Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
7.0 - 12.0 years
8 - 15 Lacs
hyderabad
Work from Office
We are hiring for our one of reputed government client I4C- MHA for CDTI Hyderabad Role. * MCA or any other post-graduation degree in Engineering in CSE/IT/ Computer Science/ Electronics and Telecommunication, with the area of specialization in cyber security/inf-ormation Security/digital Forensics/ Understanding of network security, ciphers, data on the wire, shell scripting. Experience: 7+ Years Job Role: Detect emerging Cybercrime threats based upon analysis, data feeds crime reporting and sources (internal & external intelligence sources). Working within the team and the wider Information Security group to build new tools for intelligence gathering. * Knowledge of innovative technologies like block-chain, Artificial Intelligence/Machine Learning, IOT Security, Cloud Security will be an added advantage. * Knowledge of cryptography protocols. * Ability to derive intelligence out of data and reports generated and ability to conduct research in that direction and development of tools to handle such threats and overcome such risks. * Building and maintaining senior management dashboards to provide a clear understanding of team activities and threat landscape. * Identify and suggest appropriate infrastructure with suitable mitigation strategies for cyber crime * Evaluate target systems to analyze results of scans, identify and recommend resolutions * Producing periodic Cybercrime threat analysis reports with mitigation measures. * Programming skills with proficiency in one or more of the following, Python, Java, C++. * Excellent knowledge of digital hardware, computer programming, cyber security practices, databases & operating systems artifacts. * Review unlawful and suspicious content in open source and escalate violations to the appropriate govt. department. * Collect, organize, analyze and develop reliable actionable intelligence about cybercrime, criminals, criminal infrastructure from open sources. Must have advanced understanding of how to use open-source including social media for intelligence. * Ability to draft Sop's/ RFP/ Advisory Manuals/ Reports pertaining to Cyber Security/Inf-ormation Security/Cybercrime Investigation. * Proven ability to work both independently and as a team and present/develop ideas. * Ability to work effectively with technical and non-technical stakeholders. * Ability to communicate (verbal and written) with stakeholders in non-technical terms. * Experience with multiple social media platf-orms. * Using data from social media, open sources, search engines, public records, and the deep web to compile detailed reports on cybercrime, criminals and criminal infrastructure. Share your cv to d.darshani@cipl.org.in
Posted 6 days ago
5.0 - 9.0 years
0 Lacs
thane, maharashtra
On-site
As a skilled and proactive SOC Lead, you will play a crucial role in managing and enhancing our Security Operations Center capabilities. Your strong experience in cybersecurity operations, threat analysis, incident response, and team leadership will be instrumental in establishing and overseeing the SOC process. You will lead the day-to-day monitoring, manage a team of analysts, and drive the evolution of our threat detection and response processes. Your key responsibilities will include implementing various SIEM / XDR solutions, leading and coordinating the daily operations of the Security Operations Center, and supervising and mentoring SOC analysts. You will provide guidance on threat detection, triage, and incident handling, as well as review, escalate, and respond to security incidents in a timely manner. Continuous improvement of SOC playbooks, procedures, and incident response plans will be under your purview, along with overseeing threat intelligence gathering and its integration into detection capabilities. Collaboration with IT, network, and application teams to enhance security posture, leading threat-hunting initiatives, and proactively identifying potential risks are also part of your responsibilities. Moreover, you will be responsible for maintaining and optimizing SIEM, SOAR, and other security tools for effective coverage and alerting, while staying current on emerging threats, vulnerabilities, and best practices in security operations. To qualify for this role, you should have a Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or a related field, or equivalent experience. A minimum of 5-6 years of experience in cybersecurity, including at least 2 years of team handling experience, is required. Deep understanding of XDR / SIEM platforms, hands-on experience with incident response, threat analysis, malware analysis, and vulnerability management, as well as knowledge of attack frameworks and regulatory frameworks are essential. Strong analytical, problem-solving, and communication skills are also necessary. Preferred qualifications include professional certifications such as GCIA, GCIH, CEH, CISSP, ECIH, CHFI, experience with SOAR platforms and automation of security workflows, and exposure to cloud security environments and monitoring. If you are looking to make an impact in the field of cybersecurity and lead a dynamic team in safeguarding our organization's assets, this role as a SOC Lead is the perfect opportunity for you. Join us in our mission to stay ahead of emerging threats and ensure the highest level of security for our operations.,
Posted 1 week ago
5.0 - 9.0 years
0 Lacs
delhi
On-site
You should possess a B.E. / B. Tech / MCA degree and be certified with EC Council-CEH/Comptia Security+/CISSP/CHFI, along with any proposed OEM certification. With over 5 years of relevant experience, you must have expertise in managing all aspects of risk and incident analysis within a Security Operations Center (SOC), including overseeing projects for enterprise-scale clients. As a SOC Manager, your responsibilities will include deploying, maintaining, tuning, monitoring, and managing all facets of the client SOC. You will also be accountable for coordinating all SOC activities and ensuring effective communication across the team. Your role will involve monitoring security incidents and risks, implementing incident containment measures, identifying root causes, initiating problem resolution, and communicating risk responses efficiently. Additionally, you should have experience working with database security logs/alerts, database security protocols, access control mechanisms, identity management systems, encryption techniques, and data obfuscation methods. Proficiency in firewall management, Intrusion Prevention Systems (IPS), Anti-Advanced Persistent Threat (Anti-APT) solutions, and other relevant security technologies is essential for this role.,
Posted 1 week ago
1.0 - 6.0 years
7 - 12 Lacs
mumbai
Work from Office
About the Role We are seeking a dynamic and detail-oriented Cyber Forensic candidates to join our Forensic Team in Risk Advisory practice. The ideal candidate will have hands-on experience in cyber incident response, digital forensics, and threat investigations, and will be responsible for supporting high-impact engagements involving cyber breaches, fraud investigations, and forensic analysis. Role & responsibilities Conduct end-to-end digital forensic investigations across endpoints, servers, cloud, and mobile devices. Support cyber incident response engagements including containment, eradication, recovery, and root cause analysis. Perform evidence acquisition, chain of custody documentation, and forensic imaging using industry-standard tools and Chain of custody procedures. Analyze logs, memory dumps, and network traffic to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs). Assist in malware analysis, reverse engineering, and threat actor profiling. Prepare detailed technical reports and executive summaries for clients and internal stakeholders. Preferred candidate profile Bachelors or Masters degree in Computer Science, Information Security, Digital Forensics, or a related field from a reputed institute. 25 years of relevant experience in cyber forensic and incident response. Strong understanding of Windows, Linux, and cloud environments (AWS, Azure, GCP) including log acquisition. Experience with forensic tools such as EnCase, FTK, X-Ways, Autopsy, Cellebrite, Magnet AXIOM. Preferred Certifications (any one) GCFA (GIAC Certified Forensic Analyst) GCIH (GIAC Certified Incident Handler) CHFI (Computer Hacking Forensic Investigato
Posted 3 weeks ago
4.0 - 8.0 years
0 Lacs
karnataka
On-site
You should have a Diploma / Bachelors / Masters Degree along with a minimum of 4-5 years of experience in a Security Operations Centre (SOC) or incident response team. It is required to possess at least one valid certification among Security+, CEH, CISSP, OSCP, CHFI, ECSA, GCIH, GCIA, GSEC, GCFA, or Cisco Cyber OPS certification. Being flexible to work in 24/7 shifts is a must. Your responsibilities will include 24/7 monitoring, triaging, and analyzing security events and alerts, as well as conducting malware analysis, including reverse engineering. You should have experience in coordinating incident response and troubleshooting across a global organization. It is important to be familiar with core concepts of security incident response and have a strong knowledge of email security threats and controls. Additionally, you should have a good understanding of Threat Intel and Hunting, network fundamentals, common Internet protocols, and experience in analyzing network traffic using tools like Wireshark. Experience in reviewing system and application logs, investigating security issues within Cloud infrastructure, and using SIEM tools such as Splunk, AlienVault, QRadar, ArcSight or similar is essential. Moreover, you should have experience in creating new detection rules and correlation rules, defining use cases for playbooks and runbooks, understanding log types and log parsing, and a strong passion for information security. A good understanding of CIS requirements is also required for this role.,
Posted 1 month ago
0.0 - 5.0 years
2 - 6 Lacs
Noida
Work from Office
Roles and Responsibilities can take corporate and classroom regular training batches of students and professionals Desired Candidate Profile CEHv12, NPT, WAPT, Linux, Cyber Security, Ethical Hacking Perks and Benefits 2 Lac to 6 Lacs
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
As a member of Cyberpwn, you will be part of a team that is dedicated to revolutionizing the conventional approach to cyber consulting. Our vision is to establish a cutting-edge cyber consulting firm that empowers organizations to enhance their cyber resilience. However, this mission cannot be achieved single-handedly. We are seeking individuals who share our passion and are eager to tackle challenges that create a tangible impact. At Cyberpwn, we are committed to providing a conducive environment where our employees can develop and enhance their skills. Our work culture embodies a non-traditional ethos that emphasizes independence and embraces new ideas. We believe that a thriving work culture is a combination of attitudes, beliefs, behaviors, and a community of like-minded individuals. Our focus lies not in the number of hours you work or your physical location, but in meeting the objectives you set for yourself. We maintain a flat organizational structure that offers equal opportunities for everyone to express themselves. The well-being of our team members is paramount to us, and we strive to ensure a balanced work-life environment for each individual. At Cyberpwn, our employees are valued above all else, a principle we adhere to steadfastly. In this role, you will have the opportunity to independently conduct proof of concepts (POCs) and client demonstrations, engage with Imperva and client contacts during the pre-sales phase, lead a team in designing and implementing DAM solutions for customers, and provide end-user training sessions on the implemented solutions. You will be responsible for defining and refining deliverables, drafting proposals and statements of work (SoWs), estimating efforts for engagements, conducting internal technical training sessions, and serving as the primary technical point of contact. Additionally, you will be encouraged to innovate and ideate new solutions centered around DAM, perform health check assessments of existing implementations, and support pre-sales activities for Managed Services engagements. To excel in this role, you should possess hands-on experience in Imperva DAM implementation and incident monitoring, a knack for identifying and implementing use cases and configuring policies, and familiarity with MX and Gateway installation and integration. Proficiency in creating security and audit policies, modifying MX policies, reporting, dashboard operations, DDL, DML, DCL, MSSQL, MYSQL, MongoDB, and knowledge of security infrastructure, including Security Operations Centre, are essential. A security certification such as CEH, CHFI, GSEC, GMON, or ITIL, and relevant OEM certifications in administering Imperva Security Infrastructure, Database Security and Compliance, and IDSC are preferred. Join us at Cyberpwn and be part of a dynamic team that values freedom, innovation, inclusivity, and continuous learning. Experience a work culture that prioritizes attitude over attire and fosters a collaborative and harmonious environment where your ideas are heard and your growth is nurtured.,
Posted 1 month ago
0.0 - 3.0 years
1 - 4 Lacs
Malappuram
Work from Office
RedTeam Hacker Academy seeks a skilled Cyber Security Trainer to deliver hands-on training in CEH, CPENT, CySA+, and more. Must have strong tech skills, certifications, and a passion for teaching. Online/offline sessions + mentoring responsibilities.
Posted 2 months ago
6.0 - 11.0 years
9 - 14 Lacs
New Delhi, Hyderabad
Work from Office
Company Name- CIPL (www.cipl.org.in) We have opening for our one government client Ministry of Home Affairs. Client Name- I4C (Indian Cybercrime Coordination Centre) Designation- Cybercrime Threat Intelligence Analyst - Hyderabad , Vacancy -1 Cybercrime Investigator/ Cyber Crime Investigation Researcher - Delhi , Vacancy- 2 Detect emerging Cybercrime threats based upon analysis, data feeds crime reporting and sources (internal & external intelligence sources). Working within the team and the wider Inf-ormation Security group to build new tools for intelligence gathering. * Knowledge of innovative technologies like block-chain, Artificial Intelligence/Machine Learning, IOT Security, Cloud Security will be an added advantage. * Knowledge of cryptography protocols. * Ability to derive intelligence out of data and reports generated and ability to conduct research in that direction and development of tools to handle such threats and overcome such risks. * Building and maintaining senior management dashboards to provide a clear understanding of team activities and threat landscape. * Identify and suggest appropriate infrastructure with suitable mitigation strategies for cyber crime * Evaluate target systems to analyze results of scans, identify and recommend resolutions * Producing periodic Cybercrime threat analysis reports with mitigation measures. * Programming skills with proficiency in one or more of the following, Python, Java, C++. * Excellent knowledge of digital hardware, computer programming, cyber security practices, databases & operating systems artifacts. * Review unlawful and suspicious content in open source and escalate violations to the appropriate govt. department. * Collect, organize, analyze and develop reliable actionable intelligence about cybercrime, criminals, criminal infrastructure from open sources. Must have advanced understanding of how to use open-source including social media for intelligence. * Ability to draft Sop's/ RFP/ Advisory Manuals/ Reports pertaining to Cyber Security/Inf-ormation Security/Cybercrime Investigation. * Proven ability to work both independently and as a team and present/develop ideas. * Ability to work effectively with technical and non-technical stakeholders. * Ability to communicate (verbal and written) with stakeholders in non-technical terms. * Experience with multiple social media platf-orms. * Using data from social media, open sources, search engines, public records, and the deep web to compile detailed reports on cybercrime, criminals and criminal infrastructure.
Posted 2 months ago
12.0 - 15.0 years
55 - 60 Lacs
Ahmedabad, Chennai, Bengaluru
Work from Office
Dear Candidate, We are seeking a Cybersecurity Analyst to detect, investigate, and prevent security threats across digital assets and systems. Key Responsibilities: Monitor and analyze security alerts, logs, and events. Perform threat intelligence, malware analysis, and incident response. Conduct vulnerability assessments and patch management. Support compliance and audit activities (ISO, NIST, GDPR). Educate staff on cybersecurity best practices and awareness. Required Skills & Qualifications: Experience with SIEM tools (Splunk, AlienVault, QRadar). Knowledge of firewalls, IDS/IPS, endpoint protection, and antivirus. Familiarity with scripting for automation and reporting. Strong analytical, investigative, and communication skills. Security certifications preferred (e.g., CompTIA Security+, SOC Analyst, CISSP). Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies
Posted 3 months ago
1.0 - 5.0 years
7 - 17 Lacs
Gandhinagar
Work from Office
1. Sr. Security Analyst / Sr. Technology Specialist Qualifications and Experience: - Education: B.E. / B. Tech / MCA degree - Certified with: EC Council-CEH / CompTIA Security+ / CISSP / CHFI, Proposed OEM certification - 5+ years of relevant experience in managing all aspects of risk and incident analysis in SOC - Must have experience in managing at least 1 project for enterprise scale clients - Shall be responsible for deployment, maintaining, tuning, monitoring, and managing all aspects of client SOC - Responsible for coordinating, in a timely manner, all activities necessary for: - Security incident monitoring - Analysing incidents / risks - Incident / risk containment - Identifying root cause - Initiating problem resolution - Incident / risk response and communication - Experience monitoring database security logs/alerts and complete ownership of the same - Well versed in database security, access control, identity management, encryption of data, data obfuscation techniques - Experience with firewall, IPS, Anti-APT solution, etc. 2. Security Analyst Qualifications and Experience: - Education: B.E. / B. Tech / MCA degree - Certified with: OEM Certification / Certified SOC Analyst (CSA) - EC Council / CompTIA CySA+ - 3+ years of overall experience with at least 1 year of relevant experience in all aspects of Incident monitoring in SOC
Posted 3 months ago
3.0 - 5.0 years
4 - 6 Lacs
Noida, New Delhi, Gurugram
Work from Office
Incident handling, forensic analysis, and VAPT SIEM tools cybersecurity frameworks Log analysis, monitoring, detecting and investigating security incidents and breaches. CEH,CSA,CompTIA Security+,GCIH,security incidents
Posted 3 months ago
12.0 - 15.0 years
55 - 60 Lacs
Ahmedabad, Chennai, Bengaluru
Work from Office
Dear Candidate, We are hiring a Digital Forensics Analyst to investigate cyber incidents, recover digital evidence, and support legal and compliance teams. Ideal for professionals with a strong background in cybersecurity and forensic analysis. Key Responsibilities: Perform forensic imaging and analysis on digital devices Investigate incidents involving malware, breaches, or data leaks Document evidence for regulatory, legal, or HR use Collaborate with SOC and legal teams to support investigations Required Skills & Qualifications: Experience with forensic tools (EnCase, FTK, Autopsy, X-Ways) Knowledge of file systems, OS internals, and memory analysis Understanding of chain-of-custody and evidence handling Bonus: GIAC (GCFA, GCFE) or related digital forensics certifications Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies
Posted 3 months ago
0.0 - 5.0 years
5 - 9 Lacs
Pune
Work from Office
Responsibilities: Monitor systems, respond to incidents. Collaborate with teams on threat management strategies. Manage access control & encryption. Maintain compliance standards. Conduct regular security assessments. Office cab/shuttle Food allowance Health insurance Provident fund
Posted 3 months ago
6.0 - 11.0 years
12 - 20 Lacs
gurugram
Remote
We are seeking a dynamic and certified Delivery Manager – Security to lead and scale our cybersecurity service delivery. Ensure delivery of high-quality, customer-centric training programs. Design advanced training programs with EC-Council, Comptia. Required Candidate profile The ideal candidate will have proven track record of managing high-performing technical teams, delivering global consulting engagements, mentoring professionals across diverse cybersecurity domains.
Posted Date not available
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |