Jobs
Interviews

7 Attack Vectors Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 - 9.0 years

16 - 20 Lacs

mumbai, mumbai suburban, mumbai (all areas)

Work from Office

Monitor,analyze security events,alerts across various platforms. Investigate potential security incidents,escalate as appropriate,following defined incident response processes. Correlate events from multiple sources to identify patterns or anomalies Required Candidate profile Lead,participate in threat hunting activities to proactively identify potential threats vulnerabilities Serve as the administrator for SOC tools including SIEM, EDR, SOAR,threat intelligence platforms Perks and benefits To be disclosed post interview

Posted 4 days ago

Apply

4.0 - 8.0 years

0 Lacs

hyderabad, telangana

On-site

As a Penetration Tester, you will be responsible for conducting and coordinating comprehensive Attack Surface Discovery, Penetration tests, and Cloud on system and network levels using advanced ethical hacking techniques. Your role will involve Application Penetration Testing (Browser-based, API, Mobile, IoT), Threat Modeling, and Source Code Review. You will perform penetration testing on web applications and APIs to identify, assess, and report vulnerabilities. Additionally, you will conduct red team exercises to identify weaknesses in clients" infrastructure and provide remediation solutions. You will be required to organize and deliver technical security operational briefings for both technical and non-technical audiences. Setting scope, objectives, and timelines for penetration testing engagements, leveraging data to create useful metrics, and performing dynamic application security testing (DAST) scans are also part of your responsibilities. Furthermore, you will play a critical role in building an AppSec program with a wide scope and impact by researching open-source emerging technologies and developing required frameworks for red team exercises. To qualify for this role, you should have a Bachelor's degree in Engineering or a closely related field with certifications like OSCP, CEH, OSCE, OSWE, GPEN, GCIH, GWAPT, or GXPN being desirable. A total of 4+ years of experience is required, along with knowledge and experience in offensive security certifications, secure development life cycle, common vulnerabilities, application attack vectors, security testing processes, and network security protocols. You should have familiarity with common threat tactics and tools such as Nmap, Metasploit, Kali Linux, Burp Suite Pro, CobaltStrike, App Detective, and Web Inspect. Experience in cloud service penetration testing, mobile platform penetration testing, and microservices testing will be beneficial. Additionally, you should possess the ability to find and exploit bugs in various programming languages and cloud platforms. Personal attributes required for this role include being a self-starter, quick learner, excellent analytical and communication skills, self-motivated, detail-oriented, and able to effectively prioritize tasks in a high-pressure environment. Strong interpersonal skills to collaborate cross-functionally across the organization are essential. This is a full-time contractual/temporary position with a duration of 6 months, requiring work to be conducted in person at the Hyderabad location. If you meet the qualifications and are interested in this opportunity, please contact the employer at +91 9966773665.,

Posted 1 week ago

Apply

1.0 - 5.0 years

0 Lacs

karnataka

On-site

We are seeking a Cyber Threat Intelligence Analyst to join our team. As a Cyber Threat Intelligence Analyst, you will be responsible for analyzing, detecting, and communicating cyber threats. Your role will involve collaborating with various teams such as incident responders, SIEM engineering teams, vulnerability management, and more. You should have at least 1 year of experience in security research and a functional understanding of common threat analysis models. Your main responsibilities will include maintaining awareness of the cyber threat landscape, providing updates to leadership and InfoSec teams, completing alert tickets, and various types of monitoring. You will be involved in activities such as brand protection, VIP protection, found credentials, sanctions monitoring, subscription reselling, and fraudulent applications. Your feedback on processes will be crucial for enhancing and improving maturity levels. Additionally, you will be responsible for producing threat intelligence products, reports, and intelligence briefings for NewsCorp's tactical and strategic stakeholders. You will need to establish and apply a threat modeling methodology to identify, classify, prioritize, and report cyber threats using a structured approach. Collaboration with peer teams and maintaining intelligence gathering practices across various sources will also be part of your role. To qualify for this position, you should have at least 1 year of experience in security research, excellent writing and critical thinking skills, and a functional understanding of common threat analysis models. Experience in Information Security, Threat Intelligence tools, and Management platforms is required. Strong knowledge of attack vectors, tactics, techniques, and procedures employed by cyber threat actors is essential. The ability to effectively communicate complex technical information to both technical and non-technical audiences is a must. Preferred qualifications for this role include security certifications such as CTIA, GCTI, GCIH, GDAT, OSCP, CHFI, and CEH. Desired qualifications include excellent communication skills, experience working in a large enterprise environment, strong analytical skills, ability to work independently and collaboratively, and the capacity to handle confidential material professionally. If you are looking for a challenging role in Cyber Threat Intelligence and possess the required qualifications and skills, we encourage you to apply for this position. Join us at NTS Technology Services Pvt. Ltd. to be a part of our dynamic team at NewsCorp.,

Posted 3 weeks ago

Apply

2.0 - 5.0 years

0 Lacs

Bengaluru, Karnataka, India

Remote

Job Description Where youll work: India (Remote) / Bangalore Security at GoTo At GoTo, security is at the core of empowering businesses in a &aposwork anywhere, secure everywhere' world. By embedding security and privacy into our processes by design and by default, we prioritize safeguarding business assets, customer data, and employee informationwithout compromising usability. In an Incident Response role, our focus is on enabling rapid threat detection, effective mitigation, and maintaining organizational resilience in an ever-evolving threat landscape. Your Day to Day Serve as a frontline team member in a fast-paced security environment by actively monitoring security alerts, analyzing dashboards, and triaging incoming security reports. Analyze logs from various systems (firewalls, servers, endpoints, etc.) to detect unusual patterns, and escalate confirmed or complex incidents to senior analysts. Accurately document all actions taken, observations made, and conclusions drawn during investigations within the incident management system. Collaborate with senior team members by providing support during critical incident investigations. Provide feedback and insights to evaluate the effectiveness of existing controls and identify potential new threat vectors. Stay informed on emerging threats, vulnerabilities, and attack patterns to strengthen monitoring capabilities. Participate in lessons-learned reviews from true-positive incidents, identifying security gaps or areas for improvement, and share findings with senior analysts to enhance operational processes. Assist senior analysts with projects aimed at improving the effectiveness, efficiency, and overall performance of SOC tools, workflows, and procedures. What We Are Looking For 2 to 5 years of relevant experience in the Information Security domain. Solid foundation in networking fundamentals, with a deep understanding of TCP/IP and other core protocols. Solid foundation in core Cloud Security domains with a good understanding of Cloud Security best Practices. Good knowledge on Identity Domains including, Active Directory/Entra ID and Cloud IAM services. Experience working on enterprise intrusion analysis, SIEM, and incident response. Understanding of Windows and Linux operating systems, and command-line tools. Basic Knowledge of Forensics methods and tools for investigations. Expertise in analyzing logs from various security devices and web servers to detect patterns and anomalies. Also, experience doing packet captures and interpreting network traffic (e.g., tcpdump, Wireshark). Knowledge of attack vectors, threat tactics, kill chain, and attacker techniques is a plus. Interpersonal skills sufficient to work with both technical and non-technical personnel at various levels in the organization. Ability to elicit and communicate technical and non-technical information clearly and concisely. An open mind, willingness to be challenged, and strong desire to learn. Should be flexible to work during different shifts and possibly weekends. What We Offer At GoTo, we believe in supporting our employees with a comprehensive range of benefits designed to fit your lifeat work and beyond. Here are just some of the benefits and perks you can expect when you join our team: Comprehensive health benefits, life and disability insurance, and fertility and family-forming support program Generous paid time off, paid holidays, volunteer time off, and quarterly self-care days and no meeting days Tuition and reading reimbursement programs to support your continuous learning and professional growth Thrive Global Wellness Program, confidential Employee Assistance Program (EAP), as well as One to One Wellness Coaching Employee programsincluding Employee Resource Groups (ERGs), GoTo Gives, and our charitable matching programto amplify your connection and impact Registered Retirement Savings Plan (RRSP) to help you plan for your future GoTo performance bonus program to celebrate your impact and contributions Monthly remote work stipend to support your home office expenses At GoTo, youll find the flexibility, resources, and support you need to thriveat work, at home, and everywhere in between. Youll work towards a shared goal with an open-minded, cohesive team thats greater than the sum of its parts. Were committed to creating an inclusive space for everyone, because we know unique perspectives make us a stronger company and community. Join us and be part of a company that invests in your future, where together well Be Real, Think Big, Move Fast, Keep Growing, and stay Customer Obsessed .Learn more. Show more Show less

Posted 3 weeks ago

Apply

0.0 - 4.0 years

0 Lacs

hyderabad, telangana

On-site

We are seeking Analyst-Cyber Security candidates with the highest level of technical expertise in information security. The ideal candidate should have a deep familiarity with relevant penetration and intrusion techniques, as well as attack vectors. Good communication skills are also a must for this role. Qualification: - UG: Any Graduate - Any Specialization Desired Candidate Profile: - Highest level of technical expertise in information security - Deep familiarity with penetration and intrusion techniques and attack vectors - Good communication skills Salary: Not Disclosed by Recruiter Industry: Education / Teaching / Training Functional Area: Analyst-Cyber Security Year of passing: 2021 - 2023 Job Location: Hyderabad Qualified candidates are encouraged to submit their updated resumes to resumes@wingherry.com,

Posted 3 weeks ago

Apply

6.0 - 8.0 years

13 - 17 Lacs

Gurugram, Delhi / NCR

Hybrid

Role & responsibilities: 1. Provides Monitoring and Analysis support of Cybersecurity events Identify and detect security threats Perform initial triage Report security events, in accordance with established processes and procedures Perform threat analysis, risk analysis, security assessments, and vulnerability testing Anticipate threats and alerts to avoid their occurrence Understanding of possible attack activities such as network probing/ scanning, DDOS, malicious code activity, etc. 2. Investigate, analyze, and contain malware incidents Includes performing computer forensic investigations 3. Understanding of common malware types and behaviors and common infection vectors Ability to identify attacker Tactics, Techniques, and procedures (TTPs) Experience with IoC lifecycle (development, organization, sharing, effective usage) 4. Will be responsible for: Developing alerting, reporting, and automated detection solutions Authoring rules and creating new ML features 5. Strong experience in leveraging Next gen SIEM with SOAR/XDR capabilities to detect & investigate the cyber security incident and reporting in defined template. 6. SIEM solution management and maintenance: Ensure health of underlying architecture Create ruleset and alerts to cover the current threat landscape Remediate alerts generated by the system Manage vendor relationship with OEM 7. Security Log Analysis Monitor and analyze the logs from various security tools e.g. SIEM, EDR, DLP, AV etc. and manually correlate system analyzed events 8. Practical/Working experience with tools like EDR, DLP, Zero Trust, Threat intel software, IPS/IDS, Email Security tools 9. Collaborate with various IT groups to collaborate for analysis, troubleshooting, and ensure that their requirements and new initiatives adhere to information security policies and best practices 10. Responding to escalations to resolve detection effectiveness issues (misclassified spam/phish and false positives) Design and develop novel threat detection techniques or methodologies from creating proof-of-concept to productizing the solution. 11. Perform device reviews to ensure compliance with hardening standards, access controls and security related configuration settings 12. Prepare and update security documentation including security procedures, standards, notifications, and alerts in support of other teams within the EgonZehnder Security department. 13. Proactively hunting threats, blue teaming, performing exploit and vulnerability research, all in order to find and a gap that can be exploited by bad actors Preferred candidate profile: 1. Prior work experience in SOC 2. Should be able to conduct advanced forensics including packet captures using tools such as Wireshark, Netmon etc. 3. Knowledge and experience of configuration and operation of SIEM Solutions 4. Expert knowledge of configuration and operation of Security Solutions including, Firewalls, IDS, Internet Filters, DLP, Vulnerability Scanners, Anti Malware Solutions, etc. 5. A basic understanding of Linux and Windows operating systems and OS event logging 6. Strong analytical and problem-solving skills 7. Excellent communication skills both verbal and written 8. Experience in evaluating and implementing new tools, and solutions by working directly with the vendor Relevant Professional Qualifications (Preferred) Certified Ethical Hacker (CEH) Global Information Assurance Certifications (GIAC) e.g. Certified Incident Handler (GCIH), Certified Intrusion Analyst (GCIA), Certified Enterprise Defender (GCED) Benefits: Benefits which make us unique At EZ, we know that great people are what makes a great firm. We value our people and offer employees a comprehensive benefits package. Learn more about what working at Egon Zehnder can mean for you! Benefits Highlights: 5 Days working in a Fast-paced work environment Work directly with the senior management team Reward and Recognition Employee friendly policies Personal development and training Health Benefits, Accident Insurance Potential Growth for you! We will nurture your talent in an inclusive culture that values diversity. You will be doing regular catchups with your Manager who will act as your career coach and guide you in your career goals and aspirations.

Posted 2 months ago

Apply

4.0 - 8.0 years

12 - 16 Lacs

Mumbai, Mumbai Suburban, Mumbai (All Areas)

Work from Office

Monitor,analyze security events,alerts across various platforms. Investigate potential security incidents,escalate as appropriate,following defined incident response processes. Correlate events from multiple sources to identify patterns or anomalies Required Candidate profile Lead,participate in threat hunting activities to proactively identify potential threats vulnerabilities Serve as the administrator for SOC tools including SIEM, EDR, SOAR,threat intelligence platforms Perks and benefits To be disclosed post interview

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies