Jobs
Interviews

73 Cyber Forensics Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

7.0 - 12.0 years

8 - 15 Lacs

hyderabad

Work from Office

We are hiring for our one of reputed government client I4C- MHA for CDTI Hyderabad Role. * MCA or any other post-graduation degree in Engineering in CSE/IT/ Computer Science/ Electronics and Telecommunication, with the area of specialization in cyber security/inf-ormation Security/digital Forensics/ Understanding of network security, ciphers, data on the wire, shell scripting. Experience: 7+ Years Job Role: Detect emerging Cybercrime threats based upon analysis, data feeds crime reporting and sources (internal & external intelligence sources). Working within the team and the wider Information Security group to build new tools for intelligence gathering. * Knowledge of innovative technologies like block-chain, Artificial Intelligence/Machine Learning, IOT Security, Cloud Security will be an added advantage. * Knowledge of cryptography protocols. * Ability to derive intelligence out of data and reports generated and ability to conduct research in that direction and development of tools to handle such threats and overcome such risks. * Building and maintaining senior management dashboards to provide a clear understanding of team activities and threat landscape. * Identify and suggest appropriate infrastructure with suitable mitigation strategies for cyber crime * Evaluate target systems to analyze results of scans, identify and recommend resolutions * Producing periodic Cybercrime threat analysis reports with mitigation measures. * Programming skills with proficiency in one or more of the following, Python, Java, C++. * Excellent knowledge of digital hardware, computer programming, cyber security practices, databases & operating systems artifacts. * Review unlawful and suspicious content in open source and escalate violations to the appropriate govt. department. * Collect, organize, analyze and develop reliable actionable intelligence about cybercrime, criminals, criminal infrastructure from open sources. Must have advanced understanding of how to use open-source including social media for intelligence. * Ability to draft Sop's/ RFP/ Advisory Manuals/ Reports pertaining to Cyber Security/Inf-ormation Security/Cybercrime Investigation. * Proven ability to work both independently and as a team and present/develop ideas. * Ability to work effectively with technical and non-technical stakeholders. * Ability to communicate (verbal and written) with stakeholders in non-technical terms. * Experience with multiple social media platf-orms. * Using data from social media, open sources, search engines, public records, and the deep web to compile detailed reports on cybercrime, criminals and criminal infrastructure. Share your cv to d.darshani@cipl.org.in

Posted 6 days ago

Apply

1.0 - 4.0 years

4 - 8 Lacs

kolhapur, mumbai, hyderabad

Work from Office

SAARTH INFOSEC PRIVATE LIMITED is looking for Cyber Security Consultants to join our dynamic team and embark on a rewarding career journey Undertake short-term or long-term projects to address a variety of issues and needs Meet with management or appropriate staff to understand their requirements Use interviews, surveys etc. to collect necessary data Conduct situational and data analysis to identify and understand a problem or issue Present and explain findings to appropriate executives Provide advice or suggestions for improvement according to objectives Formulate plans to implement recommendations and overcome objections Arrange for or provide training to people affected by change Evaluate the situation periodically and make adjustments when needed Replenish knowledge of industry, products and field Disclaimer: This job description has been sourced from a public domain and may have been modified by Naukri.com to improve clarity for our users. We encourage job seekers to verify all details directly with the employer via their official channels before

