Jobs
Interviews

61 Cyber Forensics Jobs - Page 3

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0.0 - 5.0 years

6 - 16 Lacs

Greater Noida

Work from Office

ABOUT JOB Designation: Cybersecurity Trainer Job Purpose : Proven experience in cybersecurity concepts, hands-on experience with tools and techniques across the security domain, and relevant industry certifications. You will be responsible for training students as per a structured semester-based roadmap that includes areas like ethical hacking, digital forensics, malware analysis, penetration testing, and more. A. Knowledge Strong understanding of security principles and best practices. Hands-on experience with tools and platforms used in SOC, VAPT, forensic analysis, and exploit development. Passion for teaching and mentoring. B. Functional Skills Deliver high-quality training in the following areas: Network Defense and Python Programming Ethical Hacking, Intrusion Detection, and Prevention Vulnerability Assessment and Penetration Testing (VAPT) Digital Forensics, Governance Risk and Compliance (GRC), Reverse Engineering Cyber Threat Intelligence (CTI), Exploit Development, OSINT Develop course content, lab exercises, and assessments aligned with semester-wise skill development. Train and mentor students on real-world scenarios and tools (e.g., Wireshark, Metasploit, Burp Suite, Splunk). C. Attributes Dynamic, energetic, team player, thrives among strong colleagues. Ability to work in fast paced evolving environment . Be willing and able to exercise judgment and take risks. Accept criticism and constructive feedback , while being extremely adaptable and flexible. Reflection of an impeccable persona in walk-talk while dealing with academia High spiritual quotient (Social quotient -SQ, Intelligence quotient - IQ, Emotional Quotient - EQ) D. Qualification & Years of Experience ME/M.Tech and BE/B.Tech in Computer Science /Information Technology from reputed university & Institute of eminence PhD Degree in the relevant field of subject is desirable. Industry and Global Experience is desirable. Certifications (Any of the following required) CEH (Certified Ethical Hacker) CompTIA Security+ / CySA+ OSCP (Offensive Security Certified Professional) CHFI (Computer Hacking Forensic Investigator) CISA/CISM (Certified Information Systems Auditor / Manager) CPT / CVAPT (Certified Penetration Tester / Certified VAPT Professional) GIAC Certifications (GSEC, GCIA, GREM etc.) E. Salary as per norms F. Location: Greater Noida, Delhi/NCR G. Apply for the position by sending your CV at careers@glbitm.ac.in H. Visit our websites career page at www.glbitm.ac.in

Posted 2 months ago

Apply

5.0 - 10.0 years

20 - 25 Lacs

Pune

Work from Office

Role & responsibilities Senior Information Security Forensics Analyst Job Description Summary Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, fi rmware and software . Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS security . Identifi es security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents. Investigates and resolves security incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and testing of hardware, fi rmware and software for possible impact on system security, and the investigation and resolution of security incidents. Summary of This Role Evaluates, tests, recommends, develops, coordinates, monitors, and maintains information security policies, procedures and systems, including hardware, fi rmware and software . Ensures that IS security architecture/designs, plans, controls, processes, standards, policies and procedures are aligned with IS standards and overall IS security . Identifi es security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents. Investigates and resolves security incidents and recommends enhancements to improve security. Develops techniques and procedures for conducting IS security risk assessments and compliance audits, the evaluation and testing of hardware, fi rmware and software for possible impact on system security, and the investigation and resolution of security incidents. What Part Will You Play? This role requires in-depth knowledge and hands on experience with network forensics, disk forensics, host forensics (Windows/Linux/Unix/Mac OSx), log forensics, memory forensics, Cyber Kill Chain/Pre-ATT&CK/ATT&CK, and malware reverse engineering. The preference for this role is specifi c experience executing Digital Forensics and Incident Response tasks as performed in Cloud Environments, P2PE Deployments, and POS Deployments. It is additionally preferred that the candidate have specifi c experience building and deploying Digital Forensic solutions for Cloud Environments. Additional preference is also for practitioners with experience performing certifi ed forensic interviews. Experience with a scripting language such as perl, golang, python, or powershell is highly preferred. Experience producing work product such as forensic reporting, IOCs, TTP, or gap analysis is highly preferred. Knowledge of local laws, regulations regarding data handling Bachelors Degree Preferred, Industry experience in Cyber Threat Hunting, Digital Forensics, Reverse Engineering, and/or Incident Response GPEN/GXPN/OCSP/GCIH or equivalent What Are We Looking For in This Role? Minimum Qualifi cations Bachelor's Degree Relevant Experience or Degree in: Bachelor's degree in Computer Science, Info Security, or related fi eld. Or related work experience. Typically Minimum 4 Years Relevant Exp Including network operations or engineering or system administration on Unix, Linux, MAC(Message Authentication Code), or Windows; proven experience working with security operations, intrusion detection systems, Security Incident Even Management systems, and anti-virus collection logs; including knowledge of industry standard security compliance programs (PCI, SOX, GLBA, etc.) Preferred Qualifi cations Professional certifi cations CISSP(Certifi ed Information System Security Professional),CISM(Certifi ed Information Security Manager) ,CISA(Certifi ed-Information-Systems-Auditor),GSEC(GIAC Security Essentials) ,Network +,Security + Typically Minimum 4 Years Relevant Exp Knowledge of industry standard security compliance programs (PCI(Payment Card Industry), SOX(Sarbanes-Oxley) , GLBA(Gramm Leach Bliley Act)) What Are Our Desired Skills and Capabilities? Act as a point of escalation for Incident Response, and advanced analytical support to GSOC. Additionally, the new hire will support the digital forensic needs of GPN functional areas to include, but not limited to: Human Resource, Threat Management Center, Fraud, and Corporate Physical Security. Acting as a point of escalation for interpreting network, system, or software behaviors. Serve as a point of escalation for handling Malware Reverse Engineering. It will require digital forensic support to greater GSOC in support of the designated primary need. Keep Senior management, business heads and other stakeholders apprised about the cases handled Experience in collecting and maintaining evidence as required by the organization and regulatory requirement.

Posted 2 months ago

Apply

1.0 - 2.0 years

0 - 1 Lacs

Mumbai, Tarapur, Ahmedabad

Work from Office

Kamla Homes is looking for Painter / Carpenter to join our dynamic team and embark on a rewarding career journey Perform surface preparation, painting, and carpentry tasks Read and interpret work drawings and specifications Use hand and power tools safely and effectively Maintain cleanliness and repair logs for equipment

Posted 2 months ago

Apply

2.0 - 5.0 years

5 - 6 Lacs

Mohali

Work from Office

Job Description- Cyber Defense Analyst We are looking for the next superstar Cyber Security Analyst to join our managed services team. Youll be part of a team responsible for the delivery of 24x7 security monitoring and analysis, with a primary focus on incident response and threat hunting. This is a customer-facing role and top-notch communication skills are absolutely essential. The Role Monitor, triage and respond to reported security incidents. Proactively hunt and manage unreported (aka. silent) phishing attacks (Intrusion Detection) Gather information, run correlation analysis and forensics to inform risk assessment Actively and timely communicate information about incidents or potential incidents to the wider team as per escalation policies Write post-incident reports Where required, develop security frameworks, contribute to run books, and lead the implementation of new security tools Work across multiple domains and technology stacks to identify vulnerabilities Ideal Personality Passion for cybersecurity Perseverance and tenacity Strong willingness to learn Logical problem-solver with a strongly analytical bent of mind Detail-oriented Ability to maintain a cool head and take decisive action in time-critical situations Natural team player. Good at building and maintaining relationships across the team, as well as getting others on board Understands the importance of proactive and clear communication in a large, busy environment Skills Very strong communication skills, report-writing and verbal communication. You must be excellent at explaining what's happening to other people in a clear and timely manner. Ability to identify, classify and breakdown the taxonomy of various types of phishing attacks. Good understanding of networks, applications, databases, systems, Active Directory, Cloud platforms and how they work together. PowerShell or Python scripting knowledge. Demonstrable expertise in any 4 of the following: Incident Management & Response, Threat Hunting with EDR & SIEM, IPS/IDS, Endpoint Monitoring & Detection, and Forensics Good understanding of Information Security Standards and Frameworks like NIST, GDPR, ISO27001, CIS Benchmarks Knowledge of information security tools and techniques and current industry best practices Qualifications & Experience: 2-3 years of real-world experience dealing with wide-ranging Incident Response with a strong understanding of phishing incidents and their mitigation steps. 2-3 years of real-world experience working with SEGs or general email systems 2-3 years of real-work experience working with the SIEM solutions. 2-3 years of real-world experience working with EDR solutions. 2-3 years of experience with Threat Assessment and Mitigation methods, Vulnerability Analysis, risk mitigation, information gathering and reporting 2-3 years of experience working in enterprise security operations Security qualifications i.e. a relevant security-related certification or degree

Posted 2 months ago

Apply

10.0 - 14.0 years

8 - 10 Lacs

Noida, Gurugram, Delhi / NCR

Work from Office

threat hunting and intelligence analysis tools,malware analysis and threat detection, SOC operations, Malware Reverse Engineering, Exploit Development, SIEM, IDS/IPS, and other security tools, CTIA, GCIA,GCIH, OSCP+,GCTI Required Candidate profile malware, ransomware, application & network layer attacks,shell, Python, and PowerShell SIEM platform (e.g., Splunk, Elastic Stack) SQL queries,Threat Hunter & Threat Intelligence Analyst

Posted 2 months ago

Apply

2.0 - 3.0 years

4 - 5 Lacs

Pune

Work from Office

Computer graduates from the Pune area only with 2 to 3 years of experience and proficiency in at least three subjects in either of the following technology groups :- Group1: C, C++, DS, Java, MS.Net, Database Technologies, Web Technologies Group2: R Programming, Linux, Python Programming, BigData Technologies, Cloud Computing, Machine Learning, Java8, Data Visualization Group3: Linux, Python Programming, PKI, Cyber Forensics , ITIL, Data Center Management & Cyber Security Experience in software development will be an added advantage.

Posted 2 months ago

Apply

7.0 - 12.0 years

5 - 15 Lacs

Kottayam, Pune, Thiruvananthapuram

Hybrid

Security Specialist, Incident Response Responsibilities includes • Lead security incident response in a cross-functional environment and drive incident resolution. • Lead and develop Incident Response initiatives that improve Allianz capabilities to effectively respond and remediate security incidents. • Perform digital forensic investigations and analysis of a wide variety of assets including endpoints. • Perform log analysis from a variety of sources to identify potential threats. • Build automation for response and remediation of malicious activity. • Write complex search queries in the EDR as well as SIEM tools for hunting the adversaries. • Works on SOAR cases, automation, workflow & Playbooks. • Integrating and working on Identity solutions. • Developing SIEM use cases for new detections specifically on identity use cases. Minimum Qualifications: • 5-10 years of experience in Security Incident Response, Investigations • Working experience in Microsoft On-prem and Entra ID solutions • Good knowledge in Active Directories and Tier 0 concepts • Very good knowledge of operating systems, processes, registries, file systems, and memory structures and experience in host and memory forensics (including live response) on Windows, macOS and Linux. • Experience investigating and responding to both external and insider threats. • Experience with attacker tactics, techniques, and procedures (MITRE ATT&CK) • Experience analyzing network and host-based security events

Posted 2 months ago

Apply

3.0 - 6.0 years

0 - 0 Lacs

Gurugram

Work from Office

Role & responsibilities Assistant Professor (Forensic Science) The Department of Forensic Science, Amity University Haryana, invites applications from eligible and motivated candidates for the position of Assistant Professor (Permanent Position) in the field of Forensic Science. Candidates with demonstrated expertise and/or research experience in any of the following areas will be given preference: Digital Forensics Cyber Forensics Cyber Security Preferred candidate profile Ph.D.in Forensic Science. He /She should have minimum three years of experience. Desirable Specialization: Candidates with demonstrated expertise and/or research experience in any of the following areas will be given preference: Digital Forensics Cyber Forensics Cyber Security Additional Requirements: Proven academic and research credentials with publications in peer-reviewed journals Strong communication skills and aptitude for teaching and mentoring Familiarity with modern pedagogical methods and forensic instrumentation

Posted 2 months ago

Apply

- 2 years

4 - 5 Lacs

Hyderabad

Work from Office

EC-Council is inviting Graduates from Engineering/ Computer Sciences/ Cyber security/IT domain to apply for an exciting opportunity in our Cyber security team. Position: Cyber Security Researcher/Cyber security Editor Location: Hyderabad & work onsite About EC Council EC-Council is the worlds largest cybersecurity technical certification body. We operate in 145 countries globally, and we are the owner and developer of various world- famous cybersecurity programs. We are proud to have trained and certified over 220,000 information security professionals globally that have influenced the cybersecurity mindset of countless organizations worldwide. www.eccouncil.org Job responsibilities: Research and analyze cyber security topics and data from various sources, such as reports, newsarticles, blogs, white papers, case studies, etc. Write clear, concise, and engaging content for different audiences and platforms Editi the content for accuracy, grammar, spelling, and punctuation. Collaborate with other writers, editors, designers, developers, and subject matter experts to ensure the quality and consistency of the content. Keep abreast of the latest developments and trends in cyber security. Manage multiple writing assignments simultaneously by prioritizing project deadlines. Follow the style guidelines and best practices of the organization Who Should Apply: Technical Graduates/Postgraduates with a flair for writing Candidates with strong command of the English language as well as the ability to write in different styles and tones. A good knowledge of cyber security concepts, trends, technologies, threats, and best practices, as well as the ability to research and verify information from credible sources. A passion for learning and staying updated on the latest developments and innovations in cyber security This is a full-time position for a Researcher who can write accurate technical content Students completing their graduation this year are also encouraged to apply. Why EC Council: EC-Council is a global organization that offers - Cybersecurity certifications & Industry-recognized credentials that demonstrate the competence and credibility of the certified professionals. Hands-on training and practical labs that simulate real-world scenarios and challenges. Access to a global network of peers, mentors, and experts who can provide guidance and support. Opportunities for professional advancement & access to a variety of world-class Cyber security certifications. Some of the certifications offered by EC-Council are: Certified Ethical Hacker (C|EH): Certified Network Defender (C|ND): Computer Hacking Forensic Investigator (C|HFI): Certified Chief Information Security Officer (C|CISO) Additional Information We are an equal opportunity workplace and an affirmative action employer. We are always committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status and we do not discriminate on the basis of such characteristics, or any other status protected by the laws or regulations in the locations where we work. EC-Council is committed to working with and providing reasonable accommodation to individuals with disabilities. If you have a medical condition or disability which inhibits your ability to complete any part of the application process and are in need of a reasonable accommodation to complete the process, please contact us ecchr@eccouncil.org and let us know how we may assist you. This notice together with our Privacy Policy and Terms of Use of this website and any other documents we mention here are meant to inform you on what personal data about you we collect, use, disclose, share or otherwise process when you are applying for a job at EC-Council or when EC-Council contacts you for recruitment purposes. Please read carefully to understand our views and practices on how we protect your personal data - Privacy Policy EC-Council (eccouncil.org).

Posted 2 months ago

Apply

10 - 15 years

15 - 20 Lacs

Noida, Gurugram, Greater Noida

Work from Office

Advanced knowledge in handling security incidents and leading investigations. Proficiency in managing and optimizing SOC operations. Experience in implementing security protocols and policies. Expertise in Malware Reverse Engineering, Required Candidate profile Certified Information Systems Security Professional (CISSP). Certified Information Security Manager (CISM). GIAC Certified Enterprise Defender (GCED). Certified Information Security Auditor (CISA),

Posted 2 months ago

Apply

2 - 5 years

7 - 9 Lacs

Gurgaon/Gurugram

Work from Office

We are looking for the candidates from Delhi/NCR for the position of IT Security Engineer for US client in Gurgaon location Candidates from West and South location need not to apply Job description Job Title: SOC Analyst Tier 2 Looking for Immediate Joiners or who can Join within 15-20 Days. Location: Gurgaon Shift : Rotational Shift / US Shift Budget: As per market standards + Shift Allowances Contract Tenure: 2 years contract on the payroll of Mynd solution. Share your CV at "Pratibha@myndsol.com" Please share your CV With the Subject line as SOC Analyst Work Experience 2 to 5 years of experience in Security Operations, SOC or Cybersecurity and Graduate in IT/CS from recognized University Key Skills - Candidate should be ready for rotational shift -.Candidate must have Excellent communication Skill - Candidate must have the knowledge of penetration testing, Knowledge of TCP/IP protocols, network applications. Good knowledge of security tools and monitoring devices - CCNA would be preferred - Equivalent Certifications (Network+, Security+, CySA+, GSEC, GMON) Job Requirement Keysight is looking for a Cybersecurity Analyst to join its growing organization and be part of its in-house Security Operations Centre (SOC). This is a position requiring a good technical background in Information Security practice, good knowledge of IT Security threats and solid communication and organizational skills. The successful candidate is very motivated and willing to take on challenges, able to multi-task to succeed and has the ability work with the team to tackle incoming alerts. The Information Risk & Security team sets strategic direction for security within the organization and aligns with stakeholders throughout the company. JOB DESCRIPTION Handling, and escalation of, alerts which require technical triage and analysis. This may include web attacks, malware infections, and phishing campaigns, which have been identified by the Information Risk & Security teams technology stack. Functional Responsibilities Experience Monitoring SIEM solutions and a variety of other security devices found in a SOC environment (e.g. Behavioral Analytics tools, IDS/IPS, log management tools, and security analytics platforms. Creating and maintaining documentation for security event processing. Acknowledge and handle the incoming security alerts. Use the internal ticketing system and dashboards to update the tickets/alerts accordingly and escalating them to the appropriate teams if necessary. Assist the Incident Response team on alerts escalated to them by the SOC team. Develop/Update and follow Standard Operating Procedures (SOPs) and Playbooks to handle standard and out-of-band alerts. Report to the Incident Response Team quickly and efficiently regarding urgent matters. Ensure ticket queues are always within satisfactory limits and all tickets are updated. Provide On-Call Support for emergency or high severity issues. Liaise with partner teams and end-users for security related tickets and activities. Excellent analytical and problem-solving skills required. Experience working with SIEMs and evaluating SIEM alerts. Experience leveraging core security and infrastructure technologies during investigations (e.g. firewall logs, network security tools, malware detonation devices, proxies, IPS/IDS) Key Competencies Ability to think with a security mindset. The successful candidate has a good IT background with good level knowledge of multiple relevant security practice areas (anti-malware solutions, patch and vulnerability management, network security; monitoring; endpoint, etc.) • Knowledge of TCP/IP Protocols, network analysis, and network/security applications. • Good knowledge of various security tools and monitoring devices; e.g. able to read and understand IDS/IPS/Firewall/Proxy logs and determine the current state of play. Experience in correlating malware infections with attack vectors to determine the extent of security and data compromise. Ability to work in a time-sensitive environment; must be detail oriented and able to multitask to meet deadlines and company objectives. Experience in large, geographically diverse enterprise networks. Ability to build lasting relationships with partner teams and stakeholders. Documentation; experience in writing reports and documenting tickets efficiently and accurately. Visit : http://www.keysight.com/ Feel free to reach me for any clarifications

Posted 2 months ago

Apply
Page 3 of 3
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies