Kanpur, Uttar Pradesh, India
Not disclosed
Remote
Full Time
Description As an Automotive Cybersecurity Engineer, you will be responsible for assessing and enhancing the security of connected vehicles through advanced penetration testing, wireless and hardware exploitation, and embedded system analysis. You will evaluate vehicle communication systems, infotainment platforms, and remote entry mechanisms to identify vulnerabilities that could compromise vehicle safety, privacy, and functionality. This position is ideal for cybersecurity professionals passionate about automotive technologies, embedded interfaces, and threat simulation. Responsibilities Perform Security Testing of In-Vehicle Systems: Conduct assessments of vehicle internal networks (e.g., CAN, OBD-II) to identify and exploit vulnerabilities in communication flows and control mechanisms. Analyze infotainment systems and user interfaces for privacy concerns, data leakage, and potential malware injection points. Simulate remote and physical attack vectors, including key fob signal replay, wireless intrusion, and unauthorized access. Evaluate Embedded & Wireless Communication Interfaces: Assess the security of Bluetooth, Wi-Fi, and RF-based protocols used in the vehicle ecosystem. Examine communication channels between connected mobile applications, infotainment clusters, and backend services. Test for privilege escalation, data interception, and firmware or hardware manipulation. Reverse Engineer Vehicle Architectures: Understand and map circuit-level data flows across ECUs and control modules. Extract and analyze firmware, debug interfaces, and physical ports for security analysis. Utilize diagnostic tools, CAN analyzers, and SDR platforms for in-depth testing. Identify Vulnerabilities and Recommend Mitigation: Document test findings with detailed risk assessments and technical evidence. Work with internal teams and OEMs to recommend security hardening measures. Contribute to the ongoing improvement of testing methodologies and lab capabilities. Stay Aligned with Industry Standards: Ensure compliance with national and international automotive cybersecurity standards, including AIS 189, ISO/SAE 21434, and UN R155. Stay updated on emerging vehicle technologies and cyber threat landscapes. Eligibility Educational Background: Bachelor’s degree in electrical/Electronics, Computer Science, Cybersecurity, or related discipline. Technical Skills: Knowledge of vehicle networking protocols (CAN, LIN, UDS). Experience with CAN analysis tools (CANalyzer, SavvyCAN, PCAN). Familiarity with Android-based systems, ADB, rooting, and mobile OS exploitation. Experience in wireless exploitation (Wi-Fi, Bluetooth, RF using SDR). Circuit and system-level debugging, reverse engineering PCBs, or automotive modules. Experience: 1–4 years of experience in penetration testing, embedded security, or automotive security assessment. Desired Eligibility Exposure to AIS 189 or ISO/SAE 21434 frameworks. Participation in hardware-based CTFs, red teaming, or automotive-focused security research. Familiarity with tools such as Metasploit, Burp Suite, IDA Pro, Ghidra, Wireshark, and SDR tools. Certifications like CEH, CRTP, OSCP, PJPT, PNPT, or relevant embedded/automotive certifications. Ability to work in lab environments and travel for on-site testing engagements. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less
Kanpur, Uttar Pradesh, India
Not disclosed
Remote
Full Time
Description As an IT/OT Vulnerability Assessment and Penetration Testing (VAPT) Engineer, you will be engaged in identifying and mitigating security vulnerabilities across IT systems, Industrial Control Systems (ICS), and Industrial Internet of Things (IIoT) environments. Your work will involve rigorous security assessments of critical infrastructure, SCADA systems, PLCs, field devices, gateways, and cloud-connected IIoT platforms. You will simulate advanced adversary tactics to expose vulnerabilities and provide strategic remediation guidance. The role is suited for professionals with a deep understanding of both enterprise IT security and industrial/embedded system ecosystems. Responsibilities 1-Vulnerability Assessment & Penetration Testing (IT + ICS/IIoT): Perform black-box, grey-box, and white-box VAPT on: Enterprise IT assets (servers, databases, web/mobile apps, Active Directory, cloud) OT/ICS assets (PLCs, RTUs, HMIs, engineering workstations, protocol gateways) IIoT platforms (MQTT/CoAP-based telemetry, edge gateways, cloud dashboards) Emulate APT-level attacks across air-gapped, segmented, or hybrid IT-OT architectures. Execute Red Team scenarios to simulate insider threats or supply chain compromise. 2- ICS Protocol & Field Device Security Testing: Analyze and exploit vulnerabilities in ICS protocols: Modbus TCP, DNP3, IEC 104, OPC-UA, S7comm, Profinet, BACnet, CIP (EtherNet/IP), MQTT, CoAP Perform live traffic analysis, packet manipulation, and protocol fuzzing to test resilience. Evaluate control logic vulnerabilities in ladder logic, structured text, and function blocks. 