Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
5.0 - 10.0 years
6 - 16 Lacs
Hyderabad
Remote
Role & responsibilities Incident Management: Lead the end-to-end incident response lifecycle, including detection, analysis, containment, eradication, and recovery. Threat Investigation: Analyze and investigate a variety of attack vectors, such as: Identity attacks include credential abuse, privilege escalation, and MFA bypass. Web Attacks: SQL injection, cross-site scripting (XSS), remote code execution. Network Attacks: DDoS, lateral movement, traffic manipulation. Cloud Threats: IAM misconfigurations, exposed services, container security vulnerabilities. Collaboration & Coordination: Work closely with SOC analysts, threat intelligence teams, forensics, and engineering groups during and after security incidents. Root Cause Analysis: Conduct comprehensive investigations to determine the root cause of incidents and provide actionable remediation recommendations. Preferred candidate profile A minimum of 5 years of hands-on experience in cybersecurity incident response or security operations. Proven expertise in investigating and mitigating incidents across one or more areas: identity, web, network, or cloud. Proficiency with SIEM, EDR, and SOAR tools (e.g., Splunk, Sentinel, CrowdStrike). Experience in hybrid or cloud-first environments (AWS, Azure, or GCP). Strong understanding of frameworks and methodologies such as MITRE ATT&CK, the cyber kill chain, and threat modeling.
Posted 3 weeks ago
7.0 - 12.0 years
18 - 27 Lacs
Bengaluru
Hybrid
Level 3 SOC Responder Role Overview: A Level 3 SOC Analyst is responsible for advanced threat detection, incident response, and continuous monitoring of security events. They lead investigations, coordinate responses, and mentor junior analysts, ensuring the security and integrity of information systems. Key Responsibilities: Lead the investigation and response to complex security incidents, including advanced persistent threats (APTs), malware outbreaks, and insider threats Liaison between SOC and customer Incident response team to handle complex incidents Document security incidents, investigative findings, and remediation activities in accordance with established incident response procedures and protocols Suggest SIEM rule finetuning to reduce false positive alerts Develop standard operating procedures (SOPs) Perform quality review of the alerts handled by L1 and L2 Track KPIs and create dashboards for executive briefing Provide guidance and mentorship to junior SOC analysts, imparting knowledge and best practices in incident detection, analysis, and response. Conduct training sessions and workshops to enhance the skills and capabilities of SOC team members Skills and Qualifications: Education: Bachelors degree in Cybersecurity, Information Technology, Computer Science, or a related field. Experience: 7+ years of experience in SOC operations, incident response, and threat hunting. Experience in CrowdStrike SIEM and EDR preferred. Certifications (Preferred): Relevant certifications such as CISSP, CEH, GCIH, or similar. Problem-Solving Skills: Excellent problem-solving skills and attention to detail. Communication Skills: Strong communication skills, both written and verbal. Work Environment: Typically works in a security operations center. May require shift work to provide 24/7 monitoring. Looking for immediate joiner
Posted 3 weeks ago
5.0 - 8.0 years
10 - 11 Lacs
Bengaluru
Work from Office
Job Description: We are seeking a Senior DFIR Analyst with experience in forensic investigation and incident response. The candidate should be able to handle cases end-to-end, including client communication, reporting, and leading the team of forensic analysts. The ideal candidate should have experience in forensic investigation of all major operating systems such as Windows Server, Linux, and Mac OS. The candidate would also be responsible to R&D activities to identify new tools and techniques for forensic analysis and incident response. Key Responsibilities: Handle digital forensic cases end to end, including acquisition of data, analysis of complex digital evidence, client communication, presentations and reporting. Conduct forensic investigations of all major operating systems such as Windows, Linux, Mac OS, etc. Conduct forensic analysis of system and application logs, web applications logs, network traffic, and other digital artifacts. Provide expert technical assistance to clients during investigations and incident response activities. Lead the team of forensic analysts in conducting investigations and incident response activities. Mentor and train junior analysts on DFIR techniques, tools, and best practices. Conduct R&D activities to identify new tools and techniques for forensic analysis and incident response. This includes staying up-to-date with industry trends and emerging technologies to continually enhance our forensic capabilities Document and present findings, including preparing detailed forensic analysis reports. Requirements: Bachelor/masters degree in digital Forensics, Computer Science, or a related field. 5-8 years of experience in digital forensics and incident response. Experience in leading a team of forensic analysts. In-depth knowledge of digital forensic tools and techniques. Excellent written and verbal communication skills. Ability to effectively communicate technical concepts to non-technical stakeholders. Ability to manage multiple cases simultaneously and provide timely updates and status reports. Ability to work independently and as part of a team. Experience with forensic analysis of system and application logs, web applications logs, network traffic, and other digital artifacts. Strong analytical and problem-solving skills. Excellent searching skills and self-learning. Preferred Qualifications: Relevant industry certifications such as AccessData Certified Examiner (ACE), EC-Council Certified Hacking Forensic Investigator (EC-CHFI), GCFA, GCFE, EnCE or other relevant certifications. Experience with programming languages for scripting/automation of tasks. Experience with reverse engineering and malware analysis. Strong analytical and problem-solving skills. Experience in R&D activities. Familiarity with legal and regulatory requirements related to digital forensics and incident response.
