Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 5.0 years
6 - 10 Lacs
Pune
Work from Office
: Job Title - Information Security Analyst, NCT Location - Pune, India Role Description Information Security Risk Analyst - TDI CSO The Technology Data Innovation (TDI) Chief Security Office (CSO) comprises both Corporate Security and Information Security. We run security operations globally to protect the banks people, infrastructure, processes, and information. CSO Governance and Control conducts proactive Information Security (IS) controls assess ability and applicability reviews for the emerging technologies to design adaptable IS assessment framework to appropriately assess the security requirement for relevant applications and infrastructures. The Information Security Analyst role holder is responsible for supporting the execution of the Information Security strategy. The Information Security Analyst provides data and analysis to measure the effectiveness of Information Security controls across group wide products and services. The Information Security Analyst identifies and evaluates potential areas of Information Security threats by assessing the probability and impact and facilitates feedback for mitigation. Roles within Information Security may cover one or more areas of specialty, e.g. Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.); Information Security (IS) Operations (which may for example include, cyber threat operations; cyber forensics, protection against data leakage etc.) and IS Technology (which may include IS architecture, IS engineering, cryptographic services etc.) What we'll offer you As part of our flexible scheme, here are some of the benefits that you will enjoy. Best in class leave policy. Gender neutral parental leaves 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Employee Assistance Program for you and your family members Comprehensive Hospitalization Insurance for you and your dependents Accident and Term life Insurance Complementary Health screening for 35 yrs. and above Your key responsibilities Review Risk Assessment (Application/Technical Risk profile) and Assurance spot checks for Compliance evaluation of IS controls (e.g., IS/Cloud/SOx/MAS/Client Access Management/other regulatory controls) Analysis and verification of compliance issues. Analyze and identify root causes. Collect and review evidence (e.g., from de-centrally managed applications) Communicates openly with internal stakeholders; keeps them informed of potential findings and escalate problems/delays accordingly. Acts as a competent partner to stakeholders in the closure process of findings and remediation activities. Provide and prepare data / reports for stakeholders and management communication. Conduct application risk assessments and support business stakeholders to determine the CIA ratings. Focus on utilizing the capacity in an efficient and effective manner. Proactively develop and maintain professional working relationships with the CSO function and stakeholders Represent the process and provide inputs / suggestion with any challenges faced to improve the quality. Improvement and documentation of operational tracking activities Raise Business to Central Solutions run by other CSO teams. Your skills and experience Work experience in the Information Technology area / Information security area Practical experience in Governance or Compliance Monitoring beneficial. Knowledge about basic principles of Risk, Identity and Access Management beneficial Certifications in ISO 27001 or on information security (e.g., CISSP, CISA) would be beneficial. Effective communication and strong interpersonal skills in English (verbal and written). German language would be beneficial. Positive attitude and proactive behavior with diligence and precision Self-driven, eager to learn, well organized collaborator to integrate with heterogeneous teams. Structured way of thinking and working with good analytical and critical thinking skills Ability to monitor, track and clearly communicate progress, escalate issues when appropriate, not shunning to address issues to higher management levels. Experience in Excel (advanced), added advantage to languages such as Python/VB/SQL etc., How we'll support you Training and development to help you excel in your career. Coaching and support from experts in your team A culture of continuous learning to aid progression. A range of flexible benefits that you can tailor to suit your needs. About us and our teams Please visit our company website for further information: https://www.db.com/company/company.htm We strive for a culture in which we are empowered to excel together every day. This includes acting responsibly, thinking commercially, taking initiative and working collaboratively. Together we share and celebrate the successes of our people. Together we are Deutsche Bank Group. We welcome applications from all people and promote a positive, fair and inclusive work environment.
