- Expertini Resume Scoring: Our Semantic Matching Algorithm evaluates your CV/Résumé before you apply for this job role: Engineer Vulnerability Assessment & Penetration Testing.
Urgent! Engineer - Vulnerability Assessment & Penetration Testing Job Opening In India, India – Now Hiring C3iHub
an IT/OT Vulnerability Assessment and Penetration Testing (VAPT) Engineer, you will be engaged in identifying and mitigating security vulnerabilities across IT systems, Industrial Control Systems (ICS), and Industrial Internet of Things (IIoT) environments.
Your work will involve rigorous security assessments of critical infrastructure, SCADA systems, PLCs, field devices, gateways, and cloud-connected IIoT platforms.
You will simulate advanced adversary tactics to expose vulnerabilities and provide strategic remediation guidance.
The role is suited for professionals with a deep understanding of both enterprise IT security and industrial/embedded system Assessment & Penetration Testing (IT + Perform black-box, grey-box, and white-box VAPT on enterprise IT assets (servers, databases, web/mobile apps, Active Directory, cloud), OT/ICS assets (PLCs, RTUs, HMIs, engineering workstations, protocol gateways), and IIoT platforms (MQTT/CoAP-based telemetry, edge gateways, cloud dashboards).</p><p><br/></p><p>- Emulate APT-level attacks across air-gapped, segmented, or hybrid IT-OT architectures.</p><p><br/></p><p>- Execute Red Team scenarios to simulate insider threats or supply chain compromise.</p><br/><p><b>ICS Protocol & Field Device Security Testing:</b></p><p><b><br/></b></p><p>- Analyze and exploit vulnerabilities in ICS protocols (Modbus TCP, DNP3, IEC 104, OPC-UA, S7comm, Profinet, BACnet, CIP, MQTT, CoAP).</p><p><br/></p><p>- Perform live traffic analysis, packet manipulation, and protocol fuzzing to test resilience.</p><p><br/></p><p>- Evaluate control logic vulnerabilities in ladder logic, structured text, and function blocks.</p><br/><p><b>Firmware & Hardware Exploitation (IIoT/ICS Devices):</b></p><p><b><br/></b></p><p>- Extract and analyze firmware using JTAG, UART, SPI.</p><p><br/></p><p>- Perform static/dynamic analysis with Ghidra, Binwalk, Radare2, IDA Pro.</p><p><br/></p><p>- Reverse engineer file systems (squashfs, cramfs), analyze backdoors, insecure bootloaders.</p><br/><p><b>Network Architecture & Segmentation Testing:</b></p><p><b><br/></b></p><p>- Review and test IT-OT segmentation, DMZ, firewall ACLs, VLANs.</p><p><br/></p><p>- Assess trust relationships, insecure remote access, weak credentials, bridging of air-gapped networks.</p><br/><p><b>Cloud & IIoT Platform Security:</b></p><p><b><br/></b></p><p>- Evaluate MQTT brokers, edge-to-cloud telemetry, and analytics pipelines.</p><p><br/></p><p>- Test REST APIs, cloud misconfigurations, insecure mobile app integrations.</p><p><br/></p><p>- Identify insecure certificate handling, weak encryption, default API tokens.</p><br/><p><b>Reporting & Develop technical and executive-level reports with CVSS scoring, attack paths, exploitation evidence.</p><p><br/></p><p>- Recommend hardening measures for IT and OT systems.</p><p><br/></p><p>- Coordinate with ICS engineers, IT admins, SOC teams for patch validation and monitoring upgrades.</p><br/><p><b>Compliance & Framework Ensure assessments comply with industry standards: NIST SP 800-82, ISA/IEC 62443, ISO 27001, NERC CIP.</p><p><br/></p><p>- Map findings to MITRE ATT&CK for ICS and track new CVEs in industrial Background:</b></p><p><br/></p><p>- Bachelors or Masters in Cybersecurity, Computer Science, Industrial Automation, Electronics, or related field.</p><br/><p><b>Technical Skills:</b></p><p><br/></p><p>- Deep knowledge of ICS/SCADA systems, embedded architectures, and real-time OS (VxWorks, QNX, FreeRTOS).</p><p><br/></p><p>- Hands-on with VAPT tools (Nessus, Burp Suite, Metasploit, Nmap, SQLMap, etc.), ICS tools (Wireshark, PLCScan, ICSFuzz, S7comm Tools, etc.), Firmware tools (Binwalk, Ghidra, Radare2), IIoT security (Shodan, MQTTX, Postman, OWASP ZAP).</p><br/><p><b>Desired (Preferred):</b></p><p><br/></p><p>- OSCP, GRID, GICSP, CRT, CRTP, CEH, CISSP.</p><p><br/></p><p>- Participation in ICS/IoT CTFs or open-source contributions is a and when required, across the country for project execution and monitoring, as well as for coordination with geographically distributed a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph.</p><br/></p> (ref:hirist.tech)
✨ Smart • Intelligent • Private • Secure
Practice for Any Interview Q&A (AI Enabled)
Predict interview Q&A (AI Supported)
Mock interview trainer (AI Supported)
Ace behavioral interviews (AI Powered)
Record interview questions (Confidential)
Master your interviews
Track your answers (Confidential)
Schedule your applications (Confidential)
Create perfect cover letters (AI Supported)
Analyze your resume (NLP Supported)
ATS compatibility check (AI Supported)
Optimize your applications (AI Supported)
O*NET Supported
O*NET Supported
O*NET Supported
O*NET Supported
O*NET Supported
European Union Recommended
Institution Recommended
Institution Recommended
Researcher Recommended
IT Savvy Recommended
Trades Recommended
O*NET Supported
Artist Recommended
Researchers Recommended
Create your account
Access your account
Create your professional profile
Preview your profile
Your saved opportunities
Reviews you've given
Companies you follow
Discover employers
O*NET Supported
Common questions answered
Help for job seekers
How matching works
Customized job suggestions
Fast application process
Manage alert settings
Understanding alerts
How we match resumes
Professional branding guide
Increase your visibility
Get verified status
Learn about our AI
How ATS ranks you
AI-powered matching
Join thousands of professionals who've advanced their careers with our platform
Unlock Your Engineer Vulnerability Potential: Insight & Career Growth Guide
Real-time Engineer Vulnerability Jobs Trends in India, India (Graphical Representation)
Explore profound insights with Expertini's real-time, in-depth analysis, showcased through the graph below. This graph displays the job market trends for Engineer Vulnerability in India, India using a bar chart to represent the number of jobs available and a trend line to illustrate the trend over time. Specifically, the graph shows 552002 jobs in India and 37468 jobs in India. This comprehensive analysis highlights market share and opportunities for professionals in Engineer Vulnerability roles. These dynamic trends provide a better understanding of the job market landscape in these regions.
Great news! C3iHub is currently hiring and seeking a Engineer Vulnerability Assessment & Penetration Testing to join their team. Feel free to download the job details.
Wait no longer! Are you also interested in exploring similar jobs? Search now: Engineer Vulnerability Assessment & Penetration Testing Jobs India.
An organization's rules and standards set how people should be treated in the office and how different situations should be handled. The work culture at C3iHub adheres to the cultural norms as outlined by Expertini.
The fundamental ethical values are:The average salary range for a Engineer Vulnerability Assessment & Penetration Testing Jobs India varies, but the pay scale is rated "Standard" in India. Salary levels may vary depending on your industry, experience, and skills. It's essential to research and negotiate effectively. We advise reading the full job specification before proceeding with the application to understand the salary package.
Key qualifications for Engineer Vulnerability Assessment & Penetration Testing typically include Computer Occupations and a list of qualifications and expertise as mentioned in the job specification. Be sure to check the specific job listing for detailed requirements and qualifications.
To improve your chances of getting hired for Engineer Vulnerability Assessment & Penetration Testing, consider enhancing your skills. Check your CV/Résumé Score with our free Resume Scoring Tool. We have an in-built Resume Scoring tool that gives you the matching score for each job based on your CV/Résumé once it is uploaded. This can help you align your CV/Résumé according to the job requirements and enhance your skills if needed.
Here are some tips to help you prepare for and ace your job interview:
Before the Interview:To prepare for your Engineer Vulnerability Assessment & Penetration Testing interview at C3iHub, research the company, understand the job requirements, and practice common interview questions.
Highlight your leadership skills, achievements, and strategic thinking abilities. Be prepared to discuss your experience with HR, including your approach to meeting targets as a team player. Additionally, review the C3iHub's products or services and be prepared to discuss how you can contribute to their success.
By following these tips, you can increase your chances of making a positive impression and landing the job!
Setting up job alerts for Engineer Vulnerability Assessment & Penetration Testing is easy with India Jobs Expertini. Simply visit our job alerts page here, enter your preferred job title and location, and choose how often you want to receive notifications. You'll get the latest job openings sent directly to your email for FREE!