Jobs
Interviews
25 Job openings at C3iHub, IIT Kanpur
Automotive Cybersecurity Engineer

Kanpur, Uttar Pradesh, India

4 years

Not disclosed

Remote

Full Time

Description As an Automotive Cybersecurity Engineer, you will be responsible for assessing and enhancing the security of connected vehicles through advanced penetration testing, wireless and hardware exploitation, and embedded system analysis. You will evaluate vehicle communication systems, infotainment platforms, and remote entry mechanisms to identify vulnerabilities that could compromise vehicle safety, privacy, and functionality. This position is ideal for cybersecurity professionals passionate about automotive technologies, embedded interfaces, and threat simulation. Responsibilities Perform Security Testing of In-Vehicle Systems: Conduct assessments of vehicle internal networks (e.g., CAN, OBD-II) to identify and exploit vulnerabilities in communication flows and control mechanisms. Analyze infotainment systems and user interfaces for privacy concerns, data leakage, and potential malware injection points. Simulate remote and physical attack vectors, including key fob signal replay, wireless intrusion, and unauthorized access. Evaluate Embedded & Wireless Communication Interfaces: Assess the security of Bluetooth, Wi-Fi, and RF-based protocols used in the vehicle ecosystem. Examine communication channels between connected mobile applications, infotainment clusters, and backend services. Test for privilege escalation, data interception, and firmware or hardware manipulation. Reverse Engineer Vehicle Architectures: Understand and map circuit-level data flows across ECUs and control modules. Extract and analyze firmware, debug interfaces, and physical ports for security analysis. Utilize diagnostic tools, CAN analyzers, and SDR platforms for in-depth testing. Identify Vulnerabilities and Recommend Mitigation: Document test findings with detailed risk assessments and technical evidence. Work with internal teams and OEMs to recommend security hardening measures. Contribute to the ongoing improvement of testing methodologies and lab capabilities. Stay Aligned with Industry Standards: Ensure compliance with national and international automotive cybersecurity standards, including AIS 189, ISO/SAE 21434, and UN R155. Stay updated on emerging vehicle technologies and cyber threat landscapes. Eligibility Educational Background: Bachelor’s degree in electrical/Electronics, Computer Science, Cybersecurity, or related discipline. Technical Skills: Knowledge of vehicle networking protocols (CAN, LIN, UDS). Experience with CAN analysis tools (CANalyzer, SavvyCAN, PCAN). Familiarity with Android-based systems, ADB, rooting, and mobile OS exploitation. Experience in wireless exploitation (Wi-Fi, Bluetooth, RF using SDR). Circuit and system-level debugging, reverse engineering PCBs, or automotive modules. Experience: 1–4 years of experience in penetration testing, embedded security, or automotive security assessment. Desired Eligibility Exposure to AIS 189 or ISO/SAE 21434 frameworks. Participation in hardware-based CTFs, red teaming, or automotive-focused security research. Familiarity with tools such as Metasploit, Burp Suite, IDA Pro, Ghidra, Wireshark, and SDR tools. Certifications like CEH, CRTP, OSCP, PJPT, PNPT, or relevant embedded/automotive certifications. Ability to work in lab environments and travel for on-site testing engagements. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less

Engineer - VAPT (IT/OT, ICS & IIoT)

Kanpur, Uttar Pradesh, India

0 years

Not disclosed

Remote

Full Time

Description As an IT/OT Vulnerability Assessment and Penetration Testing (VAPT) Engineer, you will be engaged in identifying and mitigating security vulnerabilities across IT systems, Industrial Control Systems (ICS), and Industrial Internet of Things (IIoT) environments. Your work will involve rigorous security assessments of critical infrastructure, SCADA systems, PLCs, field devices, gateways, and cloud-connected IIoT platforms. You will simulate advanced adversary tactics to expose vulnerabilities and provide strategic remediation guidance. The role is suited for professionals with a deep understanding of both enterprise IT security and industrial/embedded system ecosystems. Responsibilities 1-Vulnerability Assessment & Penetration Testing (IT + ICS/IIoT): Perform black-box, grey-box, and white-box VAPT on: Enterprise IT assets (servers, databases, web/mobile apps, Active Directory, cloud) OT/ICS assets (PLCs, RTUs, HMIs, engineering workstations, protocol gateways) IIoT platforms (MQTT/CoAP-based telemetry, edge gateways, cloud dashboards) Emulate APT-level attacks across air-gapped, segmented, or hybrid IT-OT architectures. Execute Red Team scenarios to simulate insider threats or supply chain compromise. 2- ICS Protocol & Field Device Security Testing: Analyze and exploit vulnerabilities in ICS protocols: Modbus TCP, DNP3, IEC 104, OPC-UA, S7comm, Profinet, BACnet, CIP (EtherNet/IP), MQTT, CoAP Perform live traffic analysis, packet manipulation, and protocol fuzzing to test resilience. Evaluate control logic vulnerabilities in ladder logic, structured text, and function blocks. 3- Firmware & Hardware Exploitation (IIoT/ICS Devices): Extract and analyze firmware from industrial devices using JTAG, UART, SPI interfaces. Perform static and dynamic analysis using Ghidra, Binwalk, Radare2, or IDA Pro. Reverse engineer file systems (e.g., squashfs, cramfs) and analyze web interfaces or CLI backdoors. Exploit misconfigured bootloaders, insecure firmware upgrade mechanisms, or exposed debug ports. 4- Network Architecture & Segmentation Testing: Review and test IT-OT segmentation via firewall ACLs, VLANs, DMZ configurations. Assess trust relationships, weak credential policies, and insecure remote access (e.g., exposed VNC, Telnet, RDP). Identify unauthorized bridging of air-gapped networks or misconfigured routing/switching. 5- Cloud & IIoT Platform Security: Evaluate MQTT brokers, edge-to-cloud telemetry, and analytics pipelines. Test REST APIs, insecure mobile app integrations, and cloud misconfigurations (S3, IAM, IoT Core). Identify insecure certificate handling, default API tokens, and lack of encryption at rest/in transit. Reporting & Mitigation Develop technical and executive-level reports with CVSS scoring, attack paths, and exploitation evidence. Recommend hardening measures for both IT (patches, SIEM, EDR) and OT (control policy tuning, physical zoning, least privilege for operators). Coordinate with ICS engineers, IT admins, and SOC teams for patch validation and monitoring upgrades. Compliance & Framework Alignment Ensure assessments comply with industry and regulatory frameworks: NIST SP 800-82, ISA/IEC 62443, ISO 27001, NERC CIP, SANS ICS Top 20 Map findings to MITRE ATT&CK for ICS and monitor emerging CVEs relevant to industrial products. Eligibility Educational Background: Bachelor’s or Master’s in Cybersecurity, Computer Science, Industrial Automation, Electronics, or a related field. Technical Skills: Deep knowledge of ICS/SCADA systems, embedded architectures, and real-time OS (VxWorks, QNX, FreeRTOS). Hands-on experience with tools: VAPT Tools: Nessus, Burp Suite, Metasploit, Nmap, Nikto, SQLMap ICS Tools: Wireshark, Scapy, PLCScan, ICSFuzz, S7comm Tools, Conpot, ModScan Firmware Tools: Binwalk, Ghidra, Radare2, OpenOCD, Logic Analyzers IIoT Security: Shodan, Censys, MQTTX, Postman, OWASP ZAP Certifications (Preferred): OSCP, GRID, GICSP, CRT, CRTP, CEH, CISSP, or equivalent. Participation in ICS/IoT-focused CTFs or open-source contributions is a plus. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less

Data Analyst - Blockchain Intelligence

Kanpur, Uttar Pradesh, India

0 years

Not disclosed

On-site

Full Time

Description As a Blockchain Intelligence Analyst, you will collect, analyze, and report on intel leads (e.g., crypto exchanges, fraud) ensuring best-in-class intelligence, problem solving, and ability to turn data into insights. You will collaborate with expert minds in academics, industry, and Law enforcements to build scalable systems to detect, prevent, and mitigate cryptocurrency fraud and financial crime. This is an exciting opportunity to make a measurable impact within a corporate environment that values precision, innovation, and strategic thinking. Responsibilitie s ● Analyze user behavior on different virtual asset service providers (such as marketplaces, and exchanges). This task requires one to perform OSInt and extract relevant information about the platform. ● Develop related pipeline using Python and other technologies. ● Support product and analytics teams in building data-pipelines and business logic. ● Develop strategies to counter concealment measures used by service providers (captchas, closed group invites etc). ● Establish partnerships with 3rd party data vendors, research bodies, anti-cybercrime groups. ● Monitor forums for cybercrime intelligence. ● Develop intelligence reports for marketing and SAR reports for Law Enforcement Agencies. Eligibility ● Proven work experience in intelligence-related positions, ideally in Blockchain Intelligence (This is not an entry-level position). ● Proficiency and expertise in different methods used for OSInt. ● Strong ability to synthesize, interpret, and report complex information clearly and accurately. ● Knowledge of blockchain technologies and different platforms, with a focus on tracing transactions and identifying malicious activity. Also have working knowledge of cryptocurrencies, darknet marketplaces, Tor, experience in making payments with Bitcoin and Ethereum. ● Excellent communication skills to collaborate with cross-functional teams and able to explain to others with no technical knowledge. ● Ability to research in another language also (Please specify the language(s) in your application). ● Proficiency in Python, MongoDB, Neo4j, Cypher, Git. Desired Eligibility ● Relevant certifications and experience in cybersecurity or intelligence gathering. ● Working knowledge of SQL is preferred. ● Bachelor's degree or above in Computer Science or related field. ● Prior experience working in fast-paced environments or startups. ● Prior experience in publishing research oriented articles in A* journals. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less

Deception Technology – Analyst

Kanpur, Uttar Pradesh, India

2 years

Not disclosed

On-site

Full Time

Description Design, implement, and manage deception strategies and technologies within the organisation's cybersecurity infrastructure. Responsibilities Hands-on experience in working with Deception Technology and SIEM Tools Design and development of scalable, reliable, and fault-tolerant systems. Integrate/Modify existing open-source software according to the requirements. Prepare presentations and reports. Authoring research papers. Hands-on experience in virtualisation, cloud deployments, and networking. Ability to debug code and overcome fundamental challenges while coding. Hands-on experience in Python. Knowledge of tools like -- nmap, Metasploit, Wireshark, Burp suite, etc. Comfortable in using Linux OS. Good writing and communication skills to assist the group in technical writing. Eligibility A Bachelor's degree in computer science or a similar subject is required. 2 years of experience in the same domain as mentioned under the category of responsibilities. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less

Analyst -Deception Technology

Kanpur, Uttar Pradesh, India

2 years

Not disclosed

On-site

Full Time

Description Design, implement, and manage deception strategies and technologies within the organisation's cybersecurity infrastructure. Responsibilities Hands-on experience in working with Deception Technology and SIEM Tool. Design and development of scalable, reliable, and fault-tolerant systems. Integrate/Modify existing open-source software according to the requirements. Prepare presentations and reports. Authoring research papers. Hands-on experience in virtualisation, cloud deployments, and networking. Ability to debug code and overcome fundamental challenges while coding. Hands-on experience in Python. Knowledge of tools like -- nmap, Metasploit, Wireshark, Burp suite, etc. Comfortable in using Linux OS. Good writing and communication skills to assist the group in technical writing. Eligibility A Bachelor's degree in computer science or a similar subject is required 2 years of experience in the same domain as mentioned under the category of responsibilities Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less