Posted 6 days ago

Apply

15.0 - 20.0 years

19 - 25 Lacs

gurugram

Work from Office

As MSS head you will be leading a team of experts for providing Managed Security Services for Telcom Service providers. The Managed security services shall include Security Operation Centre, Vulnerability assessment and penetration testing, Risk assessment, Base Line Hardening, Governance Risk and Compliance. You have: 15+years of experience, in Cyber Security on driving Managed Security Operations / Information Security Programs for Organizations, preferably in Telecom space Expertise in the areas of Security Monitoring & Response, Threat detection, hunting, Intelligence feeds, Advisory, Cyber Forensics investigations, SOAR (Security Orchestration Automation and Response), EDR, MDR and XDR endpoint security technologiesExpertise in Threat Modelling techniques, Threat frameworks, Development of attack use cases and implementation. Knowledge on functioning of SIEM Solution (Splunk / ELK), Parser creation Knowledge on tool-based Automation of processes for GRC, MBSS, SOC Good understanding of Vulnerability Management and Penetration testing activities, Red teaming, Implementation of Minimum Base line Security hardening controls. Understanding of Security governance and compliance within the Telecom industry, licensing conditions, Managing governance, risk, and compliance initiatives. Conduct of IS and Compliance audits, Risk assessments and Risk Mitigation Excellent governance ability to handle large security operations, effective follow ups and closure management with stakeholders for VA, Security Advisory, Incidence Management to ensure effective risk mitigation Ability to communicate effectively at the senior level, must have outstanding communication skills to influence others and meet timelines while building positive relationships both internally and externally Mentoring the team, interacting with them and to support them in their professional growth, and identifying and recognizing talents. Ability to handle key interfaces for this role like Customer CISO, Network Security Head and team, CTO, 3rd Party Subcontractors / Partners. Conduct of effective Program Governance with customer and internally A bachelor's degree in engineering in computer science, Communication Theory, information technology, or a related field. An MBA, MS / M tech is preferable. It would be if you also had: Any two of the recognized industry security certifications listed below: CISSP, CISA, CISM, CRISC, GCIH, GCFA, Any other GIAC Certification, ISO/IEC 27001 Act as trusted advisor to customer on Cyber Security issues and supporting customer so that newly - acquired technologies by customer complies with the Cyber security regulations Sound knowledge of information security management frameworks ISO 27001, NIST, CSA (Cloud Security). Knowledge on 3GPP, ITU-T desirable. Excellent knowledge of Operational processes. Knowledge and understanding of relevant legal and regulatory requirements e.g. Country specific telecom security conditions, CII (Critical Information Infrastructure) regulations etc Knowledge about Govt agencies at National Level dealing with Cyber Security. Excellent leadership abilities proved through managing a large Security Operations role earlier / other comparable position. Results-oriented. Able to work independently and take a logical and orderly approach to analyze problems, coordinating work and planning actions. Ability to drive team engagements in a tough and time-critical environment Knowledge on the Telcom technologies (2G, 4G, 5G, Fixed Line) key functions and associated security features desirable Education Qualifications Delivering MSS KPIs and deliverables as per defined contract. Ensure delivery of Project within defined budget for targeted margins in project Prime interface of customer for all MSS related deliverables, issues, and requirements Interface with customer for routine governance and escalation Support new business initiatives from MSS perspective Formulate and drive revenue and margin maximization initiatives Ensure customer satisfaction

Posted 1 week ago

Apply

3.0 - 6.0 years

15 - 30 Lacs

bengaluru

Work from Office

Job Overview: Incident Response: Respond to and manage cybersecurity incidents, including threat detection, containment, eradication, recovery, and post-incident activities Threat Hunting: Proactively hunt for threats within our environment, utilizing tools such as Anomali ThreatStream to identify potential security risks. Digital Forensics : Conduct digital forensic investigations to determine the root cause of security incidents and identify areas for improvement. Correlation and Analysis: Correlate security event logs from various sources to identify potential security threats and anomalies. Documentation and Reporting: Maintain accurate and detailed records of incidents, including incident reports, root cause analysis, and lessons learned. ESSENTIAL JOB FUNCTIONS: Review security alerts escalated by SOC analysts to determine if they constitute an incident. Investigate incidents to determine scope and impact. Record incident details, artifacts, and evidence in the incident tracking system Execute response protocols and playbooks to respond to incidents Escalate incident response protocols to senior staff when necessary Communicate with end users to collect information and resolve issues Collaborate with IT, Legal, and Marketing teams during the incident response process SUPPLEMENTAL JOB FUNCTIONS: Performs additional duties as directed. Effectively accomplishes set goals while primarily working in a hybrid capacity. Will need to be available on an on-call basis for off-hours critical incident response. Key Skills - Strong understanding of digital forensics techniques, incident response processes, and cybersecurity principles. Familiarity with industry-standard tools like EnCase, FTK, Magnet Axiom, and other specialized forensic software. Using SIEM tools and other security monitoring technologies to identify and analyze security events Strong ability to analyze security events and identify patterns and anomalies Understanding data recovery techniques and tools.

Posted 2 weeks ago

Apply

7.0 - 12.0 years

5 - 15 Lacs

kottayam, pune, thiruvananthapuram

Hybrid

Security Specialist, Incident Response Responsibilities includes • Lead security incident response in a cross-functional environment and drive incident resolution. • Lead and develop Incident Response initiatives that improve Allianz capabilities to effectively respond and remediate security incidents. • Perform digital forensic investigations and analysis of a wide variety of assets including endpoints. • Perform log analysis from a variety of sources to identify potential threats. • Build automation for response and remediation of malicious activity. • Write complex search queries in the EDR as well as SIEM tools for hunting the adversaries. • Works on SOAR cases, automation, workflow & Playbooks. • Integrating and working on Identity solutions. • Developing SIEM use cases for new detections specifically on identity use cases. Minimum Qualifications: • 5-10 years of experience in Security Incident Response, Investigations • Working experience in Microsoft On-prem and Entra ID solutions • Good knowledge in Active Directories and Tier 0 concepts • Very good knowledge of operating systems, processes, registries, file systems, and memory structures and experience in host and memory forensics (including live response) on Windows, macOS and Linux. • Experience investigating and responding to both external and insider threats. • Experience with attacker tactics, techniques, and procedures (MITRE ATT&CK) • Experience analyzing network and host-based security events

Posted 2 weeks ago

Apply

1.0 - 6.0 years

7 - 12 Lacs

mumbai

Work from Office

About the Role We are seeking a dynamic and detail-oriented Cyber Forensic candidates to join our Forensic Team in Risk Advisory practice. The ideal candidate will have hands-on experience in cyber incident response, digital forensics, and threat investigations, and will be responsible for supporting high-impact engagements involving cyber breaches, fraud investigations, and forensic analysis. Role & responsibilities Conduct end-to-end digital forensic investigations across endpoints, servers, cloud, and mobile devices. Support cyber incident response engagements including containment, eradication, recovery, and root cause analysis. Perform evidence acquisition, chain of custody documentation, and forensic imaging using industry-standard tools and Chain of custody procedures. Analyze logs, memory dumps, and network traffic to identify indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs). Assist in malware analysis, reverse engineering, and threat actor profiling. Prepare detailed technical reports and executive summaries for clients and internal stakeholders. Preferred candidate profile Bachelors or Masters degree in Computer Science, Information Security, Digital Forensics, or a related field from a reputed institute. 25 years of relevant experience in cyber forensic and incident response. Strong understanding of Windows, Linux, and cloud environments (AWS, Azure, GCP) including log acquisition. Experience with forensic tools such as EnCase, FTK, X-Ways, Autopsy, Cellebrite, Magnet AXIOM. Preferred Certifications (any one) GCFA (GIAC Certified Forensic Analyst) GCIH (GIAC Certified Incident Handler) CHFI (Computer Hacking Forensic Investigato

Posted 3 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

hyderabad, telangana

On-site

As an experienced offline Faculty for Cyber Security at Naresh IT KPHB & Ameerpet branches, your primary responsibility will be to deliver high-quality classroom training in Cyber Security, Ethical Hacking, Networking, Cyber Forensics, and related areas. You should possess a strong understanding and expertise in Cyber Security concepts to effectively impart knowledge to students. The ideal candidate must have a rich background in conducting classroom training sessions and be proficient in Cyber Security practices. A minimum of 3 years of experience in software training is preferred for this role. Your expertise will play a crucial role in shaping the skill sets of aspiring professionals in the field of Cyber Security. This is a full-time position based in Hyderabad, Telangana, requiring your physical presence at the training center. If you are passionate about sharing your knowledge and skills in Cyber Security with enthusiastic learners, we welcome you to join our team at Naresh IT and contribute to the growth and development of our students.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

delhi

On-site

You will be responsible for supporting cybercrime investigations by collecting and analyzing digital evidence, identifying electronic devices, and conducting forensic data analysis. Your role will involve collaborating closely with law enforcement and investigative teams to aid in cases related to cybercrime. Your key responsibilities will include assisting investigating officers in cybercrime cases, collecting and analyzing digital evidence from various sources, identifying and examining electronic devices involved in criminal activity, retrieving and recovering data from damaged, encrypted, or hidden sources, performing forensic analysis using industry-standard tools and methodologies, documenting findings and preparing detailed forensic reports, maintaining the chain of custody and ensuring evidence integrity, and supporting and carrying out any other assigned forensic tasks. You should have a minimum of 3-5 years of experience in cyber forensics or related fields, a strong understanding of cybercrime methodologies and digital evidence, hands-on experience with forensic tools such as EnCase, FTK, Autopsy, X-Ways, Cellebrite, etc., proficiency in digital data recovery and analysis, familiarity with various operating systems (Windows, Linux, macOS) and mobile platforms, and the ability to work under pressure while handling sensitive information discreetly. To qualify for this role, you must hold a Bachelor's or Master's degree in engineering (B.A./M.A./ BE / B.Tech / M. Tech/MCA/BCA/B.SC/M.Sc.). Preferred attributes include certifications such as CHFI, CCE, GCFA, or equivalent (preferred but not mandatory), strong analytical, written, and verbal communication skills, and the ability to work independently and collaboratively in a fast-paced environment. The salary offered for this position is up to 7 LPA.,