3- Firmware & Hardware Exploitation (IIoT/ICS Devices): Extract and analyze firmware from industrial devices using JTAG, UART, SPI interfaces. Perform static and dynamic analysis using Ghidra, Binwalk, Radare2, or IDA Pro. Reverse engineer file systems (e.g., squashfs, cramfs) and analyze web interfaces or CLI backdoors. Exploit misconfigured bootloaders, insecure firmware upgrade mechanisms, or exposed debug ports. 4- Network Architecture & Segmentation Testing: Review and test IT-OT segmentation via firewall ACLs, VLANs, DMZ configurations. Assess trust relationships, weak credential policies, and insecure remote access (e.g., exposed VNC, Telnet, RDP). Identify unauthorized bridging of air-gapped networks or misconfigured routing/switching. 5- Cloud & IIoT Platform Security: Evaluate MQTT brokers, edge-to-cloud telemetry, and analytics pipelines. Test REST APIs, insecure mobile app integrations, and cloud misconfigurations (S3, IAM, IoT Core). Identify insecure certificate handling, default API tokens, and lack of encryption at rest/in transit. Reporting & Mitigation Develop technical and executive-level reports with CVSS scoring, attack paths, and exploitation evidence. Recommend hardening measures for both IT (patches, SIEM, EDR) and OT (control policy tuning, physical zoning, least privilege for operators). Coordinate with ICS engineers, IT admins, and SOC teams for patch validation and monitoring upgrades. Compliance & Framework Alignment Ensure assessments comply with industry and regulatory frameworks: NIST SP 800-82, ISA/IEC 62443, ISO 27001, NERC CIP, SANS ICS Top 20 Map findings to MITRE ATT&CK for ICS and monitor emerging CVEs relevant to industrial products. Eligibility Educational Background: Bachelor’s or Master’s in Cybersecurity, Computer Science, Industrial Automation, Electronics, or a related field. Technical Skills: Deep knowledge of ICS/SCADA systems, embedded architectures, and real-time OS (VxWorks, QNX, FreeRTOS). Hands-on experience with tools: VAPT Tools: Nessus, Burp Suite, Metasploit, Nmap, Nikto, SQLMap ICS Tools: Wireshark, Scapy, PLCScan, ICSFuzz, S7comm Tools, Conpot, ModScan Firmware Tools: Binwalk, Ghidra, Radare2, OpenOCD, Logic Analyzers IIoT Security: Shodan, Censys, MQTTX, Postman, OWASP ZAP Certifications (Preferred): OSCP, GRID, GICSP, CRT, CRTP, CEH, CISSP, or equivalent. Participation in ICS/IoT-focused CTFs or open-source contributions is a plus. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less
Kanpur, Uttar Pradesh, India
Not disclosed
On-site
Full Time
Description As a Blockchain Intelligence Analyst, you will collect, analyze, and report on intel leads (e.g., crypto exchanges, fraud) ensuring best-in-class intelligence, problem solving, and ability to turn data into insights. You will collaborate with expert minds in academics, industry, and Law enforcements to build scalable systems to detect, prevent, and mitigate cryptocurrency fraud and financial crime. This is an exciting opportunity to make a measurable impact within a corporate environment that values precision, innovation, and strategic thinking. Responsibilitie s ● Analyze user behavior on different virtual asset service providers (such as marketplaces, and exchanges). This task requires one to perform OSInt and extract relevant information about the platform. ● Develop related pipeline using Python and other technologies. ● Support product and analytics teams in building data-pipelines and business logic. ● Develop strategies to counter concealment measures used by service providers (captchas, closed group invites etc). ● Establish partnerships with 3rd party data vendors, research bodies, anti-cybercrime groups. ● Monitor forums for cybercrime intelligence. ● Develop intelligence reports for marketing and SAR reports for Law Enforcement Agencies. Eligibility ● Proven work experience in intelligence-related positions, ideally in Blockchain Intelligence (This is not an entry-level position). ● Proficiency and expertise in different methods used for OSInt. ● Strong ability to synthesize, interpret, and report complex information clearly and accurately. ● Knowledge of blockchain technologies and different platforms, with a focus on tracing transactions and identifying malicious activity. Also have working knowledge of cryptocurrencies, darknet marketplaces, Tor, experience in making payments with Bitcoin and Ethereum. ● Excellent communication skills to collaborate with cross-functional teams and able to explain to others with no technical knowledge. ● Ability to research in another language also (Please specify the language(s) in your application). ● Proficiency in Python, MongoDB, Neo4j, Cypher, Git. Desired Eligibility ● Relevant certifications and experience in cybersecurity or intelligence gathering. ● Working knowledge of SQL is preferred. ● Bachelor's degree or above in Computer Science or related field. ● Prior experience working in fast-paced environments or startups. ● Prior experience in publishing research oriented articles in A* journals. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less
Kanpur, Uttar Pradesh, India
Not disclosed
On-site
Full Time
Description Design, implement, and manage deception strategies and technologies within the organisation's cybersecurity infrastructure. Responsibilities Hands-on experience in working with Deception Technology and SIEM Tools Design and development of scalable, reliable, and fault-tolerant systems. Integrate/Modify existing open-source software according to the requirements. Prepare presentations and reports. Authoring research papers. Hands-on experience in virtualisation, cloud deployments, and networking. Ability to debug code and overcome fundamental challenges while coding. Hands-on experience in Python. Knowledge of tools like -- nmap, Metasploit, Wireshark, Burp suite, etc. Comfortable in using Linux OS. Good writing and communication skills to assist the group in technical writing. Eligibility A Bachelor's degree in computer science or a similar subject is required. 2 years of experience in the same domain as mentioned under the category of responsibilities. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less
Kanpur, Uttar Pradesh, India
Not disclosed
On-site
Full Time
Description Design, implement, and manage deception strategies and technologies within the organisation's cybersecurity infrastructure. Responsibilities Hands-on experience in working with Deception Technology and SIEM Tool. Design and development of scalable, reliable, and fault-tolerant systems. Integrate/Modify existing open-source software according to the requirements. Prepare presentations and reports. Authoring research papers. Hands-on experience in virtualisation, cloud deployments, and networking. Ability to debug code and overcome fundamental challenges while coding. Hands-on experience in Python. Knowledge of tools like -- nmap, Metasploit, Wireshark, Burp suite, etc. Comfortable in using Linux OS. Good writing and communication skills to assist the group in technical writing. Eligibility A Bachelor's degree in computer science or a similar subject is required 2 years of experience in the same domain as mentioned under the category of responsibilities Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less
Kanpur, Uttar Pradesh, India
Not disclosed
On-site
Full Time
Description We are looking for a data engineer and scientist with a deep understanding of blockchain network protocols, infrastructure, systems engineering, distributed systems, and architectural design. The candidate will lead research and ideation to scale data infrastructure and feasibility in production. The candidate will have the opportunity to expand expertise in different areas of engineering and applied research. This is an exciting opportunity to make a measurable impact within a corporate environment that values precision, innovation, and strategic thinking. Responsibilities Architect and build a highly scalable, resilient, and distributed system that integrates a variety of data sources. Standardizing data schemas Maintain servers and Build performant, and reliable production-grade systems. Design and optimize protocol implementations. Work across the tech stack (ETL, cache, code, deploy) Mentor fellow team members and participate in code reviews and design reviews Collaborate cross-functionally with other data scientists, designers, and product managers - to define and implement services. Develop novel clustering approaches to tackling blockchain-specific challenges around scale, security, and privacy. Research on privacy preserving blockchains Develop related pipeline using Python and other technologies Support product and intelligence teams. Eligibility Bachelor's degree or above in Computer Science or related field. At least 1 Year of experience in related domain & skills. Experience in building real time highly dynamic and data heavy systems Ability to work independently, be proactive, prioritize, and communicate novel ideas experience working in fast-paced environments or startups Prior experience in publishing research oriented articles in A* journals. Proficiency and expertise in different data platforms. Proficiency in Python, Kafka, websockets, Elasticsearch, MongoDB, Kubernetes, Docker, Neo4j, Cypher, Wireshark, Git, AWS, Google Cloud, Swagger, Linux, VS, Solidity, and network protocols. Strong ability to synthesize, interpret, and report complex information clearly and accurately. Knowledge of blockchain technologies and different platforms, with a focus on tracing transactions and identifying malicious activity. Also have working knowledge of cryptocurrencies, darknet marketplaces, Tor, experience in making payments with bitcoin and ethereum Compensation. Excellent communication skills to collaborate with cross-functional teams and able to explain to others with no technical knowledge. Understanding of coding standards Desired Eligibility Relevant certifications and experience in cybersecurity or intelligence gathering. Working knowledge of SQL is preferred. Prior experience working in fast-paced environments or startups. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Show more Show less
Kanpur, Uttar Pradesh, India
Not disclosed
On-site
Full Time
Description We are looking for a motivated and detail-oriented System Engineer to join our IT Security team. The ideal candidate will assist in monitoring and responding to cybersecurity alerts, supporting incident response efforts, helping to develop and enforce security policies, conducting cybersecurity awareness initiatives, and coordinating with government and industry cybersecurity bodies. Responsibilitie sManage and coordinate responses to cybersecurity incidents, including identifying, analysing, and mitigating the impact of security threats and breaches .Contribute to the development and implementation of IT security policies, ensure organizational compliance, and periodically review policies to align with evolving threats and technologies .Organize training sessions, simulations, and awareness campaigns to educate employees on cybersecurity best practices and protocols .Maintain communication with CERT-In and other relevant government and industry organizations to stay informed about emerging threats and collaborate on security initiatives .Stay updated with current cybersecurity trends, participate in relevant training, earn certifications (e.g., CISSP, CEH, CISM), and attend industry conferences . Eligibili tyBachelor's degree in Computer Science, Information Technology, or a related field (or equivalent practical experience ).Strong understanding of Networking, Operating Systems, System Administration, Threats, and Vulnerabilitie s.Familiarity with cybersecurity frameworks such as NIST, ISO 27001, and CIS Control s.Knowledge of national and international cybersecurity standards, regulations, and best practice s.Professional, courteous, cooperative, and a team player with a high level of integrit y.Excellent communication, presentation, negotiation, and interpersonal skill s.Experience and maturity in interacting with senior stakeholders and building trusted relationship s.Proven ability to manage internal and external communications during and after security incident s.Minimum of 2 years’ experience in security technologies as a Support Engineer or Analys t.Experience in analysing logs from multiple sources (e.g., network devices, servers, applications) to detect and respond to security incident s.Skilled in developing and executing incident response plans, with knowledge of forensics, threat hunting, and investigative technique s.Ability to gather, interpret, and apply cyber threat intelligence to strengthen security postur e.Proficient in scripting languages like Python and PowerShell for automation and tool developmen t.Experience in patch management to ensure systems are secure and up to dat e. Desired Eligibil ityProfessional certifications such as CISSP, CISM, CEH, CompTIA Security+, or similar recognized credentia ls. Tr avelAs and when required, across the country for project execution and monitoring, as well as for coordination with geographically distributed te ams. Communic ationSubmit a cover letter summarising your experience in relevant technologies and software, along with a resume and the Latest passport-size photog raph. Show more Show less
Kanpur, Uttar Pradesh, India
Not disclosed
On-site
Full Time
Description We are seeking an experienced and highly skilled Network Engineer to design, implement, manage, and monitor both local and wide area networks (LAN/WAN) to ensure maximum uptime, security, and performance. This role involves planning and documenting system configurations, overseeing the installation of new networks, and maintaining/upgrading existing infrastructure as needed. The ideal candidate should have strong troubleshooting skills and a collaborative mindset to resolve issues effectively. Responsibilitie sDesign, implement, and manage advanced network solutions, including VLANs and hybrid environments, ensuring scalability and high availability .Configure and maintain Access Control Lists (ACLs), firewall policies, switches, and routers to enforce secure network segmentation and traffic control .Deploy and manage redundancy and routing protocols (e.g., OSPF, BGP, VRRP) to ensure optimal data flow and system resilience .Apply Quality of Service (QoS), load balancing, and traffic shaping techniques to enhance performance and prioritize mission-critical applications .Implement robust network security measures such as IPS/IDS, VPNs, firewall configurations, Network Access Control (NAC), and endpoint protection to prevent vulnerabilities and unauthorized access .Automate network configurations using scripting tools like Python or Ansible, and proactively monitor network health using tools like Wireshark. SolarWinds, or Nagios .Configure and manage NAT, VLANs, switches, and traffic management policies to support efficient resource utilization and segmentation .Maintain accurate and detailed network documentation, including topology maps, configuration backups, firewall settings, and redundancy plans, to support ongoing maintenance and disaster recovery processes . Eligibili tyBachelor's degree in Information Technology, Computer Science, or a related disciplin e.Minimum of 3 years of experience in network engineering or IT infrastructure suppor t.Strong grasp of networking fundamentals, including TCP/IP, DHCP, DNS, NAT, and VLAN s.Hands-on experience configuring and troubleshooting routers, switches, firewalls, and related network device s.Familiarity with network monitoring and diagnostics tool s. Desired Eligibil ityIndustry certifications such as CCNA, CompTIA Network+, or similar are recognized credentia ls. Tr avelAs and when required, across the country for project execution and monitoring, as well as for coordination with geographically distributed te ams. Communic ationSubmit a cover letter summarising your experience in relevant technologies and software, along with a resume and the Latest passport-size photog raph. Show more Show less
Kanpur, Uttar Pradesh, India
Not disclosed
On-site
Full Time
Description We are looking for an experienced DevOps Engineer with a strong background in on-premise infrastructure management and hands-on expertise in Kubernetes, GitLab CI/CD, and Docker. The ideal candidate will be responsible for managing and optimizing infrastructure pipelines, enhancing automation in deployments, and ensuring system reliability, security, and high availability. Responsibilities Design, deploy, and administer on-premises Kubernetes clusters using tools such as kubeadm, k3s, or k0s to support scalable application infrastructure. Configure and maintain robust GitLab CI/CD pipelines to streamline continuous integration, testing, and deployment processes. Develop and maintain Docker-based environments across development, testing, and production stages to ensure consistency and efficiency. Implement and manage infrastructure using Ansible or Terraform, with a focus on tailored solutions for on-premises environments. Architect and maintain secure, resilient infrastructure supporting microservices and internal platforms to ensure high availability and performance. Diagnose and resolve complex environment-related issues, including container orchestration, networking, and deployment failures. Create and maintain detailed internal documentation and operational playbooks to support standardized DevOps practices. Participate in a rotating on-call schedule to provide 24/7 operational support for critical production systems. Identify repetitive tasks and implement automation to minimize manual intervention and improve operational efficiency. Design and manage infrastructure using tools like Terraform and Kubernetes Composite Resource Definitions (XRDs) to support dynamic scaling and management. Implement robust security measures to safeguard infrastructure, applications, and data, ensuring compliance with internal and industry standards. Act as a bridge between development and operations teams to facilitate seamless software releases and quick resolution of production issues. Conduct root cause analysis (RCA) for production incidents and implement measures to prevent recurrence. Continuously monitor and optimize system performance, proactively identifying and resolving bottlenecks and implementing capacity planning strategies. Maintain comprehensive records of systems architecture, configurations, processes, and incident resolutions. Drive ongoing improvements in infrastructure, tools, and processes to enhance system reliability, scalability, and performance. Eligibility Minimum of 3 years of hands-on experience as a DevOps Engineer. Strong expertise in Kubernetes administration for on-premises (non-cloud) environments. Proficient in designing and optimizing GitLab CI/CD pipelines. In-depth understanding of Docker and its container lifecycle management. Solid working knowledge of Linux-based systems, system administration, and core networking concepts. Experience with monitoring and logging tools such as Prometheus, Grafana, or the ELK Stack. Scripting proficiency in Bash, Python, or Go. Desired Eligibility Experience with self-hosted GitLab runners and artifact registries. Knowledge of service mesh architectures (e.g., Istio, Linkerd). Familiarity with security best practices in containerized and orchestrated environments. Exposure to load balancing tools such as HAProxy, Nginx, or Traefik. Travel As and when required, across the country for project execution and monitoring, as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software, along with a resume and the Latest passport-size photograph. Show more Show less
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.