Posted 3 months ago
3.0 - 5.0 years
4 - 6 Lacs
Noida, New Delhi, Gurugram
Work from Office
Incident handling, forensic analysis, and VAPT SIEM tools cybersecurity frameworks Log analysis, monitoring, detecting and investigating security incidents and breaches. CEH,CSA,CompTIA Security+,GCIH,security incidents
Posted 3 months ago
3.0 - 8.0 years
4 - 6 Lacs
Noida
Work from Office
Role & responsibilities Monitor and respond to security incidents and alerts Conduct vulnerability assessments and recommend mitigation strategies Manage and maintain endpoint and perimeter security tools Assist in the deployment and configuration of SIEM/SOR solutions Collaborate with IT and development teams to ensure secure systems Preferred candidate profile Analytical mindset with problem-solving skills Ability to work independently and in a team Relevant certifications (e.g., CEH, CompTIA Security+, OSCP) are a plus
Posted 3 months ago
12.0 - 15.0 years
55 - 60 Lacs
Ahmedabad, Chennai, Bengaluru
Work from Office
Dear Candidate, We are hiring a Digital Forensics Analyst to investigate cyber incidents, recover digital evidence, and support legal and compliance teams. Ideal for professionals with a strong background in cybersecurity and forensic analysis. Key Responsibilities: Perform forensic imaging and analysis on digital devices Investigate incidents involving malware, breaches, or data leaks Document evidence for regulatory, legal, or HR use Collaborate with SOC and legal teams to support investigations Required Skills & Qualifications: Experience with forensic tools (EnCase, FTK, Autopsy, X-Ways) Knowledge of file systems, OS internals, and memory analysis Understanding of chain-of-custody and evidence handling Bonus: GIAC (GCFA, GCFE) or related digital forensics certifications Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies
Posted 3 months ago
6.0 - 11.0 years
10 - 20 Lacs
Hyderabad, Pune, Bengaluru
Hybrid
Role & responsibilities Cyber Threat Intelligence Operating System-Understanding of how different system work, especially windows, Linux, MacOS. Programming Languages: Java, Python (Basic Understanding needed) Malware Analysis Techniques: Static & Dynamic analysis, code analysis, behavioral analysis, forensic analysis. Malware Analysis Tools: Need to have proficiency in using various malware analysis tools Static Analysis- CFF Explorer, PEiD, PEStudio, Stings, FLoss, ExeInfo PE, SSDEEP Dynamic Analysis Tools: Process Monitor, Process, Process Hacker, Sysmon, Autoruns, Regshot Reverse Engineering Tools: IDA Pro, Ghidra Analyzing Suspicious Files / Sandboxing by using :Virus Total, Hybrid Analysis , Cuckoo , Any.run , Intezer, Joe Sandbox Network Tool: Wireshark, InetSim. Malware Mitigation strategies: Have knowledge of various malware mitigation strategies such as preventation, detection removal , recovery and response. Good understanding on MITRE framework(TTP, IOC ,Threat Actor). Cyber kill chain, Dark web Analysis Should be able to setup the malware analysis lab with minimum support Threat Analysis- Analyze threat data from various sources to identify trends, tactics, techniques, and procedures (TTPs) used by cyber adversaries. Incident Response: Collaborate with the incident response team to provide intelligence support during security incidents. Reporting: Prepare and present intelligence reports to stakeholders, highlighting significant threats and recommended actions. Research: Conduct research on emerging threats, vulnerabilities, and security trends to inform strategic decisions. Collaboration: Work with internal teams and external partners to share intelligence and improve threat detection capabilities. Tool Utilization: Use threat intelligence platforms and tools to gather, analyze, and disseminate threat information-MISP, Threat Connect, Cyble , Anomali Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or GIAC Cyber Threat Intelligence (GCTI) are preferred. Apply here: https://career.infosys.com/jobdesc?jobReferenceCode=INFSYS-EXTERNAL-210438
Posted 3 months ago
3.0 - 8.0 years
15 - 30 Lacs
Bengaluru
Work from Office
Qualifications & Experience: Minimum of 2 years of hands-on experience in digital forensics, cybercrime investigations, or related technical fields. Exposure across both public and private sectors is preferred. Proven expertise in identifying, containing, mitigating, and recovering from cybersecurity incidents, with strong post-incident reporting capabilities. Demonstrated ability to independently develop and continuously improve skills in Digital Forensics, DFIR methodologies, and evolving cybersecurity trends. In-depth knowledge of forensic best practices, industry standards, and investigative methodologies for both host-based and network-level analysis. Proficient in the forensic preservation of digital evidence across a variety of platforms in a forensically sound and defensible manner. Familiarity with internationally recognized digital evidence acquisition and handling standards (e.g., NIST, ISO 27037). Hands-on experience with forensic tools and techniques supporting internal investigations, such as employee misconduct or data exfiltration cases. Experience serving as an escalation point for suspected