....Full time
- ...Title: Cyber Threat Intelligence Analyst Job Summary The Cyber... ...actionable intelligence to enhance security operations. Key... ...analyze cyber threats using open-source, commercial, and internal intelligence... ...the hiring process, such as reviewing applications, analyzing...
- ...perspectives at AHEAD. SOC Analysts at AHEAD monitor customer environments... ...accurate analysis of security related problems. They have a... ...proactive threat research Review security events that are populated... ...Data mining of log sources to uncover and investigate anomalous...Work at officeFlexible hours
- ...installing software, or changing a line of code. Internet properties powered by Cloudflare... ...About The Team Join Cloudflare's Security Architecture Team with the following with... ...data flows, and infrastructure controls. Review external vulnerability scans and security...Contract workLocal areaShift work
- ...dedicated to fortifying our global security posture by combining robust... ...detection. As a Security Analyst with a focus on Detection Engineering... ...Incident Response Monitor, review, and analyze security alerts... ...Experience with detection-as-code, SOAR platforms, and...Full timeHybrid workWork at officeFlexible hours
- ...Eurofins Global IT business needs. The code shipped out of EITSI impacts the global... ...Job Description Role: Information Security Analyst Location: Bangalore SUMMARY OF ROLE... ...fit for purpose, carrying out relevant reviews/propose modifications as necessary. Conduct...Long term contractLocal area
- ...for qualified candidates for Information Security Analyst. Please see the details for the position... .... Configure, schedule, and review the results of vulnerability scans Coordinate... ...from classified, proprietary, and open source resources to provide indication and warnings...Long term contractTemporary workImmediate startRemote jobShift work
- ...Your impact Intelsat's Cyber Security Center Teamis focused on... ...concerns. An Information Security Analyst must be aware of the enterprise... .... Experience with reviewing IDS/IPS, EDR, firewall, OS, application... ...from proprietary and open-source threat intelligence resources...Casual workHybrid workRemote jobWork from home2 days week
- ...Description Role Title: Information Security Analyst (L08) Company Overview Synchrony (NYSE... ...Knowledge and experience with Secure coding practices/ System Integration/ Network Administration... ...Event Management (SIEM) Experience reviewing information and articulating solutions...Hybrid workFlexible hours
- ...IT Security Analyst, Associate Position Overview Job Title: IT Security Analyst... ...Cloud Platform(GCP) using Infrastructure as Code (IaC). Job Description Summary Information... ...services. Contribute to code reviews, testing, and performance tuning to...Work at officeFlexible hours
- ...Overview The GRC Application Analyst II is responsible for leading... ...with Internal Audit, IT Security, business process owners, and... ...standards, usage monitoring, log review processes, escalation management... ..., reviews of program language code and logic, and business...Shift work
- ...Responsibilities The System Admin SAP Security Analyst will work closely with the global ISOL (... .... Support / Conduct regular security reviews and audits. Audit and ISAE3402... ...for risk and compliance tasks, including SAST/GRC and authorization clean-up, as well...Permanent employmentLocal area
- ...America, Europe and Asia, delivering high end security services to global customers. The... ...technical design, workshops and architecture reviews. Mentor juniors, train the trainer.... ...lifecycle awareness Infrastructure-as-Code awareness (even if not writing it)....Remote job
- ...Like In This Role Develops and executes security controls, defenses and counter measures to... .... Familiarity with Detection-as-Code principles, version control (e.g., Git/GitHub... .... If you are a US job seeker unable to review the job opportunities herein, or cannot otherwise...Local area
- ...across the group to identify and handle security incidents, ensuring that relevant security... ...investigated and mitigated. In addition, it reviews the security risks that our organisation... ...developing security tools and open source projects Attention to detail and great...Hybrid workRelocation packageWork at officeWorldwideFlexible hours
