2+ Vulnerability assessment Jobs in Delhi, NCR and Gurgaon | Vulnerability assessment Job openings in Delhi, NCR and Gurgaon
Apply to 2+ Vulnerability assessment Jobs in Delhi, NCR and Gurgaon on CutShort.io. Explore the latest Vulnerability assessment Job opportunities across top companies like Google, Amazon & Adobe.

CLOUDSUFI is seeking a Information Security Lead overseeing the organization's information security framework, ensuring the confidentiality, integrity, and availability of all data. This role involves developing and implementing security policies, managing risk assessments, and addressing compliance requirements. The Infosec Lead will also lead incident response efforts, conduct regular security audits, and collaborate with cross-functional teams to mitigate vulnerabilities. Strong expertise in cybersecurity tools, frameworks, and best practices is essential for this role.
Roles & Responsibilities
➢ Work independently with vendors and collaborate with colleagues.
➢ Experience negotiating remediation timelines and/or remediating found issues independently.
➢ Ability to implement vendor platforms within CI/CD pipelines.
➢ Experience managing/responding to incidents, collecting evidence, and making decisions.
➢ Work with vendors and internal teams to deploy criteria within WAF and finetune configurations based on application needs.
➢ Multitasking and maintaining a high level of concentration on assigned projects.
Strong working knowledge of AWS security in general and familiarity with AWS native security tools.
➢ Promote security within the organization despite roadblocks, demonstrating resilience and persistence.
➢ Define and integrate DevSecOps security requirements in projects. ➢ Articulate security requirements during architecture meetings while collaborating with application and DevOps teams.
➢ Hands-on experience with various security tools and techniques, including:
➢ Trivy, Prowler, Port53, Snyk for container and application security.
➢ Kali Discovery and vulnerability scanning for penetration testing and threat assessment.
➢ Network and website penetration testing (PT) to identify and remediate security vulnerabilities.
➢ SAST and DAST tools for static and dynamic application security testing.
➢ API security testing
➢ Web/Mobile App SAST and DAST
Certification
➢ AWS Security /CISSP /CISM (Certified Information Security Manager)