security incidents or intrusions, including initial triage and scoping. Proficient with endpoint detection and response (EDR) tools and live forensics techniques. Practical knowledge of forensic analysis on multiple operating systems: Windows, macOS, and Linux. Strong command of DFIR-related open-source tools, memory analysis, and full-disk forensics. Capable of leading or participating in large-scale forensic investigations both independently and as part of a team. Skilled in performing root cause analysis and post-incident forensic reviews for cyber events and security breaches. Proven ability to prepare comprehensive investigation reports, breach summaries, and documentation for privacy and data exposure incidents. Exceptional attention to detail and ability to maintain thorough and accurate investigative records and chain-of-custody documentation. Preferred Certifications (one or more): CHFI (Computer Hacking Forensic Investigator) CIH (Certified Incident Handler) CSA (Certified SOC Analyst) CEH (Certified Ethical Hacker) GSEC (GIAC Security Essentials) GCIH (GIAC Certified Incident Handler) GCIA (GIAC Certified Intrusion Analyst) GCFE (GIAC Certified Forensic Examiner) GREM (GIAC Reverse Engineering Malware) GCFA (GIAC Certified Forensic Analyst)
Posted 3 months ago
0.0 - 5.0 years
5 - 9 Lacs
Pune
Work from Office
Responsibilities: Monitor systems, respond to incidents. Collaborate with teams on threat management strategies. Manage access control & encryption. Maintain compliance standards. Conduct regular security assessments. Office cab/shuttle Food allowance Health insurance Provident fund
Posted 3 months ago
1.0 - 6.0 years
6 - 12 Lacs
Greater Noida
Work from Office
Designation: Cybersecurity Trainer Job Purpose & Role: To design, develop, and deliver advanced training programs in secure coding, reverse engineering, and malware analysis . Technical knowledge and hands-on experience in secure coding, system-level programming, and threat analysis is highly preferred. A. Knowledge Proven experience as a trainer or instructor in cybersecurity. Expertise in Assembly language, C/C++, and secure system programming. Proficiency in reverse engineering tools such as IDA Pro, Ghidra, and Process Explorer. Solid understanding of PE file formats, static and dynamic code analysis techniques. Experience with Python scripting for automation and cybersecurity use cases. B. Functional Skills Develop and deliver training modules in: Computer Architecture and Assembly Language Secure Coding Practices Reverse Engineering and Malware Analysis Advanced C++ Development Python for Security Automation (optional/elective) Conduct assessment and certification exams to evaluate participant learning outcomes. C. Attributes Dynamic, energetic, team player, thrives among strong colleagues. Ability to work in fast paced evolving environment . Be willing and able to exercise judgment and take risks. Accept criticism and constructive feedback , while being extremely adaptable and flexible. Reflection of an impeccable persona in walk-talk while dealing with academia High spiritual quotient (Social quotient -SQ, Intelligence quotient - IQ, Emotional Quotient - EQ) D. Qualification & Years of Experience Certifications such as GREM, OSCE, OSCP, or CEI (Certified EC-Council Instructor). ME/M.Tech and BE/B.Tech in Computer Science /Information Technology Cybersecurity or related field reputed university & Institute of eminence. PhD Degree in the relevant field of subject is desirable. Industry and Global Experience is desirable. E. Salary as per norms F. Location: Greater Noida, Delhi/NCR G. Apply for the position by sending your CV at careers@glbitm.ac.in H. Visit our website’s career page at www.glbitm.ac.in
Posted 3 months ago
0.0 - 5.0 years
6 - 16 Lacs
Greater Noida
Work from Office
ABOUT JOB Designation: Cybersecurity Trainer Job Purpose : Proven experience in cybersecurity concepts, hands-on experience with tools and techniques across the security domain, and relevant industry certifications. You will be responsible for training students as per a structured semester-based roadmap that includes areas like ethical hacking, digital forensics, malware analysis, penetration testing, and more. A. Knowledge Strong understanding of security principles and best practices. Hands-on experience with tools and platforms used in SOC, VAPT, forensic analysis, and exploit development. Passion for teaching and mentoring. B. Functional Skills Deliver high-quality training in the following areas: Network Defense and Python Programming Ethical Hacking, Intrusion Detection, and Prevention Vulnerability Assessment and Penetration Testing (VAPT) Digital Forensics, Governance Risk and Compliance (GRC), Reverse Engineering Cyber Threat Intelligence (CTI), Exploit Development, OSINT Develop course content, lab exercises, and assessments aligned with semester-wise skill development. Train and mentor students on real-world scenarios and tools (e.g., Wireshark, Metasploit, Burp Suite, Splunk). C. Attributes Dynamic, energetic, team player, thrives among strong colleagues. Ability to work in fast paced evolving environment . Be willing and able to exercise judgment and take risks. Accept criticism and constructive feedback , while being extremely adaptable and flexible. Reflection of an impeccable persona in walk-talk while dealing with academia High spiritual quotient (Social quotient -SQ, Intelligence quotient - IQ, Emotional Quotient - EQ) D. Qualification & Years of Experience ME/M.Tech and BE/B.Tech in Computer Science /Information Technology from reputed university & Institute of eminence PhD Degree in the relevant field of subject is desirable. Industry and Global Experience is desirable. Certifications (Any of the following required) CEH (Certified Ethical Hacker) CompTIA Security+ / CySA+ OSCP (Offensive Security Certified Professional) CHFI (Computer Hacking Forensic Investigator) CISA/CISM (Certified Information Systems Auditor / Manager) CPT / CVAPT (Certified Penetration Tester / Certified VAPT Professional) GIAC Certifications (GSEC, GCIA, GREM etc.) E. Salary as per norms F. Location: Greater Noida, Delhi/NCR G. Apply for the position by sending your CV at careers@glbitm.ac.in H. Visit our websites career page at www.glbitm.ac.in
Posted 3 months ago
5.0 - 10.0 years
20 - 25 Lacs
Pune
Work from Office
Role & responsibilities Senior Information Security Forensics Analyst Job Description Summary Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, fi rmware and software . Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS security . Identifi es security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents. Investigates and resolves security incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and testing of hardware, fi rmware and software for possible impact on system security, and the investigation and resolution of security incidents. Summary of This Role Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, fi rmware and software . Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS security . Identifi es security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents. Investigates and resolves security incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and testing of hardware, fi rmware and software for possible impact on system security, and the investigation and resolution of security incidents. What Part Will You Play? This role requires in-depth knowledge and hands on experience with network forensics, disk forensics, host forensics (Windows/Linux/Unix/Mac OSx), log forensics, memory forensics, Cyber Kill Chain/Pre-ATT&CK/ATT&CK, and malware reverse engineering. The preference for this role is specifi c experience executing Digital Forensics and Incident Response tasks as performed in Cloud Environments, P2PE Deployments, and POS Deployments. It is additionally preferred that the candidate have specifi c experience building and deploying Digital Forensic solutions for Cloud Environments. Additional preference is also for practitioners with experience performing certifi ed forensic interviews. Experience with a scripting language such as perl, golang, python, or powershell is highly preferred. Experience producing work product such as forensic reporting, IOCs, TTP, or gap analysis is highly preferred. Knowledge of local laws, regulations regarding data handling Bachelors Degree Preferred, Industry experience in Cyber Threat Hunting, Digital Forensics, Reverse Engineering, and/or Incident Response GPEN/GXPN/OCSP/GCIH or equivalent What Are We Looking For in This Role? Minimum Qualifi cations Bachelor's Degree Relevant Experience or Degree in: Bachelor's degree in Computer Science, Info Security, or related fi eld. Or related work experience. Typically Minimum 4 Years Relevant Exp Including network operations or engineering or system administration on Unix, Linux, MAC(Message Authentication Code), or Windows; proven experience working with security operations, intrusion detection systems, Security Incident Even Management systems, and anti-virus collection logs; including knowledge of industry standard security compliance programs (PCI, SOX, GLBA, etc.) Preferred Qualifi cations Professional certifi cations CISSP(Certifi ed Information System Security Professional),CISM(Certifi ed Information Security Manager) ,CISA(Certifi ed-Information-Systems-Auditor),GSEC(GIAC Security Essentials) ,Network +,Security + Typically Minimum 4 Years Relevant Exp Knowledge of industry standard security compliance programs (PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act)) What Are Our Desired Skills and Capabilities? Act as a point of escalation for Incident Response, and advanced analytical support to GSOC. Additionally, the new hire will support the digital forensic needs of GPN functional areas to include, but not limited to: Human Resource, Threat Management Center, Fraud, and Corporate Physical Security. Acting as a point of escalation for interpreting network, system, or software behaviors. Serve as a point of escalation for handling Malware Reverse Engineering. It will require digital forensic support to greater GSOC in support of the designated primary need. Keep Senior management, business heads and other stakeholders apprised about the cases handled Experience in collecting and maintaining evidence as required by the organization and regulatory requirement.
Posted 3 months ago
1.0 - 2.0 years
0 - 1 Lacs
Mumbai, Tarapur, Ahmedabad
Work from Office
Kamla Homes is looking for Painter / Carpenter to join our dynamic team and embark on a rewarding career journey Perform surface preparation, painting, and carpentry tasks Read and interpret work drawings and specifications Use hand and power tools safely and effectively Maintain cleanliness and repair logs for equipment
Posted 3 months ago
2.0 - 5.0 years
5 - 6 Lacs
Mohali
Work from Office
Job Description- Cyber Defense Analyst We are looking for the next superstar Cyber Security Analyst to join our managed services team. Youll be part of a team responsible for the delivery of 24x7 security monitoring and analysis, with a primary focus on incident response and threat hunting. This is a customer-facing role and top-notch communication skills are absolutely essential. The Role Monitor, triage and respond to reported security incidents. Proactively hunt and manage unreported (aka. silent) phishing attacks (Intrusion Detection) Gather information, run correlation analysis and forensics to inform risk assessment Actively and timely communicate information about incidents or potential incidents to the wider team as per escalation policies Write post-incident reports Where required, develop security frameworks, contribute to run books, and lead the implementation of new security tools Work across multiple domains and technology stacks to identify vulnerabilities Ideal Personality Passion for cybersecurity Perseverance and tenacity Strong willingness to learn Logical problem-solver with a strongly analytical bent of mind Detail-oriented Ability to maintain a cool head and take decisive action in time-critical situations Natural team player. Good at building and maintaining relationships across the team, as well as getting others on board Understands the importance of proactive and clear communication in a large, busy environment Skills Very strong communication skills, report-writing and verbal communication. You must be excellent at explaining what's happening to other people in a clear and timely manner. Ability to identify, classify and breakdown the taxonomy of various types of phishing attacks. Good understanding of networks, applications, databases, systems, Active Directory, Cloud platforms and how they work together. PowerShell or Python scripting knowledge. Demonstrable expertise in any 4 of the following: Incident Management & Response, Threat Hunting with EDR & SIEM, IPS/IDS, Endpoint Monitoring & Detection, and Forensics Good understanding of Information Security Standards and Frameworks like NIST, GDPR, ISO27001, CIS Benchmarks Knowledge of information security tools and techniques and current industry best practices Qualifications & Experience: 2-3 years of real-world experience dealing with wide-ranging Incident Response with a strong understanding of phishing incidents and their mitigation steps. 2-3 years of real-world experience working with SEGs or general email systems 2-3 years of real-work experience working with the SIEM solutions. 2-3 years of real-world experience working with EDR solutions. 2-3 years of experience with Threat Assessment and Mitigation methods, Vulnerability Analysis, risk mitigation, information gathering and reporting 2-3 years of experience working in enterprise security operations Security qualifications i.e. a relevant security-related certification or degree
Posted 3 months ago
10.0 - 14.0 years
8 - 10 Lacs
Noida, Gurugram, Delhi / NCR
Work from Office
threat hunting and intelligence analysis tools,malware analysis and threat detection, SOC operations, Malware Reverse Engineering, Exploit Development, SIEM, IDS/IPS, and other security tools, CTIA, GCIA,GCIH, OSCP+,GCTI Required Candidate profile malware, ransomware, application & network layer attacks,shell, Python, and PowerShell SIEM platform (e.g., Splunk, Elastic Stack) SQL queries,Threat Hunter & Threat Intelligence Analyst
Posted 3 months ago
2.0 - 3.0 years
4 - 5 Lacs
Pune
Work from Office
Computer graduates from the Pune area only with 2 to 3 years of experience and proficiency in at least three subjects in either of the following technology groups :- Group1: C, C++, DS, Java, MS.Net, Database Technologies, Web Technologies Group2: R Programming, Linux, Python Programming, BigData Technologies, Cloud Computing, Machine Learning, Java8, Data Visualization Group3: Linux, Python Programming, PKI, Cyber Forensics , ITIL, Data Center Management & Cyber Security Experience in software development will be an added advantage.
Posted 3 months ago
7.0 - 12.0 years
5 - 15 Lacs
Kottayam, Pune, Thiruvananthapuram
Hybrid
Security Specialist, Incident Response Responsibilities includes • Lead security incident response in a cross-functional environment and drive incident resolution. • Lead and develop Incident Response initiatives that improve Allianz capabilities to effectively respond and remediate security incidents. • Perform digital forensic investigations and analysis of a wide variety of assets including endpoints. • Perform log analysis from a variety of sources to identify potential threats. • Build automation for response and remediation of malicious activity. • Write complex search queries in the EDR as well as SIEM tools for hunting the adversaries. • Works on SOAR cases, automation, workflow & Playbooks. • Integrating and working on Identity solutions. • Developing SIEM use cases for new detections specifically on identity use cases. Minimum Qualifications: • 5-10 years of experience in Security Incident Response, Investigations • Working experience in Microsoft On-prem and Entra ID solutions • Good knowledge in Active Directories and Tier 0 concepts • Very good knowledge of operating systems, processes, registries, file systems, and memory structures and experience in host and memory forensics (including live response) on Windows, macOS and Linux. • Experience investigating and responding to both external and insider threats. • Experience with attacker tactics, techniques, and procedures (MITRE ATT&CK) • Experience analyzing network and host-based security events
Posted 3 months ago
3.0 - 6.0 years
0 - 0 Lacs
Gurugram
Work from Office
Role & responsibilities Assistant Professor (Forensic Science) The Department of Forensic Science, Amity University Haryana, invites applications from eligible and motivated candidates for the position of Assistant Professor (Permanent Position) in the field of Forensic Science. Candidates with demonstrated expertise and/or research experience in any of the following areas will be given preference: Digital Forensics Cyber Forensics Cyber Security Preferred candidate profile Ph.D.in Forensic Science. He /She should have minimum three years of experience. Desirable Specialization: Candidates with demonstrated expertise and/or research experience in any of the following areas will be given preference: Digital Forensics Cyber Forensics Cyber Security Additional Requirements: Proven academic and research credentials with publications in peer-reviewed journals Strong communication skills and aptitude for teaching and mentoring Familiarity with modern pedagogical methods and forensic instrumentation
Posted 3 months ago
- 2 years
4 - 5 Lacs
Hyderabad
Work from Office
EC-Council is inviting Graduates from Engineering/ Computer Sciences/ Cyber security/IT domain to apply for an exciting opportunity in our Cyber security team. Position: Cyber Security Researcher/Cyber security Editor Location: Hyderabad & work onsite About EC Council EC-Council is the worlds largest cybersecurity technical certification body. We operate in 145 countries globally, and we are the owner and developer of various world- famous cybersecurity programs. We are proud to have trained and certified over 220,000 information security professionals globally that have influenced the cybersecurity mindset of countless organizations worldwide. www.eccouncil.org Job responsibilities: Research and analyze cyber security topics and data from various sources, such as reports, newsarticles, blogs, white papers, case studies, etc. Write clear, concise, and engaging content for different audiences and platforms Editi the content for accuracy, grammar, spelling, and punctuation. Collaborate with other writers, editors, designers, developers, and subject matter experts to ensure the quality and consistency of the content. Keep abreast of the latest developments and trends in cyber security. Manage multiple writing assignments simultaneously by prioritizing project deadlines. Follow the style guidelines and best practices of the organization Who Should Apply: Technical Graduates/Postgraduates with a flair for writing Candidates with strong command of the English language as well as the ability to write in different styles and tones. A good knowledge of cyber security concepts, trends, technologies, threats, and best practices, as well as the ability to research and verify information from credible sources. A passion for learning and staying updated on the latest developments and innovations in cyber security This is a full-time position for a Researcher who can write accurate technical content Students completing their graduation this year are also encouraged to apply. Why EC Council: EC-Council is a global organization that offers - Cybersecurity certifications & Industry-recognized credentials that demonstrate the competence and credibility of the certified professionals. Hands-on training and practical labs that simulate real-world scenarios and challenges. Access to a global network of peers, mentors, and experts who can provide guidance and support. Opportunities for professional advancement & access to a variety of world-class Cyber security certifications. Some of the certifications offered by EC-Council are: Certified Ethical Hacker (C|EH): Certified Network Defender (C|ND): Computer Hacking Forensic Investigator (C|HFI): Certified Chief Information Security Officer (C|CISO) Additional Information We are an equal opportunity workplace and an affirmative action employer. We are always committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status and we do not discriminate on the basis of such characteristics, or any other status protected by the laws or regulations in the locations where we work. EC-Council is committed to working with and providing reasonable accommodation to individuals with disabilities. If you have a medical condition or disability which inhibits your ability to complete any part of the application process and are in need of a reasonable accommodation to complete the process, please contact us ecchr@eccouncil.org and let us know how we may assist you. This notice together with our Privacy Policy and Terms of Use of this website and any other documents we mention here are meant to inform you on what personal data about you we collect, use, disclose, share or otherwise process when you are applying for a job at EC-Council or when EC-Council contacts you for recruitment purposes. Please read carefully to understand our views and practices on how we protect your personal data - Privacy Policy EC-Council (eccouncil.org).
Posted 4 months ago
10 - 15 years
15 - 20 Lacs
Noida, Gurugram, Greater Noida
Work from Office
Advanced knowledge in handling security incidents and leading investigations. Proficiency in managing and optimizing SOC operations. Experience in implementing security protocols and policies. Expertise in Malware Reverse Engineering, Required Candidate profile Certified Information Systems Security Professional (CISSP). Certified Information Security Manager (CISM). GIAC Certified Enterprise Defender (GCED). Certified Information Security Auditor (CISA),
Posted 4 months ago
2 - 5 years
7 - 9 Lacs
Gurgaon/Gurugram
Work from Office
We are looking for the candidates from Delhi/NCR for the position of IT Security Engineer for US client in Gurgaon location Candidates from West and South location need not to apply Job description Job Title: SOC Analyst Tier 2 Looking for Immediate Joiners or who can Join within 15-20 Days. Location: Gurgaon Shift : Rotational Shift / US Shift Budget: As per market standards + Shift Allowances Contract Tenure: 2 years contract on the payroll of Mynd solution. Share your CV at "Pratibha@myndsol.com" Please share your CV With the Subject line as SOC Analyst Work Experience 2 to 5 years of experience in Security Operations, SOC or Cybersecurity and Graduate in IT/CS from recognized University Key Skills - Candidate should be ready for rotational shift -.Candidate must have Excellent communication Skill - Candidate must have the knowledge of penetration testing, Knowledge of TCP/IP protocols, network applications. Good knowledge of security tools and monitoring devices - CCNA would be preferred - Equivalent Certifications (Network+, Security+, CySA+, GSEC, GMON) Job Requirement Keysight is looking for a Cybersecurity Analyst to join its growing organization and be part of its in-house Security Operations Centre (SOC). This is a position requiring a good technical background in Information Security practice, good knowledge of IT Security threats and solid communication and organizational skills. The successful candidate is very motivated and willing to take on challenges, able to multi-task to succeed and has the ability work with the team to tackle incoming alerts. The Information Risk & Security team sets strategic direction for security within the organization and aligns with stakeholders throughout the company. JOB DESCRIPTION Handling, and escalation of, alerts which require technical triage and analysis. This may include web attacks, malware infections, and phishing campaigns, which have been identified by the Information Risk & Security teams technology stack. Functional Responsibilities Experience Monitoring SIEM solutions and a variety of other security devices found in a SOC environment (e.g. Behavioral Analytics tools, IDS/IPS, log management tools, and security analytics platforms. Creating and maintaining documentation for security event processing. Acknowledge and handle the incoming security alerts. Use the internal ticketing system and dashboards to update the tickets/alerts accordingly and escalating them to the appropriate teams if necessary. Assist the Incident Response team on alerts escalated to them by the SOC team. Develop/Update and follow Standard Operating Procedures (SOPs) and Playbooks to handle standard and out-of-band alerts. Report to the Incident Response Team quickly and efficiently regarding urgent matters. Ensure ticket queues are always within satisfactory limits and all tickets are updated. Provide On-Call Support for emergency or high severity issues. Liaise with partner teams and end-users for security related tickets and activities. Excellent analytical and problem-solving skills required. Experience working with SIEMs and evaluating SIEM alerts. Experience leveraging core security and infrastructure technologies during investigations (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS) Key Competencies Ability to think with a security mindset. The successful candidate has a good IT background with good level knowledge of multiple relevant security practice areas (anti-malware solutions, patch and vulnerability management, network security; monitoring; endpoint, etc.) • Knowledge of TCP/IP Protocols, network analysis, and network/security applications. • Good knowledge of various security tools and monitoring devices; e.g. able to read and understand IDS/IPS/Firewall/Proxy logs and determine the current state of play. Experience in correlating malware infections with attack vectors to determine the extent of security and data compromise. Ability to work in a time-sensitive environment; must be detail oriented and able to multitask to meet deadlines and company objectives. Experience in large, geographically diverse enterprise networks. Ability to build lasting relationships with partner teams and stakeholders. Documentation; experience in writing reports and documenting tickets efficiently and accurately. Visit : http://www.keysight.com/ Feel free to reach me for any clarifications
Posted 4 months ago
4.0 - 9.0 years
2 - 3 Lacs
lucknow
Work from Office
Seeking a qualified Cyber Security Faculty to teach, develop curriculum, and guide students and professionals in cyber defense, ethical hacking, and digital forensics. Must have industry experience and strong teaching skills.
Posted Date not available
5.0 - 10.0 years
20 - 32 Lacs
bengaluru
Hybrid
About the Role: We are looking for an experienced security professional to join our Security Operations Center (SOC) team. This role focuses on designing, refining, and implementing advanced threat detection use cases and response strategies aligned with the MITRE ATT&CK and Cyber Kill Chain frameworks. You will collaborate with Threat Intelligence, Incident Response, and Forensics teams to strengthen defense capabilities and proactively mitigate cyber threats. Key Responsibilities: Develop and implement custom security detection use cases and response strategies. Leverage MITRE ATT&CK and Cyber Kill Chain to identify, analyze, and prevent cyber threats. Participate in red teaming and penetration testing to validate detection rules. Monitor, investigate, and respond to security events using advanced tools (Splunk, EnCase, FTK, Wireshark, Volatility, tcpdump, etc.). Create and maintain metrics to measure detection effectiveness. Stay ahead of emerging threats and industry trends. Requirements: Bachelors degree in IT, Cybersecurity, or related field (or equivalent experience). 58 years in Information Security or IT, preferably in Financial Services. Knowledge of security frameworks (MITRE ATT&CK, Cyber Kill Chain). Experience in incident detection, investigation, and response. Strong understanding of network, endpoint, and cloud security. Hands-on experience with forensic tools and SIEM platforms. Preferred certifications: CISSP, GCIH, GCFA, GNFA, SANS, GSEC.
Posted Date not available
7.0 - 12.0 years
15 - 30 Lacs
mumbai, thane, navi mumbai
Work from Office
1. Security Specialist / Security Analyst / Security Engineer - SOC Operations and Cyber Forensics 2. Associate Head - Risk, Compliance and Awareness 3. Security Specialist / Security Engineer- Solutions and Architecture Experience - 5 Plus Years
Posted Date not available
0.0 years
2 - 3 Lacs
chennai
Work from Office
Key Responsibilities: Assist in planning and conducting cybersecurity audits under supervision. Review and validate IT policies, procedures, and security controls. Collect and document audit evidence (logs, reports, screenshots). Support risk assessments and gap analysis activities. Participate in audit walkthroughs and internal interviews. Track and follow up on audit findings and corrective actions. Help prepare audit reports and summaries for review by senior auditors. Support coordination with external auditors or certifying bodies. Qualifications & Skills: Bachelors degree in Computer Science, IT, Cybersecurity, or a related field. Basic knowledge of cybersecurity frameworks (ISO 27001, NIST, CIS). Understanding of information security principles and risk management. Good documentation and communication skills. Willingness to learn audit processes and compliance standards. Preferred Certifications (Optional but Advantageous): ISO 27001:2022 ISMS Internal Auditor (or willingness to pursue) CISA Awareness level Microsoft SC-900 / CompTIA Security+ Familiarity with GRC tools is a plus
Posted Date not available
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |