You are an ambitious individual who is eager to take advantage of the learning opportunities in a rapidly growing global leader in information and cyber security. You should possess knowledge of key technologies and solutions in software development as well as an understanding of top Security applications. Being informed about the latest technology trends is essential for you. Your primary responsibilities include developing innovative sales and marketing strategies to enhance profitability in your designated territory and accounts. You will be required to conduct pre-sales technical presentations and demos for potential customers and partners, particularly during product launches and initial engagements. Initiating pre-sales activities, providing consulting services, defining project scopes, and preparing proposals are also part of your role. As a representative of the company, you will engage with clients, conduct market research to identify target markets, create case studies and presentations, and generate periodic sales reports for business growth analysis. Additionally, you will be responsible for preparing client proposals, RFPs, RFQs, sales and marketing collaterals, and offering post-proposal support throughout the sales cycle. You will also be involved in creating internal software requests, developing POC implementation plans, and overseeing the approval process, including preparing software order forms. Collaborating with the sales team, you will assist in crafting a sales cycle plan and support customers, prospects, and Sales Representatives in building compelling and competitive business cases and ROI analyses. Introducing customers to evolving product markets and recommending feasible implementations for Software Security products will be part of your role. Furthermore, you will manage the handover to the Services Functions (Post-Sales Support and Professional Services) for live project implementation.,
You are seeking an exceptional Web Developer to take charge of the coding, creative design, and layout of our website. Your responsibilities will include constructing the website from inception to finish, crafting every element from the homepage to site structure and functionality. Your essential skills should encompass a thorough understanding and experience in UI development, proficiency in HTML5, CSS3, SCSS, and JavaScript concepts, as well as comprehension of Responsive Design/Development principles. In this role, you will need to grasp the data model, design, and implement the code in alignment with the functional requirements. You will be expected to provide development estimates, guide junior team members, write code in various programming languages, and design the architecture of application components, technologies, and languages. Additionally, you should be adept at testing sites and applications across diverse browsers and environments, learning and experimenting with new technologies, frameworks, and languages. Your qualifications should include robust JavaScript skills with a minimum of 1 year of experience, proficiency in JavaScript Design Patterns, and a strong command of relational databases, PHP, front-end technologies, PHP frameworks, and MySQL databases. We expect you to write clean, well-structured code, adhere to best design and coding practices, and possess knowledge of different design patterns. Furthermore, you should be able to troubleshoot and resolve issues in existing projects efficiently.,
As an individual responsible for operational roles and responsibilities, your main tasks will include executing application and network penetration tests of varying complexity levels using both automated tools and manual methods. You will need to develop detailed work plans, schedules, and resource plans for recurring penetration tests, and provide summaries of findings along with recommended corrective measures. Additionally, it will be crucial for you to advise leadership on the technical and business risks associated with identified vulnerabilities, liaising with external 3rd party pen testers when necessary. In this role, you will be expected to establish and report on metrics that measure the effectiveness of penetration testing, track progress, and highlight key risk areas identified through audits. Identifying risks and escalating potential project issues to management will also be part of your responsibilities. You will need to implement changes to procedures and systems aimed at enhancing data systems security while recommending process improvement strategies to optimize security measures. Furthermore, you will be required to offer the highest level of technical expertise and support to management and staff members during risk assessments and the implementation of data security procedures and products. It will also be essential for you to identify security violations, determine their causes, and suggest corrective actions to maintain data security. Apart from the operational tasks mentioned above, you should possess the ability to effectively lead a high-performing team through complex people and technology changes. A solid understanding of software development methodologies and best practices is crucial, along with proficiency in at least one modern compiled programming language such as C, C++, C#, or Java. Knowledge of professional software engineering best practices throughout the software development life cycle, including coding standards, code reviews, source control management, build processes, testing, and operations, will be beneficial. Additionally, a good grasp of XML, XML schema, JavaScript, and HTML is preferred for this role.,
As an ideal candidate for this position, you should hold either a CEH Certification or ECSA Certification. Having additional certifications such as CISA Certification or CISSP Certification would be highly beneficial. With 2-3 years of experience, you will be responsible for various operational roles and responsibilities. Proficiency in programming languages like C/C++, Java, Dot Net, as well as familiarity with scripting languages like perl, php, python, or bash is essential. Your expertise in web application penetration testing and network penetration testing will be crucial for this role. Moreover, you should have a good understanding of hardening guidelines for databases, servers, firewalls, and other relevant systems. Knowledge of secure software development standards, processes, techniques, and tools is required. Familiarity with security technologies like cryptography, authentication techniques, and protocols is also important. You should possess knowledge of security development lifecycle processes across different technologies. In addition to technical skills, analytical skills, the ability to work independently with minimal supervision, and strong communication skills are essential. Proficiency in using tools like Word, Excel, and PowerPoint is also expected.,
You will be responsible for selling products by establishing contact and developing relationships with prospects. This will involve recommending appropriate solutions to meet the needs of potential clients. Additionally, you will need to maintain relationships with existing clients by providing support, information, and guidance. You will also be expected to research and recommend new opportunities for clients, as well as suggest profit and service improvements. To excel in this role, you will need to stay current on industry trends, market activities, and competitors in order to identify product improvements or new products. You will be required to prepare reports based on collected data, analyzing and summarizing information to provide valuable insights for decision-making. Maintaining quality service is crucial, and you will be responsible for establishing and enforcing organization standards. Continuous learning is essential in this position, and you will need to stay updated by attending educational workshops, reviewing professional publications, and participating in relevant professional societies. Contributing to the team effort is also a key aspect of this role, ensuring that related results are accomplished as needed. Industry exposure is required in various industry verticals, including Banking, Infrastructure, IT, ITES, Telecom, Healthcare, Textiles, Engineering, Automotive, Fertilizers, Power, Steel, Paper, Plastics, Hospitality, FMCG, and Media. In addition to industry knowledge, you should possess strong client relationship management skills, negotiation abilities, prospecting skills, and the capability to meet sales goals. Sales planning, independence, creativity, and high energy levels are also essential traits for success in this role.,
As an experienced data analytics professional with 1 to 2 years of experience, you will be responsible for developing and implementing data analytics methodologies. Your role will require good interpersonal skills along with excellent communication abilities. Your technical skills must include proficiency in Python, machine learning, deep learning, data wrangling, and integration with Big Data tools such as Hadoop, Scoop, Impala, Hive, Pig, and Spark R. You should also have a solid understanding of statistics, data mining, algorithms, time series analysis, forecasting, SQL queries, and Tableau data visualization. Having a good grasp of technologies like Hadoop, HBase, Hive, Pig, Mapreduce, Python, R, Java, Apache Spark, Impala, and machine learning algorithms is essential for this role. Your responsibilities will involve developing training content on Big Data and Hadoop technologies for students, working professionals, and corporates. You will conduct both online and classroom training sessions, provide practical use cases and assignments, and design self-paced recorded training sessions. It's important to continuously enhance teaching methodologies for an effective online learning experience and work collaboratively in small teams to make a significant impact. You will be tasked with designing and overseeing the development of real-time projects to provide practical exposure to the trainees. Additionally, you may work as a consultant or architect in developing and training real-time Big Data applications for corporate clients either on a part-time or full-time basis. Hands-on knowledge of tools like Anaconda Navigator, Jupyter Notebook, Hadoop, Hive, Pig, Mapreduce, Apache Spark, Impala, SQL, and Tableau will be required to excel in this role.,
Job Description – GRC Intern Position: Governance, Risk, and Compliance (GRC) Intern Department: Information Security / Risk & Compliance Location: On site – Delhi/Gurgaon Reports To: GRC Lead About the Role We are looking for a motivated and detail-oriented GRC Intern to join our Information Security and Risk Management team. The role offers hands-on exposure to governance frameworks, risk management processes, and compliance initiatives that support our organization’s overall security posture. This internship will provide valuable learning opportunities in cybersecurity governance, regulatory compliance, risk assessments, and policy development. Key Responsibilities Assist in the implementation and monitoring of the Information Security Management System (ISMS) aligned with ISO 27001, 27701, NIST, GDPR, and other applicable standards. Understand Compliance Assessment requirements inline to global security standards. Ability to validate effectiveness of controls implemented. Understand Regulatory and Business requirement and drive the Information security compliance requirements in line to the same. Eg. RBI, CERT-IN, IRDAI , Global Regulations Identify the KPI’s for different various Information security deliverables and document matrices for effectiveness measurement. Support the risk assessment and risk treatment processes , including identification, documentation, and tracking of risks. Participate in the development, review, and maintenance of security policies, procedures, and guidelines . Help in tracking compliance with regulatory, legal, and contractual requirements. Contribute to audit preparation (internal and external), including evidence collection and documentation. Support ongoing awareness and training initiatives to strengthen security culture across the organization. Assist in the monitoring of key metrics, controls, and governance dashboards . Research emerging regulations, standards, and best practices in governance, risk, and compliance. Provide administrative and analytical support to the GRC team as required. Key Skills & Qualifications B.Tech., B.E, MCA or equivalent from a Recognized university Basic understanding of information security concepts (CIA triad, controls, risk, compliance). Familiarity with ISO 27001, NIST, SOC 2, GDPR, or other frameworks (preferred but not mandatory). Strong analytical, organizational, and documentation skills . Proficiency in MS Office / Google Workspace tools (Word, Excel, PowerPoint). Ability to work independently and in teams , with keen attention to detail. Strong communication skills and willingness to learn. What We Offer Hands-on experience in Governance, Risk, and Compliance (GRC) within a real-world corporate environment. Mentorship from experienced GRC and cybersecurity professionals . Exposure to industry-standard frameworks, audits, and tools . A collaborative and inclusive work culture. Opportunity for a pre-placement offer based on performance.
As a part of the Information Security operation team, you will be responsible for delivering crucial management and reporting services across various Information Security platforms. This role entails tasks such as configuration, creating tools (scripts, procedures, and templates), defining reports, and recommending best practices and procedures to enhance the overall security posture. Your responsibilities will also include actively engaging in security operational activities, developing procedures, methods, reports, and scripts to streamline the monitoring and measurement of enterprise-wide IT Security Solutions. Proactively identifying and addressing potential security risks and incidents, configuring and monitoring security infrastructure, conducting vulnerability scanning and reporting, monitoring various log sources to detect risks and issues, creating event log dashboards, reports, and alerts, and contributing to the enhancement of the overall IT security architecture. In addition, you should possess hands-on knowledge and proficiency with tools such as Nmap, Kali Linux, Metasploit, Armitage, Maltego, Burp, Paros Proxy, Nessus, Nexpose, Wireshark, SQLMap, among others. This position requires a minimum of 2 years of experience and a strong background in Information Security. Preferred certifications include CEH, CHFI, ECSA, LPT, OSCP, OSCE, OSEE, and OSWE. Your expertise and active involvement will play a pivotal role in maintaining a robust and secure IT environment.,
As a Web Developer, your primary responsibility will be to code, design, and layout our website. You will have the opportunity to build the website from scratch, starting from conceptualization to the final product. Your tasks will involve creating the home page, site layout, and ensuring its proper functionality. Key Responsibilities: - Understand the data model and develop code based on functional requirements. - Provide accurate development estimates. - Mentor junior team members and guide them on design aspects. - Write code in various programming or scripting languages. - Design the architecture of application components using different technologies and languages. - Test websites and applications across multiple browsers and environments. - Stay updated on new technologies, frameworks, and languages. Qualifications Required: - Strong experience in JavaScript, including familiarity with JavaScript Design Patterns. - Proficiency in relational databases, tools, and PHP. - Expertise in front-end technologies such as HTML, JavaScript, and CSS, along with PHP frameworks and MySQL databases. - Ability to write clean and well-designed code following best coding practices. - Knowledge of various design patterns. - Proficiency in programming or scripting languages like PHP and JavaScript. - Experience in bug fixing within existing projects.,
As a Sales Executive, your role will involve building business by identifying and selling prospects, as well as maintaining relationships with clients. You will be responsible for identifying business opportunities, evaluating prospects, and researching sales options. Key Responsibilities: - Selling products by establishing contact and developing relationships with prospects - Recommending solutions to clients - Providing support, information, and guidance to maintain relationships with clients - Researching and recommending new opportunities for profit and service improvements - Remaining current on industry trends, market activities, and competitors to identify product improvements or new products - Preparing reports by collecting, analyzing, and summarizing information - Maintaining quality service by establishing and enforcing organization standards - Contributing to team effort by accomplishing related results as needed Qualification Required: - Industry relevant experience in various industry verticals such as Banking, Infrastructure, IT, ITES, Telecom, Healthcare, Textiles, Engineering, Automotive, Fertilizers, Power, Steel, Paper, Plastics, Hospitality, FMCG, and Media - Strong skills in presentation, client relationships, negotiation, prospecting, meeting sales goals, sales planning, independence, motivation, creativity, and high energy levels Your success in this role will depend on your ability to excel in client relationships, meet sales goals, and demonstrate independence and creativity in your approach.,
Role Overview: As an operational roles and responsibilities specialist, you will be responsible for executing application and network penetration tests of varying complexity levels using both tools and manual methods. Your key responsibilities will include: - Developing detailed work plans, schedules, and resource plans for recurring penetration tests - Summarizing findings and recommending corrective measures - Advising leadership on the technical and business risks associated with identified vulnerabilities - Liaising with external 3rd party pen testers when necessary - Establishing and reporting on metrics to evaluate pen testing effectiveness, progress, and key risk areas identified through audits - Identifying risks and escalating potential project issues to management - Implementing changes to procedures and systems to enhance data systems security - Recommending process improvement strategies - Providing technical expertise and support to management and staff members in risk assessments and the implementation of data security procedures and products - Identifying and determining the causes of security violations and recommending corrective actions Qualification Required: In addition to the operational responsibilities, you should also possess the following working skills: - Ability to lead a high-performing team through complex people and technology change - Solid knowledge of software development methodologies and best practices - Proficiency in at least one modern compiled programming language such as C, C++, C#, or Java - Knowledge of professional software engineering best practices for the full software development life cycle, including coding standards, code reviews, source control management, build processes, testing, and operations - Good understanding of XML, XML schema, and related technology; JavaScript and HTML knowledge,
Role Overview: As a candidate for this role, you should possess a good level of knowledge and understanding of architecture, application systems design, and integration. You should also have a detailed understanding of applicable programming methodologies. Key Responsibilities: - Demonstrated competencies in secure coding techniques - Hands-on development experience with either Java/J2EE or .NET/PHP Android - Experience with various mobile platforms such as iOS, Android, Blackberry, Symbian, and Windows Mobile Qualifications Required: - Proficiency in Java/J2EE or .NET/PHP Android - Strong understanding of secure coding techniques - Experience with mobile platforms iOS, Android, Blackberry, Symbian, and Windows Mobile,
As an ambitious individual looking to leverage learning opportunities in a rapidly growing global leader in information and cyber security, your knowledge of key technologies and solutions in software development, as well as understanding of top Security applications, will be beneficial in this role. Staying informed about the latest technology trends is essential for you. - Developing innovative sales and marketing strategies for enhancing profitability in your designated territory and accounts. - Conducting pre-sales technical presentations and demos for potential customers and partners, especially during product launches and initial engagements. - Initiating pre-sales activities, providing consulting services, defining project scopes, and preparing proposals. In your role as a representative of the company, you will: - Engage with clients and conduct market research to identify target markets. - Create case studies and presentations and generate periodic sales reports for business growth analysis. - Prepare client proposals, RFPs, RFQs, sales and marketing collaterals, and offer post-proposal support throughout the sales cycle. - Create internal software requests, develop POC implementation plans, and oversee the approval process, including preparing software order forms. Furthermore, you will collaborate with the sales team to: - Assist in crafting a sales cycle plan and support customers, prospects, and Sales Representatives in building compelling and competitive business cases and ROI analyses. - Introduce customers to evolving product markets and recommend feasible implementations for Software Security products. - Manage the handover to the Services Functions (Post-Sales Support and Professional Services) for live project implementation.,
As a part of the Information Security operations team, your role will involve providing critical management and reporting services on various Information Security platforms. Your responsibilities will include: - Configuration, tool creation (scripts, procedures, templates), defining reports, and recommending best practices and procedures. - Hands-on performance of security operational activities. - Developing procedures, methods, reports, and scripts to facilitate the monitoring and measurement of enterprise-wide IT Security Solutions. - Pro-active follow-up on potential security risks and incidents. - Configuring and monitoring security infrastructure. - Conducting vulnerability scanning and reporting. - Monitoring various log sources to identify risks and issues. - Creating event log dashboards, reports, and alerts. - Contributing to the overall IT security architecture. **Qualifications Required:** - CEH Certification - CHFI Certification - ECSA Certification - LPT Certification - Offensive Security Certified Professional certification (OSCP) - Offensive Security Certified Expert (OSCE) - Offensive Security Exploitation Expert (OSEE) - Offensive Security Web Expert (OSWE) You should have a minimum of 2 years of experience in the field. Additionally, hands-on knowledge of tools such as Nmap, Kali Linux, Metasploit, Armitage, Maltego, Burp, Paros Proxy, Nessus, Nexpose, Wireshark, and SQLMap will be beneficial for this role.,
 
                         
                    