Posted 1 month ago

Apply

7.0 - 12.0 years

30 - 35 Lacs

Pune

Work from Office

About The Role : Job TitleInformation Security Specialist - AVP LocationPune, India Role Description The Information Security Analyst is responsible for supporting the execution of the Information Security strategy. The Information Security Analyst provides data and analysis to measure the effectiveness of Information Security controls across group wide products and services. The Information Security Analyst identifies and evaluates potential areas of Information Security threats by assessing the probability and impact and facilitates feedback for mitigation. Roles within Information Security may cover one or more areas of specialty, e.g., Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.); Information Security (IS) Operations (which may for example include, cyber threat operations; cyber forensics, protection against data leakage etc.) and IS Technology (which may include IS architecture, IS engineering, cryptographic services etc.) What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities Review Risk Assessment (Application/Technical Risk profile) and Assurance spot checks for Compliance evaluation (e.g., IS/Cloud/SOx/MAS/Client Access Management/other regulatory controls) Analysis and verification of compliance issues Support stakeholder remediation activities Collect and review evidence (e.g., from de-centrally managed applications) Create compliance issue tickets and address issues to responsible stakeholders. Analyze and identify root causes. Provide and prepare data for management communication. Preparing reports for stakeholders and management Improvement and documentation of operational tracking activities Raise Business Requirements to Central Solutions run by other CSO teams. Your skills and experience Attitude of diligence and precision Ability to integrate in heterogeneous teams. Proactively driving topics, not shunning to address issues to higher management levels. Structured way of thinking and working Very good communicator Very good analytical and problem-solving skills Very good English (verbal and written) Experience in Excel (advanced) Good German skills beneficial Good Python programming skills beneficial Certifications in ISO 27001 or information security (e.g., CISSP, CISA) beneficial Practical experience in Governance or Compliance Monitoring beneficial. Knowledge about basic principles of Identity and Access Management beneficial How well support you . . . About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm We strive for a culture in which we are empowered to excel together every day. This includes acting responsibly, thinking commercially, taking initiative and working collaboratively. Together we share and celebrate the successes of our people. Together we are Deutsche Bank Group. We welcome applications from all people and promote a positive, fair and inclusive work environment.

Posted 1 month ago

Apply

1.0 - 2.0 years

3 - 6 Lacs

Bangalore/Bengaluru

Work from Office

Should have vision in Digital Forensics or cyber security and well-educated on IT or computer science Technical support for the global customers of Mobile and digital forensics product Excellent Communication Skills Required Candidate profile Testing digital devices and mobile apps, trouble ticketing, issue reporting Good English presentation skill with international way of speech Exp. in digital forensics preferably Need Immediate Joiners

Posted 1 month ago

Apply

10.0 - 15.0 years

15 - 20 Lacs

Noida, Gurugram, Greater Noida

Work from Office

Advanced knowledge in handling security incidents and leading investigations. Proficiency in managing and optimizing SOC operations. Experience in implementing security protocols and policies. Expertise in Malware Reverse Engineering, Required Candidate profile Certified Information Systems Security Professional (CISSP). Certified Information Security Manager (CISM). GIAC Certified Enterprise Defender (GCED). Certified Information Security Auditor (CISA),

Posted 1 month ago

Apply

7.0 - 12.0 years

20 - 25 Lacs

Chennai

Work from Office

Dear Cybersecurity Professionals, We are thrilled to invite you to our upcoming AI in Cybersecurity User Group activity , happening on 26th July in Chennai . This is an excellent opportunity to connect, learn, and exchange insights on how AI is revolutionizing the cybersecurity landscape. Highlights of the event: Expert talks on AI-driven cybersecurity solutions Real-world case studies and practical insights Networking with industry peers and thought leaders Interactive sessions to discuss challenges & best practices Please note: Seats are strictly limited , and registrations will be accepted on a first-come, first-served basis. Date: 26th July 2025 Time: 10:30 AM 12:30 PM Location: Chennai (venue details will be shared upon confirmation) If youre interested in joining, please reply to this email or register through below link at the earliest to secure your spot. https://forms.cloud.microsoft/r/Qc57BKrBmQ Looking forward to your participation in building a vibrant AI in cybersecurity community!

Posted 1 month ago

Apply

3.0 - 5.0 years

15 - 25 Lacs

Bengaluru

Work from Office

Role Overview: The OT Security Analyst – Level 2 (L2) plays a pivotal role in defending operational technology (OT) environments against evolving cyber threats. This role requires a deep understanding of security incident analysis, threat detection, and incident response, specifically tailored to Industrial Control Systems (ICS) and OT networks. The analyst will investigate complex security incidents within the OT infrastructure, collaborate with IT/OT teams, and enhance security posture through actionable insights. ________________________________________ Key Responsibilities: • Conduct in-depth analysis of security events and incidents within OT environments, leveraging SIEM and OT-specific monitoring tools. • Perform root cause analysis and develop incident timelines to support forensics and remediation efforts. • Apply standard incident response frameworks (e.g., NIST, MITRE ATT&CK for ICS, Cyber Kill Chain) for threat classification and response. • Use threat intelligence platforms and sandbox environments to investigate malware and suspicious artifacts in OT networks. • Analyze access logs, network traffic, and protocol behaviours across OT systems (e.g., SCADA, DCS, PLCs). • Support investigations related to unauthorized device communications, anomalous behaviours, or compromised industrial assets. • Collaborate with OT security engineers and external vendors to escalate and remediate incidents. • Refine alert rules and detection logic to reduce false positives and improve signal-to-noise ratio in OT SOC operations. • Document incident findings and support continuous improvement of the OT SOC playbooks and knowledgebase. • Liaise with the IT SOC and CIR (Cyber Incident Response) teams to align incident handling and cross-domain investigations. • Participate in threat hunting activities tailored for OT environments using behavioural analysis and attack-path simulation. ________________________________________ Technical Skills & Knowledge: • Strong understanding of OT/ICS protocols (Modbus, DNP3, OPC, etc.) and industrial network topologies. • Hands-on experience with OT cybersecurity tools and platforms (e.g., Nozomi Networks, Claroty, Dragos). • Familiar with ISA/IEC 62443, NIST SP 800-82, NIST CSF, and ISO 27001 compliance requirements for OT. • Proficiency in using SIEM systems (e.g., Microsoft Sentinel, Splunk, QRadar) for log correlation and event triage. • Understanding of firewalls, WAFs, proxies, and network segmentation principles in OT. • Working knowledge of tools such as THOR Scanner, VMRay, or Recorded Future is a plus. • Experience in vulnerability management and patch advisory for OT assets with limited patch cycles. ________________________________________ Nice to Have: • Exposure to Red Team/Blue Team exercises focused on OT/ICS. • Familiarity with GRC platforms and risk assessment tools tailored to OT.

Posted 1 month ago

Apply

5.0 - 10.0 years

10 - 14 Lacs

Bengaluru

Work from Office

Within the Socit Gnrale group, you will join the Global Banking and Investor Solutions - Service Unit. You will be part of IAM (ISR/GBI).Some of the teams missions on IAM PAM are localized within the SGGSC Bengaluru which oversees the Detection, Remediation Deployment related activities. This implies working with extended Business lines and stakeholders within the GBSU world. The candidate will be working in a high-pressure environment, it calls for assertiveness and flexibility to ensure deadlines / milestones are met based on agreements. In Bangalore (SGGSC Pvt Ltd), main responsibilities of the Senior analyst would be: A. Delivery: This constitutes the following axis: Execution Onboarding of applications in SGIAM/DIAMAR/UCT/GARFIELD Response Management Anomaly resolution SOD review Ensure delivery of Transversal IAM activities Ensure SOP update to trace change management and be in Sync with latest operating procedures. Stakeholder Build and oversee strong client/partner relationship. Establish a strong and effective working relationship. Ensure counterpart satisfaction is maintained, feedback collected, and corrective actions implemented. RACI and SLAs with the stakeholders involved in each of the managed processes. Setup and run operations governance meet to address operational challenges and create a channel to management to highlight overall performance with challenges. Ensure precise response management to end users and stakeholders. Risk Continuously and closely monitor the risks in the process. Implement necessary process docs to ensure traceability of actions performed and for audit. Operational Excellence Setup Monitor performance and service commitments through continuous evaluation, quality assurance and focused improvement efforts Monitor progress of continuous improvement initiatives and take appropriate corrective actions when required. B. Transformation / Change: Be responsible for transformation and change management in department. Process Reengineering a. Industrialize Identify redundancies to bring efficiency in controls. b. Contribute to global transformation (e.g. project mode to run mode with sustainable control implementation to push for run mode) Tech / Functional Skills Investment banking Understanding for IAM perspective. Good knowledge of IAM controls, tools and processes; Knowledge of Information Security principles is an advantage Understanding of ISO 27001 NIST is a plus; Good command of MS Excel and MS PowerPoint Qualifications: Degree preferably in Tech, with knowledge of Investment banking operations Abilities/skills required: At least 5 years experience. Experience in IAM: authentication, authorization, user management, central user repository. Work on high volume high-pressure environment. Fluency in English and French would be good. Excellent communication skills across all levels and formats. Excellent stakeholder management and engagement skills. Ability to work under pressure and be flexible to meet critical deadlines / milestones. Strong interpersonal and communications skills to build/ maintain ongoing business relationships.

Posted 1 month ago

Apply

8.0 - 12.0 years

10 - 15 Lacs

Bengaluru

Work from Office

1) Transversal topics related to the security of Digital Workplace environments: - Recommendations to project management and architecture for the consideration of security constraints in accordance with the guidelines of the group. - Risk analysis on the different subjects followed. - Presentation of the risks to the business / sponsor for acceptance. - The implementation of mitigation measures. - Drafting of PASFs for outsourced services. - Piloting the pen tests on the entrusted perimeters. 2) Contributions to the activities of the entity's Security Run - Resolution of incidents on managed perimeters - Monitoring of vulnerability on managed perimeters The expected deliverables are: Security specification for new projects and new solutions Security and risk analysis aligned to Societe Generale Processes: Risk analysis on target infrastructure Mitigation proposal with expert and architects Presentation to worldwide security community Follow up of mitigation implementation and pentest Risk review with management and ORM Security rules SSAP documents for external services and contractors Security RUN deliverable Incident/Vulnerability follow up on target perimeter. Control definition and industrialization Recurrent risk review: Sensitivity Assessments / Risk Assessments Security validation: Flows, Rights, Exceptions and, Profiles Profile required MS Exchange/IronPort MS Windows administration and hardening Teams Tlphonie/SBC EBC Security Standards: ISO 27001/27005, NIST, CIS, EBIOS

Posted 1 month ago

Apply

6.0 - 10.0 years

0 Lacs

maharashtra

On-site

You are a highly experienced Senior SOC Administrator (L4) who will be an integral part of our Security Operations Center (SOC) team. Your primary responsibilities will include serving as a key escalation point for complex security incidents, leading investigations, coordinating incident resolution with stakeholders, developing and implementing security policies and procedures, and identifying areas for improvement within SOC operations and processes. Additionally, you will be expected to conduct regular performance reviews of security systems, lead post-incident reviews to drive enhancements, and provide strategic insights and recommendations to strengthen our overall security posture. To excel in this role, you must hold a B.E./B.Tech in Computer Science, IT, Electronics, or a related field, or an M.Sc. IT/MCA from a recognized university. Your technical expertise should encompass advanced proficiency in handling security incidents, optimizing SOC operations, enforcing security protocols, and a deep understanding of Malware Reverse Engineering, Exploit Development, Security Breach Investigation, and Threat Hunting. Moreover, you should have proven experience with SIEM (preferably ArcSight), IDS/IPS, and other security tools, along with a solid grasp of security operations and advanced threat analysis. Familiarity with Cyber Forensics principles and strong leadership skills to drive security initiatives will be essential for success in this position. A certification in one of the following is preferred: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), GIAC Certified Enterprise Defender (GCED), Certified Information Security Auditor (CISA), GIAC Enterprise Vulnerability Assessor (GEVA), Certified Incident Handler (ECIH), or CompTIA Cyber Security Analyst (CySA+). If you have 6+ years of experience in SOC administration and possess the requisite qualifications, skills, and certifications, we invite you to apply for this position located in Shastri Park, Delhi, India. Work mode is from the office with day shifts between 8 AM and 10 PM, offering a competitive budget of 18-22 LPA.,

Posted 1 month ago

Apply

3.0 - 8.0 years

3 - 12 Lacs

Pune

Work from Office

Responsibilities: Deliver structured training sessions (online or in-person) based on the provided 4-month CEH-aligned syllabus Teach tools such as Nmap, Burp Suite, Metasploit, Wireshark, SQLMap, John the Ripper, Aircrack-ng, etc.

Posted 2 months ago

Apply

6.0 - 11.0 years

9 - 14 Lacs

New Delhi, Hyderabad

Work from Office

Company Name- CIPL (www.cipl.org.in) We have opening for our one government client Ministry of Home Affairs. Client Name- I4C (Indian Cybercrime Coordination Centre) Designation- Cybercrime Threat Intelligence Analyst - Hyderabad , Vacancy -1 Cybercrime Investigator/ Cyber Crime Investigation Researcher - Delhi , Vacancy- 2 Detect emerging Cybercrime threats based upon analysis, data feeds crime reporting and sources (internal & external intelligence sources). Working within the team and the wider Inf-ormation Security group to build new tools for intelligence gathering. * Knowledge of innovative technologies like block-chain, Artificial Intelligence/Machine Learning, IOT Security, Cloud Security will be an added advantage. * Knowledge of cryptography protocols. * Ability to derive intelligence out of data and reports generated and ability to conduct research in that direction and development of tools to handle such threats and overcome such risks. * Building and maintaining senior management dashboards to provide a clear understanding of team activities and threat landscape. * Identify and suggest appropriate infrastructure with suitable mitigation strategies for cyber crime * Evaluate target systems to analyze results of scans, identify and recommend resolutions * Producing periodic Cybercrime threat analysis reports with mitigation measures. * Programming skills with proficiency in one or more of the following, Python, Java, C++. * Excellent knowledge of digital hardware, computer programming, cyber security practices, databases & operating systems artifacts. * Review unlawful and suspicious content in open source and escalate violations to the appropriate govt. department. * Collect, organize, analyze and develop reliable actionable intelligence about cybercrime, criminals, criminal infrastructure from open sources. Must have advanced understanding of how to use open-source including social media for intelligence. * Ability to draft Sop's/ RFP/ Advisory Manuals/ Reports pertaining to Cyber Security/Inf-ormation Security/Cybercrime Investigation. * Proven ability to work both independently and as a team and present/develop ideas. * Ability to work effectively with technical and non-technical stakeholders. * Ability to communicate (verbal and written) with stakeholders in non-technical terms. * Experience with multiple social media platf-orms. * Using data from social media, open sources, search engines, public records, and the deep web to compile detailed reports on cybercrime, criminals and criminal infrastructure.

Posted 2 months ago

Apply

4.0 - 9.0 years

24 - 96 Lacs

Bengaluru

Work from Office

Responsibilities: * Conduct regular vulnerability assessments & penetration tests. * Develop cybersecurity strategy & policies. * Collaborate with IT teams on risk management. * Implement threat detection & response measures.

Posted 2 months ago

Apply

0.0 - 1.0 years

1 - 3 Lacs

Chennai

Work from Office

We are seeking a qualified and passionate Assistant Professor in the field of Information Security and Digital Forensics. This full-time faculty role involves a dynamic mix of teaching, research, mentoring, and academic leadership, aimed at equipping students with cutting-edge knowledge and practical skills in the cybersecurity and digital forensics domains. Key Responsibilities: 1) Teaching & Curriculum Development 2) Design and deliver engaging lectures in Information Security and Digital Forensics. 3) Develop and continuously update curriculum to align with current industry standards and emerging technologies. 4) Supervise undergraduate and postgraduate student projects and theses. 5) Research & Innovation 6) Student Mentorship & Engagement 7) Mentor and guide students academically and professionally. 8) Organize and lead weekly training programs and workshops in information security and digital forensics at HQ. Industry Tools & Technologies Maintain proficiency in and teach the use of modern digital forensics and cybersecurity tools, including: FTK, EnCase, Cellebrite, XRY (Forensics) VA/PT tools, Nmap, Splunk (Security assessment and monitoring) Continuous Learning & Contribution Stay current with advancements in the field and integrate emerging trends and tools into teaching and research activities. Participate in academic committees, accreditation processes, and departmental development initiatives.

Posted 2 months ago

Apply

0.0 - 1.0 years

0 - 2 Lacs

Mumbai, Mumbai Suburban, Navi Mumbai

Work from Office

Create and deliver cyber security awareness training programs. Collaborate with IT security teams to develop and implement effective security policies and procedures, SOP and supporting documents. Timely initiation, management, closure of activities. Required Candidate profile Exp:1+Years Location - Ghansoli Np : Immediate joiner Any Queries- kanchan@peshr.com/9867762401

Posted 2 months ago

Apply

3.0 - 6.0 years

4 - 5 Lacs

Bangalore Rural, Bengaluru

Work from Office

Role & responsibilities : Process Must be honest and hard working with a high degree of integrity. Must be of good character and display loyalty towards Linfox. Must possess good communication skills. Must be able to read & write in both English and Local language. Must be in good health and possess a basic level of physical fitness. Must be capable of performing in a disciplined environment (able to follow and comply with written or verbal lawful instructions). Must be capable of working in a team environment. Must be able to propagate and ensure the Linfox Safety Standards are being always complied to. Must have a clear understanding of anti -bribery legislation and be able to deal confidently with enforcement bodies. Capable of motivating personnel under your control. Capable of providing confidence in others that they have the ability to provide good, high-level of Leadership and direction. Must be able to perform duties to a high standard when under pressure or in stressful situations. Must possess sound judgment and good decision-making skills. Must be capable of establishing and maintaining good relationships with Local Police, Government Officials and Customers. Must be capable of providing verbal briefings to various interested parties. Able to record lagging indicators/ root cause for accidents & incidents involving the following against set targets, and corrective actions taken: Third parties. Vehicles and fleet Operators. Carries out site Security reviews / security audits. Carry our detailed audit process on subcontract transport companys giving accurate findings to senior management. Establishes regular communication with Site Manager / National Security Operations & Compliance Manager to share best practices. Meets regularly with unit Operations team to track and monitor Compliance. Maintains regular dialogue with Unit Management to communicate the Security agenda and goals. Make sure that all Incidents, accidents & near miss are reported & investigated. To transform Vision Zero” to reality”. this includes Security Inductions for new site staff that covers the above points. Customer Works In partnership with Unit Managers, ensure that all Security & Safety processes are in place. Conducts detailed investigations in line with Linfox Standards. People Works closely with Site Operations Manager / National Security Operations & Compliance Manager to identify and mitigate Risks. Influences and ensures that Unit Operation processes comply with LINFOX Group and related local Legal requirements, as well as Industry best practices. Ensures unit line personnel understand these Standards and gain commitment from staff to these Standards. Work closely with Site Manager to develop plans, programmes, and performance measures. Meets regularly with key stakeholders to track progress and identify areas for improvement; ensures local practices are in line with LINFOX Group practices and local legislation. Regularly meets with Unit Operations Management/ Supervisory team to track Safety Kannad Language is mandatory

Posted 2 months ago

Apply

3.0 - 5.0 years

0 - 0 Lacs

Chennai

Hybrid

About AKATI Sekurity AKATI Sekurity is a leading global Managed Security Service Provider (MSSP) and Cybersecurity Consulting firm dedicated to helping organizations defend against modern cyber threats. We provide cutting-edge services in areas like incident response, cyber forensics, penetration testing, and compliance. Our work is critical, and our reports are the key deliverable that provides value and actionable intelligence to our clients. Position Overview We are seeking a meticulous and articulate Documentation Specialist to join our dynamic team in Chennai. This role is the critical bridge between our technical cybersecurity analysis and our clients. You will be responsible for transforming complex technical findings from forensic investigations, security audits, and penetration tests into clear, professional, and precise documentation. Your work will be essential in ensuring that our clients understand the threats they face and the steps they need to take to secure their environments. This is an ideal position for a technical writer or documentation expert with a strong interest in the fast-paced world of cybersecurity. Key Responsibilities Technical Report Writing: Develop, write, and edit high-quality technical documentation, including detailed reports for cyber forensic investigations, penetration tests, security audits, and incident response engagements. Collaboration: Work closely with cybersecurity analysts, forensic investigators, and consultants to accurately capture their findings, methodologies, and recommendations. Quality Assurance: Proofread and meticulously edit all documentation for clarity, technical accuracy, grammar, spelling, and adherence to AKATI Sekurity's style guide. Formatting & Presentation: Ensure all client-facing documents and reports are professionally formatted in Microsoft Word, maintaining a consistent and high-quality brand image. Assist in preparing key findings for presentation materials. Template Management: Maintain and improve our repository of documentation templates to streamline the reporting process. Confidentiality: Handle highly sensitive and confidential client information with the utmost discretion and integrity. Required Skills & Qualifications (Must-Haves) Experience: Proven experience in a technical writing or documentation role. Core Skills: Exceptional command of the English language, with outstanding skills in documentation, report writing, editing, and proofreading. Technical Proficiency: Advanced proficiency in Microsoft Word, including the use of templates, styles, and advanced formatting features. Cybersecurity Foundation: A solid foundational understanding of IT and cybersecurity concepts. You must be able to understand the subject matter you are writing about. Attention to Detail: An exceptional eye for detail and a commitment to producing error-free work. Education: A Bachelor's degree in English, Journalism, Communications, Information Technology, Computer Science, or a related field. Preferred Skills (What Will Make You Stand Out) Direct Industry Experience: Prior experience writing documentation specifically in a cybersecurity, cyber forensics, or IT security context is highly desirable. Report Presentation: Experience using tools like Microsoft PowerPoint to create clear and concise presentations based on technical reports. Team Player: Proven ability to work effectively in a fast-paced, collaborative environment. How to Apply If you are passionate about clear communication and have a keen interest in technology and cybersecurity, we would love to hear from you. Please submit your resume and a cover letter outlining your relevant experience to joanna@akati.com. Including samples of your technical writing or documentation work is highly encouraged.

Posted 2 months ago

Apply

8.0 - 11.0 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Dear Candidate, Seeking a Security Automation Engineer to automate detection and remediation of threats. Key Responsibilities: Build SOAR workflows and automated playbooks. Monitor logs and alerts using SIEM tools. Respond to security incidents and conduct root cause analysis. Required Skills & Qualifications: Experience with tools like Splunk, XSOAR, Sentinel. Scripting in Python or Bash. Familiar with SOC and threat intel operations. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies

Posted 2 months ago

Apply

10.0 - 15.0 years

15 - 20 Lacs

Noida, Gurugram, Greater Noida

Work from Office

Advanced knowledge in handling security incidents and leading investigations. Proficiency in managing and optimizing SOC operations. Experience in implementing security protocols and policies. Expertise in Malware Reverse Engineering, Required Candidate profile Certified Information Systems Security Professional (CISSP). Certified Information Security Manager (CISM). GIAC Certified Enterprise Defender (GCED). Certified Information Security Auditor (CISA),

Posted 2 months ago

Apply
Page 1 of 3
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies