We are seeking a talented and driven Full Stack Developer to join our dynamic and collaborative team. This role requires proficiency in both front end and back end development, with the ability to design, build, and maintain scalable web applications from concept through deployment. The ideal candidate thrives in a fast paced environment, is passionate about coding, and is eager to continuously learn and innovate. Develop responsive and engaging front-end interfaces using modern web technologies (e.g., HTML5, CSS3, JavaScript, React, Angular, or Vue.js). Architect and implement scalable and secure back end services and APIs using Node.js, Express.js, Django, Flask, or similar frameworks. Seamlessly integrate front-end and back-end components to deliver cohesive user experiences. Design, maintain, and optimize relational and non-relational databases (e.g., MySQL, PostgreSQL, MongoDB). Write clean, maintainable, and well-documented code that adheres to best practices. Collaborate closely with UI/UX designers, product managers, and QA teams to deliver high quality features. Ensure cross platform compatibility, performance, and responsiveness of web applications. Participate in code reviews, unit testing, and technical documentation processes. Keep up with industry trends and emerging technologies to continuously improve the development process. Bachelors degree in Computer Science, Engineering, or a related field or equivalent hands on experience. Proficient in front end technologies: HTML5, CSS3, JavaScript, and modern frameworks like React.js, Angular, or Vue.js. Solid experience with back end frameworks: Node.js, Express.js, Django, Flask, or similar. Strong understanding of RESTful APIs, GraphQL, and third party integrations. Experience working with databases such as MySQL, PostgreSQL, MongoDB, or equivalent. Proficient with version control systems, particularly Git (GitHub or GitLab). Experience working in agile development environments and cross functional teams.
We are seeking Desktop Support Engineers to provide technical assistance, troubleshooting, and end-user support The role involves managing hardware, software, and network-related issues for desktops, laptops, and associated systems The ideal candidate should possess strong problem-solving abilities, excellent communication skills, and experience supporting enterprise IT infrastructure particularly in endpoint management - Perform advanced Linux system administration, including user and permission management, shell scripting, package management, and log analysis - Manage user accounts, access controls, and permissions in Active Directory and other enterprise IT systems - Implement and manage Group Policies and Role-Based Access Control (RBAC) for secure and efficient user access - Conduct system hardening and ensure compliance with Security Technical Implementation Guides (STIGs) and other security benchmarks - Troubleshoot issues related to application installations, system configurations, hardening, and OS-level restrictions - Handle configuration management, vulnerability patching, and timely deployment of system updates - Diagnose and resolve network issues, including wired/wireless connectivity, IP/DNS conflicts, DHCP errors, VPN access, and firewall/proxy-related restrictions - Bachelor s degree in Information Technology, Computer Science, or a related field - 2 - 4 years of experience in desktop or IT support roles - Proficiency in Linux/Unix and Windows administration - Hands-on experience with troubleshooting hardware/software issues and network connectivity - Good understanding of Active Directory, Group Policy, RBAC, and IT security practices - Familiarity with automation tools and configuration management processes
Description We are seeking an experienced and knowledgeable Cybersecurity Instructor to join our team The successful candidate will be responsible for developing, coordinating, and delivering comprehensive training programs on cybersecurity topics to various audiences, including IT professionals, employees, and clients The trainer will also stay updated with the latest cybersecurity trends, tools, and best practices to ensure that training content remains current and effective, Responsibilities Training Program Development: Design, develop, and update cybersecurity training programs, materials, and documentation, Create engaging and interactive training modules, including hands-on labs, simulations, and e-learning content, Stay up-to-date with the latest cybersecurity trends, threats, tools, and best practices, Serve as a subject matter expert on cybersecurity topics within the organization, Participate in continuous professional development and industry certifications, Training Delivery: Conduct training sessions for diverse audiences, including in-person, virtual, and hybrid formats, Customize training content to meet the specific needs and skill levels of different groups, Assessment and Evaluation: Develop and administer assessments to evaluate the effectiveness of training programs and participant learning outcomes, Collect and analyze feedback to continuously improve training materials and delivery methods, Eligibility Masters degree in information technology, Cybersecurity, Computer Science, or a related field A PhD is a plus, Relevant industry certifications will be desirable, Minimum of 3 years of experience in cybersecurity, with at least 2 years in a training or instructional role, Desired Eligibility Passion for education and training, High level of integrity and professionalism, Ability to adapt to a dynamic and fast-paced environment, Commitment to continuous learning and development, Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams, Communication Submit a cover letter summarizing your experience in relevant technologies and software along with a resume and the Latest passport-size photograph,
Lead Vulnerability Assessments:-Oversee and guide comprehensive vulnerability assessments on internal and external systems, networks, and applications -Review, refine, and approve testing methodologies and tool usage for consistency and accuracy Direct Penetration Testing Efforts:-Plan, coordinate, and execute complex penetration tests across IT infrastructure, applications, mobile platforms, and network components -Lead simulation of advanced cyber-attacks to validate security controls and identify exploitable weaknesses Analyze, Review & Report:-Ensure thorough analysis of findings, highlighting business risk impact alongside technical details -Deliver executive-level briefings as well as detailed technical reports with prioritized, actionable recommendations Team Leadership & Collaboration:-Mentor junior engineers, provide training, and foster a knowledge-sharing culture within the security team -Collaborate with development, operations, and compliance teams to drive remediation efforts and monitor progress Process & Documentation Management-Maintain and improve VAPT documentation, methodologies, and reporting templates -Introduce process improvements to increase efficiency, accuracy, and coverage in testing Continuous Security Advancement-Stay ahead of emerging threats, advanced exploitation techniques, and evolving security tools -Evaluate and integrate new tools and frameworks into the VAPT process for greater effectiveness Educational Background:-Bachelor s or Master s degree in Computer Science, Information Technology, Cybersecurity, or related field Technical Skills:-Strong command of network protocols, operating systems, and web/mobile technologies -Proficiency in leading security testing tools: Nessus, Nmap, Burp Suite, Metasploit, and others -Solid knowledge of IT security standards/frameworks (OWASP, NIST, SANS Top 25) and advanced exploitation techniques -Hands-on experience with manual penetration testing, complex scenario simulation, and advanced vulnerability exploitation Experience: 7+ years of relevant experience in VAPT, including at least 2 years in a leadership or senior technical role
We are seeking a highly motivated Blockchain Researcher to explore, analyze, and develop innovative solutions in blockchain technology The role involves conducting advanced research, publishing findings, building prototypes, and supporting the organization in leveraging blockchain for practical applications Conduct research on emerging areas of blockchain, distributed ledger technologies, and decentralized applications Design and prototype blockchain-based solutions in areas such as security, identity, supply chain (including agriculture and agri-tech traceability), and digital trust Collaborate with faculty, research staff, and industry partners to publish high-quality research papers and technical reports Evaluate blockchain protocols for performance, scalability, interoperability, and security Explore integration of blockchain with adjacent technologies (SSI, ZKP, Cybersecurity, AI/ML, etc ) Contribute to open-source blockchain frameworks and research tools Assist in mentoring interns and junior developers working on blockchain-related projects Bachelor s/Master s/PhD in Computer Science or related fields Strong understanding of blockchain fundamentals: consensus algorithms, smart contracts, cryptographic primitives Experience with blockchain platforms (Ethereum, Hyperledger, Polkadot, Cosmos, Bitcoin, etc ) Proficiency in programming languages such as Solidity, Go, Rust, or Python Familiarity with cryptography, distributed systems, and cybersecurity
Description As an IT/OT Vulnerability Assessment and Penetration Testing (VAPT) Engineer, you will be engaged in identifying and mitigating security vulnerabilities across IT systems, Industrial Control Systems (ICS), and Industrial Internet of Things (IIoT) environments Your work will involve rigorous security assessments of critical infrastructure, SCADA systems, PLCs, field devices, gateways, and cloud-connected IIoT platforms You will simulate advanced adversary tactics to expose vulnerabilities and provide strategic remediation guidance The role is suited for professionals with a deep understanding of both enterprise IT security and industrial/embedded system ecosystems, Responsibilities Vulnerability Assessment & Penetration Testing (IT + ICS/IIoT): Perform black-box, grey-box, and white-box VAPT on enterprise IT assets (servers, databases, web/mobile apps, Active Directory, cloud), OT/ICS assets (PLCs, RTUs, HMIs, engineering workstations, protocol gateways), and IIoT platforms (MQTT/CoAP-based telemetry, edge gateways, cloud dashboards), Emulate APT-level attacks across air-gapped, segmented, or hybrid IT-OT architectures, Execute Red Team scenarios to simulate insider threats or supply chain compromise, ICS Protocol & Field Device Security Testing: Analyze and exploit vulnerabilities in ICS protocols (Modbus TCP, DNP3, IEC 104, OPC-UA, S7comm, Profinet, BACnet, CIP, MQTT, CoAP), Perform live traffic analysis, packet manipulation, and protocol fuzzing to test resilience, Evaluate control logic vulnerabilities in ladder logic, structured text, and function blocks, Firmware & Hardware Exploitation (IIoT/ICS Devices): Extract and analyze firmware using JTAG, UART, SPI, Perform static/dynamic analysis with Ghidra, Binwalk, Radare2, IDA Pro, Reverse engineer file systems (squashfs, cramfs), analyze backdoors, insecure bootloaders, Network Architecture & Segmentation Testing: Review and test IT-OT segmentation, DMZ, firewall ACLs, VLANs, Assess trust relationships, insecure remote access, weak credentials, bridging of air-gapped networks, Cloud & IIoT Platform Security: Evaluate MQTT brokers, edge-to-cloud telemetry, and analytics pipelines, Test REST APIs, cloud misconfigurations, insecure mobile app integrations, Identify insecure certificate handling, weak encryption, default API tokens, Reporting & Mitigation: Develop technical and executive-level reports with CVSS scoring, attack paths, exploitation evidence, Recommend hardening measures for IT and OT systems, Coordinate with ICS engineers, IT admins, SOC teams for patch validation and monitoring upgrades, Compliance & Framework Alignment: Ensure assessments comply with industry standards: NIST SP 800-82, ISA/IEC 62443, ISO 27001, NERC CIP, Map findings to MITRE ATT&CK for ICS and track new CVEs in industrial products, Eligibility: Educational Background: Bachelors or Masters in Cybersecurity, Computer Science, Industrial Automation, Electronics, or related field, Technical Skills: Deep knowledge of ICS/SCADA systems, embedded architectures, and real-time OS (VxWorks, QNX, FreeRTOS), Hands-on with VAPT tools (Nessus, Burp Suite, Metasploit, Nmap, SQLMap, etc ), ICS tools (Wireshark, PLCScan, ICSFuzz, S7comm Tools, etc ), Firmware tools (Binwalk, Ghidra, Radare2), IIoT security (Shodan, MQTTX, Postman, OWASP ZAP), Desired Eligibility: Certifications (Preferred): OSCP, GRID, GICSP, CRT, CRTP, CEH, CISSP, Participation in ICS/IoT CTFs or open-source contributions is a plus, Travel: As and when required, across the country for project execution and monitoring, as well as for coordination with geographically distributed teams, Communication: Submit a cover letter summarising your experience in relevant technologies and software, along with a resume and the Latest passport-size photograph, Show more Show less
As a Senior Cybersecurity Engineer, you will play a pivotal role in securing our web-based platforms, ensuring they are protected from evolving threats You ll lead the response to security incidents, perform threat analysis, and manage the development and implementation of cyber ranges for simulation and training Additionally, you will guide the secure development of our platforms like LMS and hackathon environments to ensure they are resilient against cyber threats Incident Response & Threat Analysis:- Lead and manage security incidents from identification through resolution, ensuringtimely responses and minimizing damage - Perform deep threat analysis to identify and assess current and emerging threats toweb platforms and infrastructure - Develop and maintain incident response protocols for web platforms, integratinglessons learned into future strategies Cyber Range Development & Simulation:- Design, develop, and maintain cyber ranges for testing security measures andtraining teams - Simulate real-world cyberattacks to identify weaknesses and improve incidentresponse capabilities - Collaborate with internal teams to create realistic attack scenarios that enhanceplatform defense mechanisms Platform Security Leadership:- Oversee the security architecture and development of innovative platforms such asLearning Management Systems (LMS) and hackathon tools - Ensure secure coding practices and integrate security into the platform developmentlifecycle - Lead the implementation of security features such as secure authentication, dataprotection, and vulnerability management Collaboration & Training:- Work closely with development teams to integrate security best practices in platformdesign and deployment - Educate internal teams on security threats and prevention strategies, fostering asecurity-aware culture Proactive Threat Prevention:- Continuously monitor threat intelligence sources to stay ahead of potential cyberthreats - Implement advanced security tools and frameworks for proactive detection andprevention of cyber incidents - 5-10 years of experience in cybersecurity, with a focus on incident response, threatanalysis, and web platform security - Strong expertise in securing web applications, including LMS, hackathon platforms, andother custom-built solutions - Hands-on experience with cyber range development and simulated threat scenarios fortraining and testing purposes - Experience in designing and implementing security protocols for incident response,monitoring, and mitigation - Deep understanding of cybersecurity concepts, including threat modeling, risk management,and vulnerability assessments.
Description We are seeking an experienced Program Manager in Cybersecurity to lead and manage a cross-functional team engaged in the design, development, and operations of: Learning Management Systems (LMS) Hackathon & Innovation Platforms Cyber Ranges for Industry Training & Simulation Security Operations Center (SoC) Functions particularly in Threat Intelligence The candidate will be responsible for driving strategic initiatives, managing end-to-end program lifecycles, ensuring on-time delivery, and aligning projects with organizational goals, Responsibilities Lead, mentor, and manage a team of engineers, developers, and cybersecurity professionals, Plan, design, and oversee the deployment of LMS, hackathon platforms, and cyber ranges, Collaborate with stakeholders to define program objectives, success metrics, and roadmaps, Drive integration of cybersecurity best practices into platform development, Manage timelines, budgets, resources, and risks across multiple concurrent projects, Establish governance frameworks, SOPs, and compliance alignment for SoC operations, Act as the primary liaison between technical teams, industry partners, and leadership, Ensure platforms are scalable, secure, and aligned with the latest industry standards, Conduct performance evaluations, resource planning, and continuous improvement initiatives, Eligibility 7-10 years of overall professional experience, with at least 5 years in program/project management in the cybersecurity domain, Proven experience in building and delivering at least one of the following: LMS, Cyber Ranges, SoC operations, hackathon/innovation platforms, or enterprise-scale platforms, Strong understanding of cybersecurity frameworks (NIST, ISO 27001, MITRE ATT&CK, ), Experience managing cross-functional technical teams (developers, cybersecurity engineers, analysts), Excellent stakeholder management, leadership, and communication skills, Strong knowledge of cloud platforms (AWS, Azure, GCP) and DevSecOps practices, Demonstrated ability to handle program budgets, timelines, and KPIs, Desired Eligibility PMP/PRINCE2/CSM certification preferred; CISSP, CISM, or equivalent cybersecurity certifications are a plus, Travel As and when required, across the country for project execution and monitoring, as well as for coordination with geographically distributed teams, Communication Submit a cover letter summarising your experience in relevant technologies and software, along with a resume and the Latest passport-size photograph,
You ll work hands-on with large datasets, cutting-edge frameworks, and MLOps practices to deliver production-grade AI systems - Model Development & Training Design, train, and fine-tune deep learning and machine learning models(transformers, CNNs, RNNs, gradient boosting, etc) Implement data preprocessing pipelines, feature extraction, andaugmentation techniques Conduct hyperparameter optimization and experiment management - Evaluation & Optimization Run model evaluations, benchmark against baselines, and perform ablationstudies Optimize models for accuracy, latency, and resource efficiency (eg, pruning,quantization) Apply error analysis to improve robustness and generalization - Deployment & MLOps Package and deploy models into production using containerization(Docker / Kubernetes) Integrate models into APIs, microservices, or larger platforms Set up monitoring and automated retraining pipelines for live systems - Stay updated with emerging research and frameworks (transformer architectures,foundation models, multimodal learning) - Experiment with adapting state-of-the-art models to practical business problems - Prototype novel approaches and validate them against real datasets - Bachelor s/Master s degree in Computer Science, IT, Mathematics, Statistics, orrelated discipline (or strong practical experience in AI/ML) - 2-3+ years of professional experience in AI/ML engineering or applied data science - Proficiency in Python and ML libraries (NumPy, Pandas, scikit-learn) - Strong expertise in deep learning frameworks: PyTorch (preferred) or TensorFlow - Experience with transformers and pretrained models (Hugging Face ecosystem,BERT, GPT, etc) - Solid understanding of ML fundamentals: optimization, probability, linear algebra,statistics - Hands-on experience with large-scale datasets and distributed training workflows - Knowledge of MLOps tools such as MLflow, Weights & Biases, Docker, or modelregistries - Familiarity with cloud platforms (AWS/GCP/Azure) for training and deployment - Strong debugging, profiling, and performance optimization skills
The ideal candidate will be responsible for ensuring the quality, performance, and reliability of our applications through rigorous testing practices, identifying bugs, and working closely with developers, product managers, and DevOps teams to resolve issues -Design, develop, and execute manual and automated test cases based on product requirements and technical specifications -Perform end-to-end testing across frontend (web/mobile UI) and backend (APIs, services, and databases) -Conduct functional, regression, integration, and system testing to ensure overall product quality -Report, track, and manage bugs using issue tracking tools (eg, JIRA) -Develop and maintain test plans, test scripts, and test data for frontend and backend coverage -Collaborate with cross-functional teams (developers, product managers, DevOps) to ensure quality throughout the SDLC -Participate in daily standups, sprint planning, and retrospectives as part of Agile/Scrum practices -Conduct regression testing before releases and validate CI/CD pipeline test coverage -Analyze test results, perform root cause analysis, and work with development teams to resolve issues quickly -Ensure test coverage, traceability, and documentation compliance for both UI and backend services -Bachelors degree in Computer Science, Engineering, or related field -Minimum 3 years of hands-on experience in QA (manual + automation) across frontend and backend applications -Strong knowledge of QA methodologies, tools, and processes -Experience with web/mobile testing frameworks
Description We are looking for a skilled and proactive ISMS Auditor to join our team, responsible for conducting audits and assessments of our & our clients Information Security Management System (ISMS) The ideal candidate will possess a solid understanding of ISMS frameworks and standards, such as ISO 27001 NIST, and IEC 62443, and demonstrate expertise in evaluating security controls and processes Strong analytical skills, attention to detail, and a commitment to upholding security best practices are essential for this role The successful candidate will play a key role in ensuring the integrity and effectiveness of our information security practices Responsibilities Develop and implement comprehensive audit plans aligned with organisational risk assessments and relevant standards Conduct audits of clients' Information Security Management System (ISMS) based on ISO 27001:2022, NIST, and ISA/IEC 62443 standards to assess compliance and identify areas for continual improvement Conduct independent and objective assessments of the ISMS, evaluating the design, implementation, and effectiveness of information security controls Identify vulnerabilities, control weaknesses, and non-compliance issues through interviews, document reviews, testing procedures, and other established audit methodologies Identify and assess the organisation's information security risks and develop audit reports detailing findings, recommendations, and corrective actions with recommended mitigation measures Stay updated with industry trends, standards, and regulations related to information security through professional development activities and participate in information security continuous improvement initiatives to enhance the effectiveness of the ISMS Collaborate with stakeholders across various departments (IT, HR, Legal, etc) to implement corrective actions effectively Explain audit findings and recommendations to management and relevant parties, ensuring understanding and buy-in for proposed actions Collaborate effectively with diverse client stakeholders to ensure alignment with Information Security Management policies, procedures, guidelines, and processes Responsible for creating ISMS-related Documents / Checklists / Policies / SOPs , conducting ISMS Audits, and driving ISMS-related activities throughout all the locations Review and customise information/cyber security training and awareness materials when needed and conduct training on specific programs for clients as and when required Support the organisation/clients in achieving and maintaining ISO 27001:2022 certification Designed policy framework based on ISO 27001:2022, opening and closing of an audit meeting, and assisted with follow-up audits Review and update ISMS audit methodologies and tools based on emerging threats, best practices, and organisational changes Adhere to strict ethical standards and organizational information security policies when handling sensitive data obtained during the audit process Eligibility A bachelors degree in technology or engineering, Information or Cyber Security, Computer Science, BCA/MCA, or in the case of other fields (a Masters degree in Information/ Cyber Security is typically required) Minimum Practical 2+ yearsexperience in information security, risk management, or IT auditing, of which two years in a role or function related to Information Security Audit Significant experience in ISO 27001/2 standards for consulting, collaboration, implementation & auditing is highly desirable A strong understanding of information security frameworks like ISO 27001, NIST Cybersecurity Framework (CSF), GDPR, CIS, IEC 62443 or similar Experience planning, preparing, and delivering internal and external audits, including Compliance Audits Should have detailed experience and knowledge of Cyber/Information Security Governance, Risk Management, and Compliance Experience with International regulatory compliances with a specific focus on Indian Regulatory Compliances such as DPDPA, CERT-In, NCIIPC, RBI, SEBI, IRDA, SMLDI, etc Knowledge of industry good practices and procedures, Information Security Management tools-methods-techniques-and their applications, ISMS specific documentation structures-hierarchy-and interrelationships, electronic and digital signatures, electronic evidence collection, etc Strong Knowledge of Audit planning, Audit risks, Information Security Process Analysis, information security controls, risk assessment methodologies, vulnerability management principles and Internal Auditing of Information Security Management Systems Desired Eligibility Proficient in MS Office applications such as Microsoft Office Word, Excel, PowerPoint Proficient in presentation skills Proficient in writing clear, concise audit reports with practical communication skills for technical & non-technical audiences Proficiency in using relevant audit tools and technologies Ability to work under pressure, meet deadlines, and maintain a positive attitude Strong interpersonal skills and ability to work independently or in a team Multi-Linguistic Being ethical, open-minded, collaborative, diplomatic, observant, perceptive, versatile, tenacious, decisive, self-reliant, professional, morally courageous, organised Mandatory Professional Certifications and Professional Credits: CQI/IRCA or PECB-Certified ISO/IEC 27001:2022 Lead Auditor PECB-Certified ISO/IEC 27005:2022 (Lead) Risk Manager or BSI-Certified in ISO/IEC 27005:2022 Information Security Risk Management A minimum of 20 CPD/ CPE credits Desired Professional Certifications: Candidates with the following certifications or equivalent experience shall get preference: Information Security (GRC) certifications: CISA, CISSP, CISM, CRISC, CCAK, ISO/IEC 27018:2019, ISO/IEC 27701:2019 Lead Auditor PCI-DSS v4, ISO/IEC 31000:2018, NIST CSF, CQI/IRCA Certified BCMS ISO 22301:2019 Lead Auditor, etc Cyber Security Certifications: ICS/SCADA Cybersecurity, GSEC, SSCP, CEH CPENT, CHFI, CCISO, CSA, CTIA, EDRP, ICS/SCADA Cybersecurity, CompTIA Security+, CompTIA CASP+, GCIH, Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams Communication Submit a cover letter summarizing your experience in relevant technologies and software along with a resume and the Latest passport-size photograph
FIND ON MAP