Data Analyst - Cryptoforensic (DE)

Kanpur, Uttar Pradesh, India

1 years

Not disclosed

On-site

Full Time

Description We are looking for a data engineer and scientist with a deep understanding of blockchain network protocols, infrastructure, systems engineering, distributed systems, and architectural design. The candidate will lead research and ideation to scale data infrastructure and feasibility in production. The candidate will have the opportunity to expand expertise in different areas of engineering and applied research. This is an exciting opportunity to make a measurable impact within a corporate environment that values precision, innovation, and strategic thinking. Responsibilities Architect and build a highly scalable, resilient, and distributed system that integrates a variety of data sources. Standardizing data schemas Maintain servers and Build performant, and reliable production-grade systems. Design and optimize protocol implementations. Work across the tech stack (ETL, cache, code, deploy) Mentor fellow team members and participate in code reviews and design reviews Collaborate cross-functionally with other data scientists, designers, and product managers - to define and implement services. Develop novel clustering approaches to tackling blockchain-specific challenges around scale, security, and privacy. Research on privacy preserving blockchains Develop related pipeline using Python and other technologies Support product and intelligence teams. Eligibility Bachelor's degree or above in Computer Science or related field. At least 1 Year of experience in related domain & skills. Experience in building real time highly dynamic and data heavy systems Ability to work independently, be proactive, prioritize, and communicate novel ideas experience working in fast-paced environments or startups Prior experience in publishing research oriented articles in A* journals. Proficiency and expertise in different data platforms. Proficiency in Python, Kafka, websockets, Elasticsearch, MongoDB, Kubernetes, Docker, Neo4j, Cypher, Wireshark, Git, AWS, Google Cloud, Swagger, Linux, VS, Solidity, and network protocols. Strong ability to synthesize, interpret, and report complex information clearly and accurately. Knowledge of blockchain technologies and different platforms, with a focus on tracing transactions and identifying malicious activity. Also have working knowledge of cryptocurrencies, darknet marketplaces, Tor, experience in making payments with bitcoin and ethereum Compensation. Excellent communication skills to collaborate with cross-functional teams and able to explain to others with no technical knowledge. Understanding of coding standards Desired Eligibility Relevant certifications and experience in cybersecurity or intelligence gathering. Working knowledge of SQL is preferred. Prior experience working in fast-paced environments or startups. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Show more Show less

System Engineer – IT Security

Kanpur, Uttar Pradesh, India

2 years

Not disclosed

On-site

Full Time

Description We are looking for a motivated and detail-oriented System Engineer to join our IT Security team. The ideal candidate will assist in monitoring and responding to cybersecurity alerts, supporting incident response efforts, helping to develop and enforce security policies, conducting cybersecurity awareness initiatives, and coordinating with government and industry cybersecurity bodies. Responsibilitie sManage and coordinate responses to cybersecurity incidents, including identifying, analysing, and mitigating the impact of security threats and breaches .Contribute to the development and implementation of IT security policies, ensure organizational compliance, and periodically review policies to align with evolving threats and technologies .Organize training sessions, simulations, and awareness campaigns to educate employees on cybersecurity best practices and protocols .Maintain communication with CERT-In and other relevant government and industry organizations to stay informed about emerging threats and collaborate on security initiatives .Stay updated with current cybersecurity trends, participate in relevant training, earn certifications (e.g., CISSP, CEH, CISM), and attend industry conferences . Eligibili tyBachelor's degree in Computer Science, Information Technology, or a related field (or equivalent practical experience ).Strong understanding of Networking, Operating Systems, System Administration, Threats, and Vulnerabilitie s.Familiarity with cybersecurity frameworks such as NIST, ISO 27001, and CIS Control s.Knowledge of national and international cybersecurity standards, regulations, and best practice s.Professional, courteous, cooperative, and a team player with a high level of integrit y.Excellent communication, presentation, negotiation, and interpersonal skill s.Experience and maturity in interacting with senior stakeholders and building trusted relationship s.Proven ability to manage internal and external communications during and after security incident s.Minimum of 2 years’ experience in security technologies as a Support Engineer or Analys t.Experience in analysing logs from multiple sources (e.g., network devices, servers, applications) to detect and respond to security incident s.Skilled in developing and executing incident response plans, with knowledge of forensics, threat hunting, and investigative technique s.Ability to gather, interpret, and apply cyber threat intelligence to strengthen security postur e.Proficient in scripting languages like Python and PowerShell for automation and tool developmen t.Experience in patch management to ensure systems are secure and up to dat e. Desired Eligibil ityProfessional certifications such as CISSP, CISM, CEH, CompTIA Security+, or similar recognized credentia ls. Tr avelAs and when required, across the country for project execution and monitoring, as well as for coordination with geographically distributed te ams. Communic ationSubmit a cover letter summarising your experience in relevant technologies and software, along with a resume and the Latest passport-size photog raph. Show more Show less

System Engineer – Networking

Kanpur, Uttar Pradesh, India

3 years

Not disclosed

On-site

Full Time

Description We are seeking an experienced and highly skilled Network Engineer to design, implement, manage, and monitor both local and wide area networks (LAN/WAN) to ensure maximum uptime, security, and performance. This role involves planning and documenting system configurations, overseeing the installation of new networks, and maintaining/upgrading existing infrastructure as needed. The ideal candidate should have strong troubleshooting skills and a collaborative mindset to resolve issues effectively. Responsibilitie sDesign, implement, and manage advanced network solutions, including VLANs and hybrid environments, ensuring scalability and high availability .Configure and maintain Access Control Lists (ACLs), firewall policies, switches, and routers to enforce secure network segmentation and traffic control .Deploy and manage redundancy and routing protocols (e.g., OSPF, BGP, VRRP) to ensure optimal data flow and system resilience .Apply Quality of Service (QoS), load balancing, and traffic shaping techniques to enhance performance and prioritize mission-critical applications .Implement robust network security measures such as IPS/IDS, VPNs, firewall configurations, Network Access Control (NAC), and endpoint protection to prevent vulnerabilities and unauthorized access .Automate network configurations using scripting tools like Python or Ansible, and proactively monitor network health using tools like Wireshark. SolarWinds, or Nagios .Configure and manage NAT, VLANs, switches, and traffic management policies to support efficient resource utilization and segmentation .Maintain accurate and detailed network documentation, including topology maps, configuration backups, firewall settings, and redundancy plans, to support ongoing maintenance and disaster recovery processes . Eligibili tyBachelor's degree in Information Technology, Computer Science, or a related disciplin e.Minimum of 3 years of experience in network engineering or IT infrastructure suppor t.Strong grasp of networking fundamentals, including TCP/IP, DHCP, DNS, NAT, and VLAN s.Hands-on experience configuring and troubleshooting routers, switches, firewalls, and related network device s.Familiarity with network monitoring and diagnostics tool s. Desired Eligibil ityIndustry certifications such as CCNA, CompTIA Network+, or similar are recognized credentia ls. Tr avelAs and when required, across the country for project execution and monitoring, as well as for coordination with geographically distributed te ams. Communic ationSubmit a cover letter summarising your experience in relevant technologies and software, along with a resume and the Latest passport-size photog raph. Show more Show less

System Engineers (DevOps)

Kanpur, Uttar Pradesh, India

3 years

Not disclosed

On-site

Full Time

Description We are looking for an experienced DevOps Engineer with a strong background in on-premise infrastructure management and hands-on expertise in Kubernetes, GitLab CI/CD, and Docker. The ideal candidate will be responsible for managing and optimizing infrastructure pipelines, enhancing automation in deployments, and ensuring system reliability, security, and high availability. Responsibilities Design, deploy, and administer on-premises Kubernetes clusters using tools such as kubeadm, k3s, or k0s to support scalable application infrastructure. Configure and maintain robust GitLab CI/CD pipelines to streamline continuous integration, testing, and deployment processes. Develop and maintain Docker-based environments across development, testing, and production stages to ensure consistency and efficiency. Implement and manage infrastructure using Ansible or Terraform, with a focus on tailored solutions for on-premises environments. Architect and maintain secure, resilient infrastructure supporting microservices and internal platforms to ensure high availability and performance. Diagnose and resolve complex environment-related issues, including container orchestration, networking, and deployment failures. Create and maintain detailed internal documentation and operational playbooks to support standardized DevOps practices. Participate in a rotating on-call schedule to provide 24/7 operational support for critical production systems. Identify repetitive tasks and implement automation to minimize manual intervention and improve operational efficiency. Design and manage infrastructure using tools like Terraform and Kubernetes Composite Resource Definitions (XRDs) to support dynamic scaling and management. Implement robust security measures to safeguard infrastructure, applications, and data, ensuring compliance with internal and industry standards. Act as a bridge between development and operations teams to facilitate seamless software releases and quick resolution of production issues. Conduct root cause analysis (RCA) for production incidents and implement measures to prevent recurrence. Continuously monitor and optimize system performance, proactively identifying and resolving bottlenecks and implementing capacity planning strategies. Maintain comprehensive records of systems architecture, configurations, processes, and incident resolutions. Drive ongoing improvements in infrastructure, tools, and processes to enhance system reliability, scalability, and performance. Eligibility Minimum of 3 years of hands-on experience as a DevOps Engineer. Strong expertise in Kubernetes administration for on-premises (non-cloud) environments. Proficient in designing and optimizing GitLab CI/CD pipelines. In-depth understanding of Docker and its container lifecycle management. Solid working knowledge of Linux-based systems, system administration, and core networking concepts. Experience with monitoring and logging tools such as Prometheus, Grafana, or the ELK Stack. Scripting proficiency in Bash, Python, or Go. Desired Eligibility Experience with self-hosted GitLab runners and artifact registries. Knowledge of service mesh architectures (e.g., Istio, Linkerd). Familiarity with security best practices in containerized and orchestrated environments. Exposure to load balancing tools such as HAProxy, Nginx, or Traefik. Travel As and when required, across the country for project execution and monitoring, as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software, along with a resume and the Latest passport-size photograph. Show more Show less

Associate Analyst - Security Team

Kanpur, Uttar Pradesh, India

2 years

Not disclosed

On-site

Full Time

Description We are seeking a dedicated and skilled Associate Analyst to join our Security Team. This role is ideal for someone passionate about cybersecurity, with a strong foundation in penetration testing and a good grasp of programming languages. The successful candidate will be part of a dynamic team responsible for identifying, assessing, and mitigating security vulnerabilities within our IT infrastructure. Responsibilities • Conduct penetration tests and security assessments for network, web-based applications, and operating systems. • Work with the cybersecurity team to simulate attacks on systems, networks, and applications to identify and exploit vulnerabilities. • Develop custom scripts or tools in Python and C++ to automate testing and exploit vulnerabilities. • Analyze and evaluate system vulnerabilities and potential security threats. • Provide recommendations and solutions for improving our security posture. • Document findings and prepare reports detailing the results and methodologies of tests. • Collaborate with other team members to refine security strategies and update the security infrastructure as necessary. • Stay updated with the latest security news, techniques, and tools related to penetration testing and ethical hacking. Eligibility • Bachelor’s degree in Computer Science, Information Security, or a related field. • 2-3 years of experience in cybersecurity, specifically in penetration testing and red team operations. • Strong programming skills in Python and C++. Knowledge of other scripting languages is a plus. • Profound understanding of Linux environments and their subsystems. • Familiarity with network protocols, encryption techniques, and intrusion detection systems. • Excellent problem-solving skills and ability to think like both an attacker and a defender. • Strong communication skills and ability to document and explain technical details clearly. Desired Eligibility • Certifications such as OSCP, CEH, or related are highly regarded. • Experience with other operating systems like Windows or macOS is beneficial. • A proactive approach and eagerness to learn new technologies and testing techniques. Benefits: • Competitive salary and comprehensive health benefits. • Opportunities for professional growth and advancement. • Access to the latest tools and technologies. • Supportive and collaborative work environment. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less

Lead Systems Engineer

Kanpur, Uttar Pradesh, India

5 years

None Not disclosed

On-site

Full Time

Description We are looking for an experienced IT Operations Manager to oversee our IT infrastructure and support services. This role involves leading a diverse team of engineers to ensure the efficient operation, security, and reliability of our IT systems and services. Responsibilitie sOversee all aspects of the company's IT operations, ensuring optimal performance and security .Manage IT infrastructure, including hardware, software, networks, and cybersecurity .Develop and implement IT policies and procedures to ensure operational efficiency and data protection .Collaborate with the leadership team to support business objectives through technology solutions .Lead and manage IT projects, including system upgrades, new implementations, and technology initiatives .Ensure compliance with internal and external IT standards and regulatory requirements .Provide technical support to employees, troubleshooting and resolving IT-related issues .Manage relationships with external vendors and service providers to ensure effective IT support and services .Monitor and report on IT performance metrics, making recommendations for improvements . Eligibili tyBachelor's degree in information technology, computer science, or a related fiel d.5+ years of experience in IT operations or related field, with at least 2 years of experience as an IT Operations Manager or in a similar rol e.Strong understanding of IT infrastructure, systems management, and cybersecurity best practice s.Experience with IT project management and leading system implementation s.Proficiency in IT management software and troubleshooting tool s.Excellent communication, leadership, and problem-solving skill s.Ability to work independently on site while collaborating effectivel y. Tra velAs and when required, across the country for project execution and monitoring, as well as for coordination with geographically distributed tea ms. Communica tionSubmit a cover letter summarising your experience in relevant technologies and software, along with a resume and the Latest passport-size photogr aph. Show more Show less

Malware Analysis Researcher

Kanpur, Uttar Pradesh, India

2 years

None Not disclosed

On-site

Full Time

Description C3iHub, IIT Kanpur is seeking a highly motivated and skilled Malware Analysis Researcher to join our cybersecurity research team. The ideal candidate will possess a strong foundation in static and dynamic malware analysis, with hands-on experience in reverse engineering, automation, and machine learning-based malware detection. You will work on analyzing real-world malware samples, building automation pipelines, curating datasets, and developing innovative solutions to detect and mitigate emerging threats. This role also involves publishing research articles and collaborating on advanced detection frameworks. Responsibilities Key Responsibilities: • Perform static and dynamic analysis of malware samples across formats (PE, PDF, ELF, APK). • Automate analysis tasks using Python, Bash, or other scripting tools. • Set up and maintain sandbox environments (e.g., Cuckoo Sandbox) for behavior monitoring. • Analyze packed, encrypted, or obfuscated malware using reverse engineering techniques. • Utilize and contribute to open-source tools (e.g., YARA, Volatility, Ghidra, Radare2). • Curate and label malware datasets for use in machine learning pipelines. • Conduct source code analysis using SAST and DAST tools. • Author technical documentation and publish research articles in the field. • Collaborate with internal teams on threat research, detection model tuning, and PoC development. • Travel (within India) occasionally for project-related meetings, demonstrations, or coordination. Eligibility Required Qualifications • Master’s degree in Computer Science, Information Security, or related field • 1–2 years of hands-on experience in malware analysis or reverse engineering • Proficiency in scripting (e.g., Python, Bash) and familiarity with threat analysis tools • Strong understanding of malware behavior, file formats, and analysis techniques. Preferred Qualifications • Specialization in Cybersecurity or Information Security. • Experience with tools such as IDA Pro, Ghidra, Wireshark, or Sysmon. • Exposure to ML/AI-based malware classification projects. • Research publications in reputable cybersecurity journals or conferences. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph.

Cyber Security Instructor

Kanpur, Uttar Pradesh, India

3 years

None Not disclosed

On-site

Full Time

Description We are seeking an experienced and knowledgeable Cybersecurity Instructor to join our team. The successful candidate will be responsible for developing, coordinating, and delivering comprehensive training programs on cybersecurity topics to various audiences, including IT professionals, employees, and clients. The trainer will also stay updated with the latest cybersecurity trends, tools, and best practices to ensure that training content remains current and effective. Responsibilities Training Program Development: Design, develop, and update cybersecurity training programs, materials, and documentation. Create engaging and interactive training modules, including hands-on labs, simulations, and e-learning content. Stay up-to-date with the latest cybersecurity trends, threats, tools, and best practices. Serve as a subject matter expert on cybersecurity topics within the organization. Participate in continuous professional development and industry certifications. Training Delivery: Conduct training sessions for diverse audiences, including in-person, virtual, and hybrid formats. Customize training content to meet the specific needs and skill levels of different groups. Assessment and Evaluation: Develop and administer assessments to evaluate the effectiveness of training programs and participant learning outcomes. Collect and analyze feedback to continuously improve training materials and delivery methods. Eligibility Master’s degree in information technology, Cybersecurity, Computer Science, or a related field. A PhD is a plus. Relevant industry certifications will be desirable. Minimum of 3 years of experience in cybersecurity, with at least 2 years in a training or instructional role. Desired Eligibility Passion for education and training. High level of integrity and professionalism. Ability to adapt to a dynamic and fast-paced environment. Commitment to continuous learning and development. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarizing your experience in relevant technologies and software along with a resume and the Latest passport-size photograph.

Engineer - VAPT (IT/OT, ICS & IIoT)

Kanpur, Uttar Pradesh, India

0 years

None Not disclosed

Remote

Full Time

Description As an IT/OT Vulnerability Assessment and Penetration Testing (VAPT) Engineer, you will be engaged in identifying and mitigating security vulnerabilities across IT systems, Industrial Control Systems (ICS), and Industrial Internet of Things (IIoT) environments. Your work will involve rigorous security assessments of critical infrastructure, SCADA systems, PLCs, field devices, gateways, and cloud-connected IIoT platforms. You will simulate advanced adversary tactics to expose vulnerabilities and provide strategic remediation guidance. The role is suited for professionals with a deep understanding of both enterprise IT security and industrial/embedded system ecosystems. Responsibilities 1-Vulnerability Assessment & Penetration Testing (IT + ICS/IIoT): Perform black-box, grey-box, and white-box VAPT on: Enterprise IT assets (servers, databases, web/mobile apps, Active Directory, cloud) OT/ICS assets (PLCs, RTUs, HMIs, engineering workstations, protocol gateways) IIoT platforms (MQTT/CoAP-based telemetry, edge gateways, cloud dashboards) Emulate APT-level attacks across air-gapped, segmented, or hybrid IT-OT architectures. Execute Red Team scenarios to simulate insider threats or supply chain compromise. 2- ICS Protocol & Field Device Security Testing: Analyze and exploit vulnerabilities in ICS protocols: Modbus TCP, DNP3, IEC 104, OPC-UA, S7comm, Profinet, BACnet, CIP (EtherNet/IP), MQTT, CoAP Perform live traffic analysis, packet manipulation, and protocol fuzzing to test resilience. Evaluate control logic vulnerabilities in ladder logic, structured text, and function blocks. 3- Firmware & Hardware Exploitation (IIoT/ICS Devices): Extract and analyze firmware from industrial devices using JTAG, UART, SPI interfaces. Perform static and dynamic analysis using Ghidra, Binwalk, Radare2, or IDA Pro. Reverse engineer file systems (e.g., squashfs, cramfs) and analyze web interfaces or CLI backdoors. Exploit misconfigured bootloaders, insecure firmware upgrade mechanisms, or exposed debug ports. 4- Network Architecture & Segmentation Testing: Review and test IT-OT segmentation via firewall ACLs, VLANs, DMZ configurations. Assess trust relationships, weak credential policies, and insecure remote access (e.g., exposed VNC, Telnet, RDP). Identify unauthorized bridging of air-gapped networks or misconfigured routing/switching. 5- Cloud & IIoT Platform Security: Evaluate MQTT brokers, edge-to-cloud telemetry, and analytics pipelines. Test REST APIs, insecure mobile app integrations, and cloud misconfigurations (S3, IAM, IoT Core). Identify insecure certificate handling, default API tokens, and lack of encryption at rest/in transit. Reporting & Mitigation Develop technical and executive-level reports with CVSS scoring, attack paths, and exploitation evidence. Recommend hardening measures for both IT (patches, SIEM, EDR) and OT (control policy tuning, physical zoning, least privilege for operators). Coordinate with ICS engineers, IT admins, and SOC teams for patch validation and monitoring upgrades. Compliance & Framework Alignment Ensure assessments comply with industry and regulatory frameworks: NIST SP 800-82, ISA/IEC 62443, ISO 27001, NERC CIP, SANS ICS Top 20 Map findings to MITRE ATT&CK for ICS and monitor emerging CVEs relevant to industrial products. Eligibility Educational Background: Bachelor’s or Master’s in Cybersecurity, Computer Science, Industrial Automation, Electronics, or a related field. Technical Skills: Deep knowledge of ICS/SCADA systems, embedded architectures, and real-time OS (VxWorks, QNX, FreeRTOS). Hands-on experience with tools: VAPT Tools: Nessus, Burp Suite, Metasploit, Nmap, Nikto, SQLMap ICS Tools: Wireshark, Scapy, PLCScan, ICSFuzz, S7comm Tools, Conpot, ModScan Firmware Tools: Binwalk, Ghidra, Radare2, OpenOCD, Logic Analyzers IIoT Security: Shodan, Censys, MQTTX, Postman, OWASP ZAP Certifications (Preferred): OSCP, GRID, GICSP, CRT, CRTP, CEH, CISSP, or equivalent. Participation in ICS/IoT-focused CTFs or open-source contributions is a plus. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph.

Analyst -Deception Technology

Kanpur, Uttar Pradesh, India

2 years

None Not disclosed

On-site

Full Time

Description Design, implement, and manage deception strategies and technologies within the organisation's cybersecurity infrastructure. Responsibilities Hands-on experience in working with Deception Technology and SIEM Tool. Design and development of scalable, reliable, and fault-tolerant systems. Integrate/Modify existing open-source software according to the requirements. Prepare presentations and reports. Authoring research papers. Hands-on experience in virtualisation, cloud deployments, and networking. Ability to debug code and overcome fundamental challenges while coding. Hands-on experience in Python. Knowledge of tools like -- nmap, Metasploit, Wireshark, Burp suite, etc. Comfortable in using Linux OS. Good writing and communication skills to assist the group in technical writing. Eligibility A Bachelor's degree in computer science or a similar subject is required 2 years of experience in the same domain as mentioned under the category of responsibilities Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph.

Lead Software Engineer

kanpur, uttar pradesh

5 - 10 years

INR Not disclosed

On-site

Full Time

Description The candidate will be technically responsible for designing and developing, debugging, troubleshooting, providing realistic solutions as per requirements and should be well versed with C++/VC++, MFC, Windows Services, Database, API Management. Responsibilities The candidate will be technically responsible for designing C developing, debugging, troubleshooting, providing realistic solutions as per requirements, etc. He / she must be keen in upgrading C improving to recent C upcoming technologies. Should have strong interpersonal skills C be able to communicate at all levels C across cultures. Eligibility Preferably 10+yrs of Industry and 5+ years of VC++ Strong hands-on experience with VC++ Experience with SDI, MDI, Dialog Based Application, MFC. Strong Experience in OOPS. Working experience with Data Structure. Strong knowledge on Database and File handling. Research and Coding Role Software Developer, Industry Type Software Product, Functional. Area IT Software - Application Programming, Maintenance. Programming C Design. Desired Eligibility Degree Graduation (B.Tech, M.Tech, MCA, BCA, M.Sc, B.Sc),

System Engineer – IT Security

Kanpur, Uttar Pradesh, India

3 years

None Not disclosed

Remote

Full Time

(Locations: Mumbai, Kandla, Goa, Mangalore, Kochi, Chennai, Tuticorin, Visakhapatnam, Paradip, Kolkata) Description We are seeking a proactive and technically skilled On-site IT Security Engineer to join our team, embedded directly at customer premises. This role is crucial for bridging the gap between our remote cybersecurity teams and the customer's on-site environment. You will be responsible for hands-on network engineering, vulnerability management, and providing essential technical coordination and support to ensure seamless cybersecurity operations. Responsibilities On-site Technical Coordination: Act as the primary technical point of contact at the customer site, facilitating effective communication and coordination between our remote security teams (located in different geographies) and the customer's IT personnel. Network Engineering & Maintenance: Independently perform network engineering tasks, including configuration, troubleshooting, and optimization, to ensure a robust and secure network infrastructure. Vulnerability Management & Patching: Proactively identify, assess, and manage vulnerabilities across customer systems and networks. This includes planning and executing patching cycles to ensure all systems are secure and up-to-date. Cybersecurity Implementation Support: Work closely with remote teams to implement cybersecurity solutions by understanding the customer's unique environment and providing critical on-site support. Incident Response & Support: Assist in monitoring and responding to cybersecurity alerts, providing on-site support for incident response efforts, including initial analysis and mitigation steps. Customer Environment Understanding: Develop a deep understanding of the customer's IT infrastructure, applications, and security requirements to effectively tailor and implement security solutions. Security Policy Assistance: Help implement and enforce security policies on-site, ensuring alignment with customer requirements and our cybersecurity frameworks. Reporting & Documentation: Provide regular updates to both remote teams and the customer on security posture, ongoing activities, and any identified risks or issues. Arrange/coordinate meetings & diligently record minutes of meetings and prepare agenda points. Adherence to Standards: Ensure on-site operations comply with relevant national and international cybersecurity standards, regulations (e.g., NIST, ISO 27001, CIS Controls), and best practices. Eligibility Education: Bachelor's degree in Computer Science, Information Technology, or a related field (or equivalent practical experience). Experience: Minimum of 3 years of experience in IT security, network engineering, or system administration with a strong focus on security. Proven experience in patch management and vulnerability remediation. Familiarity with analyzing logs from various sources (e.g., network devices, servers, applications) for security incident detection. Experience with scripting languages (e.g., Python, PowerShell) for automation and tool development is highly desirable. Technical Skills: Strong understanding of Networking principles and protocols (TCP/IP, routing, switching, firewalls). Solid knowledge of Operating Systems (Windows, Linux), System Administration, common threats, and vulnerabilities. Familiarity with cybersecurity frameworks such as NIST, ISO 27001, and CIS Controls. Soft Skills: Exceptional communication, presentation, and interpersonal skills, with the ability to articulate complex technical information clearly to both technical and non-technical stakeholders. Demonstrated ability to build and maintain strong, trusted relationships with senior stakeholders and customer personnel. Professional, courteous, cooperative, and a strong team player with a high level of integrity and problem-solving skills. Ability to work independently and manage multiple tasks effectively in a dynamic on-site environment. Language Proficiency: Multi-lingual proficiency, Good English speaking along with strong local language proficiency for each Location (Eg, Tamil for Chennai/ Tuticirin, Tulu/Kannada for Mangalore, Odiya for Paradip, etc). Desired Eligibility Desired Certifications Professional certifications such as CCNA Security, CEH, and CompTIA Security+ will be an added advantage (but not compulsory). Travel Occasional travel may be required across the country for specific project executions, monitoring, or coordination with geographically distributed internal teams. Communication Submit a cover letter summarising your experience in relevant technologies and software, along with a resume and the Latest passport-size photograph.

The cleaned title from the string Associate - Admin is Associate .

kanpur, uttar pradesh

2 - 6 years

INR Not disclosed

On-site

Full Time

The Associate Admin will play a crucial role in ensuring the smooth operation of office functions. This position involves managing various administrative tasks such as handling correspondence, drafting documents, organizing records, data entry, and coordinating office events. To excel in this role, you must possess strong organizational skills, meticulous attention to detail, and excellent communication abilities to effectively support both internal and external stakeholders. It is essential for the ideal candidate to be proficient in English, adept in documentation, administrative duties, and event coordination while upholding confidentiality and professionalism at all times. Responsibilities - Managing correspondence: Distributing documents, emails, and other forms of communication, as well as maintaining a record of important communications for future reference. - Drafting: Creating documents and professional emails for internal and external use, including requisition slips for office supplies. - Filing and record-keeping: Ensuring the accuracy and organization of physical and digital records. - Data entry: Inputting and updating information in databases and spreadsheets. - Event coordination: Assisting in the planning and execution of office events, meetings, and training programs. Eligibility - Educational Background: Bachelor's degree or equivalent qualification. - Language Proficiency: Proficient in English (both written and verbal) to facilitate effective communication and documentation. - Skills: Proficiency in MS Office, strong time-management abilities, and the capacity to multitask effectively. Other Requirements - Ability to handle confidential information with discretion and professionalism. Travel - Travel may be required across the country for project execution, monitoring, and coordination with geographically dispersed teams. Communication - Interested candidates should submit a cover letter summarizing their experience in relevant technologies and software, along with a resume and the latest passport-size photograph.,

Associate - Admin

kanpur, uttar pradesh

2 - 6 years

INR Not disclosed

On-site

Full Time

The Associate Admin will be responsible for ensuring smooth office operations by managing correspondence, drafting documents, maintaining records, handling data entry, and coordinating office events. Your role will require strong organizational skills, attention to detail, and effective communication to support internal and external stakeholders. The ideal candidate should be proficient in English, documentation, administrative tasks, and event coordination while maintaining confidentiality and professionalism. Responsibilities Managing correspondence: Distributing documents, emails, and other communication. Keeping track of important communications for reference and documentation. Drafting: Drafting documents and professional emails for internal and external communication. Drafting and managing requisition slips for office supplies. Filing and record-keeping: Maintaining accurate and organized records, both physical and digital. Data entry: Entering and updating information into databases and spreadsheets. Event coordination: Support in planning and executing office events, meetings, and training programs. Eligibility Educational Background: Bachelor's degree or equivalent. Language Proficiency: Strong command of English (written and verbal) for effective communication and documentation. Skills: Proficiency in MS Office, strong time-management skills, and multitasking abilities. Other Requirements: Ability to handle confidential information with discretion and professionalism. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Please submit a cover letter summarizing your experience in relevant technologies and software along with a resume and the latest passport-size photograph.,

Engineer - VAPT

kanpur, uttar pradesh

3 - 7 years

INR Not disclosed

On-site

Full Time

As an IT/OT Vulnerability Assessment and Penetration Testing (VAPT) Engineer, you will play a crucial role in identifying and addressing security vulnerabilities within IT systems, Industrial Control Systems (ICS), and Industrial Internet of Things (IIoT) environments. Your primary responsibilities will involve conducting thorough security assessments on critical infrastructure, SCADA systems, PLCs, field devices, gateways, and cloud-connected IIoT platforms. By simulating advanced adversary tactics, you will uncover vulnerabilities and offer strategic guidance for remediation. This position requires individuals with a comprehensive understanding of enterprise IT security and industrial/embedded system ecosystems. Your duties will encompass various key areas: 1. Vulnerability Assessment & Penetration Testing (IT + ICS/IIoT): - Conduct black-box, grey-box, and white-box VAPT on a range of assets including enterprise IT assets, OT/ICS assets, and IIoT platforms. - Simulate APT-level attacks across different IT-OT architectures and execute Red Team scenarios to replicate insider threats or supply chain compromise. 2. ICS Protocol & Field Device Security Testing: - Analyze and exploit vulnerabilities in various ICS protocols. - Perform live traffic analysis, packet manipulation, and protocol fuzzing to evaluate resilience. - Assess control logic vulnerabilities in ladder logic, structured text, and function blocks. 3. Firmware & Hardware Exploitation (IIoT/ICS Devices): - Extract and analyze firmware from industrial devices using specific interfaces. - Conduct static and dynamic analysis utilizing various tools. - Reverse engineer file systems and analyze web interfaces or CLI backdoors. - Exploit misconfigured bootloaders, firmware upgrade mechanisms, or exposed debug ports. 4. Network Architecture & Segmentation Testing: - Review and test IT-OT segmentation via different configurations. - Evaluate trust relationships, weak credential policies, and insecure remote access. - Identify unauthorized bridging of air-gapped networks or misconfigured routing/switching. 5. Cloud & IIoT Platform Security: - Evaluate MQTT brokers, telemetry, and analytics pipelines. - Test REST APIs, mobile app integrations, and cloud misconfigurations. - Identify insecure certificate handling, default API tokens, and encryption issues. You will also be responsible for developing detailed technical and executive-level reports, recommending hardening measures for IT and OT systems, ensuring compliance with industry frameworks, and aligning assessments with regulatory standards. Additionally, you should have a Bachelor's or Master's degree in a relevant field and possess deep knowledge of ICS/SCADA systems, embedded architectures, and real-time operating systems. Hands-on experience with various security tools and certifications such as OSCP, GRID, GICSP, or CISSP are preferred. This role may involve travel across the country for project execution, coordination with distributed teams, and effective communication skills are essential. If you meet the requirements and are passionate about cybersecurity and industrial systems, we encourage you to submit a cover letter summarizing your experience along with a resume and a recent passport-size photograph.,

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Job Titles Overview