Posted 1 month ago
2.0 - 7.0 years
30 Lacs
Bengaluru
Work from Office
2+yrs of working experience in the computer forensics, cybercrime investigations, and other related technical fields with a combination of both public and private sector experience preferred. Identify, contain, mitigate, recover, and report on cyber-security incidents affecting the enterprise and business. The ability to constantly develop new and grow existing skills relating to Digital Forensics, as well as computing and professional topics. Knowledge of computer forensic best practices and industry standard methodologies for investigating host-based and network analysis The knowledge, skills, and ability to preserve digital evidence from a variety of platforms in a forensically sound manner. Knowledge of and a proven ability to follow globally established standards in digital evidence acquisition and handling. Demonstrate an understanding of digital forensic tools and techniques used to support internal fraud and employee investigations. Serve as an initial point of escalation for suspected incidents and intrusions. Demonstrated capability with endpoint detection and live response tools. Knowledge of digital forensics on Microsoft Windows, Mac, and Linux based systems. Proficiency with DFIR related open-source tools, memory, and full disk analysis The ability to work independently or with a team during large scale forensic investigations Demonstrate an understanding of incident response forensics and root cause analysis. Experience preparing in-depth investigation reports into forensic investigations, breach reports, privacy incidents and data exposure type cases. The ability to constantly develop new and grow existing skills relating to Digital Forensics, as well as computing and professional topics. Strong attention to detail in conducting forensic analysis combined with an ability to accurately record full documentation in support of the investigation.' Education specifications Any Techniqal Degree / Any UG, PG preferred Mandatory Skills: Cyber forensics, Memory analysis, Memory Forensics, Incident response, Digital Forensics, Strong communication skill (verbal and written), Working knowledge of Forensics tools including (but not limited to) FTK, Encase, Autopsy, Magnet Axiom, volatility, wireshark, Threat intelligence feeds, Cyber threat landscape and APT groups, SIEM (any), EDR (any), MITRE framework, Cyber kill chain framework. Certifications: Desirable certifications include, (but not limited to) CHFI, CIH, CSA, CEH, GSEC, GCIH, GCIA, GCFE, GREM, GCFA.
Posted 1 month ago
2.0 - 7.0 years
25 - 30 Lacs
Bengaluru
Work from Office
Mandatory Skills: Cyber forensics, Memory analysis, Memory Forensics, Incident response, Digital Forensics, Strong communication skill (verbal and written), Working knowledge of Forensics tools including (but not limited to) FTK, Encase, Autopsy, Magnet Axiom, volatility, wireshark, Threat intelligence feeds, Cyber threat landscape and APT groups, SIEM (any), EDR (any), MITRE framework, Cyber kill chain framework. Qualifications: 2+yrs of working experience in the computer forensics, cybercrime investigations, and other related technical fields with a combination of both public and private sector experience preferred. Identify, contain, mitigate, recover, and report on cyber-security incidents affecting the enterprise and business. The ability to constantly develop new and grow existing skills relating to Digital Forensics, as well as computing and professional topics. Knowledge of computer forensic best practices and industry standard methodologies for investigating host-based and network analysis The knowledge, skills, and ability to preserve digital evidence from a variety of platforms in a forensically sound manner. Knowledge of and a proven ability to follow globally established standards in digital evidence acquisition and handling. Demonstrate an understanding of digital forensic tools and techniques used to support internal fraud and employee investigations. Serve as an initial point of escalation for suspected incidents and intrusions. Demonstrated capability with endpoint detection and live response tools. Knowledge of digital forensics on Microsoft Windows, Mac, and Linux based systems. Proficiency with DFIR related open-source tools, memory, and full disk analysis The ability to work independently or with a team during large scale forensic investigations Demonstrate an understanding of incident response forensics and root cause analysis. Experience preparing in-depth investigation reports into forensic investigations, breach reports, privacy incidents and data exposure type cases. The ability to constantly develop new and grow existing skills relating to Digital Forensics, as well as computing and professional topics. Strong attention to detail in conducting forensic analysis combined with an ability to accurately record full documentation in support of the investigation. Certifications: Desirable certifications include, (but not limited to) CHFI, CIH, CSA, CEH, GSEC, GCIH, GCIA, GCFE, GREM, GCFA.
Posted 1 month ago
2.0 - 5.0 years
10 - 14 Lacs
Kanpur
Work from Office
Rama Super Speciality Hospital is looking for Professor Forensic Medicine to join our dynamic team and embark on a rewarding career journey Professor is a full-time academic position in a college or university, responsible for teaching, conducting research, and serving on committees They play a critical role in contributing to the intellectual life of their institution and in preparing the next generation of professionals and leaders Responsibilities:Teach a range of courses in the department, at both the undergraduate and graduate levelsConduct original research in the field and publish findings in academic journals and at conferencesAdvise students and mentor junior faculty members Participate in department and university-wide committees, such as curriculum committees and search committeesPursue external funding opportunities to support research and teaching activities Engage in professional development activities to stay current in the field and enhance teaching skills Requirements:A record of successful teaching and research, with a strong publication record in academic journals Ability to teach a range of courses in the department, at both the undergraduate and graduate levelsStrong communication and interpersonal skills, with the ability to mentor students and junior faculty membersA commitment to continued professional development and growth
Posted 1 month ago
2.0 - 6.0 years
6 - 10 Lacs
Kharagpur
Work from Office
Analyst Level 3 Security Operations Centre (SOC) Ways of working Full-time with rotational shifts and mandatory Work from Office Location: Embassy Tesh Village, Bangalore Year of Experience: 5+ years in a SOC or security operations environment, with at least 2 years in a senior or advanced analyst role About The Team & Role As a Level 3 Security Operations Centre (SOC) Analyst, you will be responsible for identifying, analyzing, and responding to security incidents and threats within an organization's IT infrastructure This senior role demands a high level of expertise in security operations, threat analysis, and incident response You will work closely with other teams, including Level 1 and Level 2 analysts, management, and engineering, to ensure the security of the organization's network and systems Your work will contribute to detecting and mitigating advanced cyber threats, ensuring that the organization remains protected against emerging risks What will you get to do here Incident Response & Investigation Lead investigations of complex security incidents, including intrusion detection, malware analysis, and vulnerability exploitation Perform in-depth analysis of security incidents to determine their scope, impact, and method of attack Take immediate and appropriate action to contain, mitigate, and resolve security threats Threat Hunting Proactively hunt for hidden threats and vulnerabilities within the organization's systems and networks Analyze logs and data from multiple sources (e g , firewalls, intrusion detection systems, antivirus solutions) to identify patterns indicative of malicious activity Utilize advanced threat intelligence to stay ahead of potential attackers and new attack vectors Security Monitoring & Analysis Oversee and manage security monitoring tools to detect potential security incidents and vulnerabilities Analyze alerts and reports generated by various security tools, ensuring accuracy and appropriateness Ensure the effective operation and tuning of SIEM (Security Information and Event Management) systems, IDS/IPS, and other security technologies Identify and define new use cases as well as modify existing ones Collaboration & Knowledge Sharing Mentor and provide guidance to junior analysts (Level 1 and Level 2) in incident handling, investigation, and security best practices Collaborate with IT, network, and engineering teams to resolve security issues and implement proactive security measures Document incidents and maintain accurate records for reporting and auditing purposes Reporting & Documentation Generate detailed post-incident reports that include findings, recommendations, and remediation steps Assist in the development and maintenance of SOC procedures, playbooks, and security policies Report trends and emerging threats to senior management and stakeholders Create and maintain standard operating procedures (SOPs), playbooks, and runbooks Lead root cause analysis and develop lessons learned documentation post-incident Continuous Improvement Stay up to date on the latest cybersecurity threats, trends, and technologies Contribute to the development and improvement of incident response plans and security protocols Participate in security training programs to continually enhance skills and capabilities What qualities are we looking for Education: Bachelor's degree in Computer Science, Information Security, or related field, or equivalent experience Experience: 5+ years of experience in a SOC or security operations environment, with at least 2 years in a senior or advanced analyst role Technical Skills: Strong experience with security tools and SaaS Application, including SIEM (Splunk, Sentinel One, QRadar, etc ), IDS/IPS, firewalls, Endpoint Protection, DLP, Active Directory/Azure and vulnerability scanners Expertise in incident response, digital forensics, and malware analysis Deep understanding of security frameworks, methodologies, and best practices (NIST, ISO 27001, MITRE ATT&CK, etc) Knowledge and experience of common operating systems (Windows, Mac, Linux) and networking protocols (TCP/IP, HTTP, DNS, etc) Advanced understanding of cyber threats and attack vectors, including APTs (Advanced Persistent Threats), ransomware, DDoS, and insider threats Familiarity with cloud security environments and services (AWS, Azure, GCP) Skills & Abilities: Strong written and verbal communication skills, with the ability to report findings to both technical and non-technical stakeholders Ability to work well under pressure and manage multiple tasks simultaneously Relevant certifications such as CISSP, CISM, CEH, GIAC, or similar are a plus Desired Skills: Experience with threat intelligence platforms and frameworks Proficiency in scripting or automation (Python, PowerShell, etc ) for threat detection and incident response tasks Experience with network traffic analysis tools (Wireshark, tcpdump, etc ) Knowledge of forensic tools and techniques Familiarity with security incident management platforms (ServiceNow, Remedy, Jira, Fresdesk etc) Preferred Certifications: CompTIA Security+ EC-Council Certified SOC Analyst (CSA) CompTIA Cybersecurity Analyst (CySA+) EC-Council SOC Essentials (S|CE) ISACA CCOA GIAC Security Operations Certified (GSOC): GIAC Certified Incident Handler (GCIH): GIAC Certified Intrusion Analyst (GCIA): (ISC) Systems Security Certified Practitioner (SSCP): GIAC Cyber Threat Intelligence (GCTI): GIAC Certified Forensic Analyst (GCFA) / GIAC Certified Forensic Responder (GCFR) AWS Certified Security Specialty / Certified Cloud Security Professional (CCSP)
Posted 1 month ago
10.0 - 20.0 years
25 - 40 Lacs
Bengaluru
Work from Office
Job Title: Senior Cyber Defense Operations Analyst Location: Bengaluru, India Experience: 8+ years Job Type: Full-time Department: Cybersecurity / Information Security / SOC Job Summary: We are seeking a highly skilled and experienced Senior Cyber Defense Operations Analyst to join our cybersecurity team in Bengaluru. The ideal candidate will lead and coordinate cyber defense activities, manage incident response efforts, monitor threats, and provide strategic guidance to strengthen our cyber defense posture. This is a hands-on technical and leadership role within a fast-paced, mission-critical environment. Key Responsibilities: Lead day-to-day operations of Cyber Defense including threat detection, response, and mitigation. Manage and mentor a team of SOC analysts and incident responders. Monitor SIEM and other security tools for indications of compromise, suspicious behavior, and known threats. Coordinate and manage high-severity incidents and support root cause analysis and post-incident reviews. Develop and implement advanced threat detection use cases and response playbooks. Work closely with IT, Infrastructure, and AppSec teams to address vulnerabilities and security gaps. Participate in threat hunting and proactive intelligence-driven defense activities. Collaborate with global security teams to align local and enterprise-wide defense strategies. Ensure compliance with internal security policies, industry standards, and regulatory frameworks (e.g., ISO 27001, NIST, GDPR). Regularly review and improve security operations processes and toolsets. Provide executive-level reporting on threat landscape, incident metrics, and defense posture. Required Qualifications: 8+ years of experience in cybersecurity with a strong focus on Security Operations or Cyber Defense. Proven experience with SIEM (e.g., Splunk, QRadar, LogRhythm), EDR (e.g., CrowdStrike, SentinelOne), and SOAR platforms. Strong understanding of MITRE ATT&CK, cyber kill chain, and threat intelligence frameworks. Expertise in incident response, digital forensics, malware analysis, and threat hunting. Familiarity with cloud security (AWS, Azure, or GCP), including monitoring and defending cloud-native environments. Experience with scripting (Python, PowerShell, etc.) for automation and analysis. Strong understanding of TCP/IP, network protocols, and security architectures. Certifications such as CISSP, GCIA, GCIH, CEH, or similar are highly desirable. Preferred Qualifications: Experience working in a global or large-scale enterprise security environment. Knowledge of DevSecOps and integration of security into CI/CD pipelines. Understanding of data privacy regulations relevant to cybersecurity (e.g., GDPR, HIPAA). Leadership experience in managing small-to-mid sized security teams. Benefits: Competitive salary and performance-based bonuses Health and wellness benefits Flexible work hours and hybrid work options Learning and development support (certifications, courses) Opportunity to work with cutting-edge cybersecurity technologies Please share your updated profiles to naseeruddin.khaja@infosharesystems.com
Posted 1 month ago
9.0 - 14.0 years
35 - 50 Lacs
Gurugram, Bengaluru, Mumbai (All Areas)
Hybrid
We are seeking a Senior DFIR Analyst with experience in forensic investigation and incident response. The candidate should be able to handle cases end-to-end, including client communication, reporting, and leading the team of forensic analysts. The ideal candidate should have experience in forensic investigation of all major operating systems such as Windows Server, Linux, and Mac OS. The candidate would also be responsible to R&D activities to identify new tools and techniques for forensic analysis and incident response. Key Responsibilities: Handle digital forensic cases end to end, including acquisition of data, analysis of complex digital evidence, client communication, presentations and reporting. Conduct forensic investigations of all major operating systems such as Windows, Linux, Mac OS, etc. Conduct forensic analysis of system and application logs, web applications logs, network traffic, and other digital artifacts. Provide expert technical assistance to clients during investigations and incident response activities. Lead the team of forensic analysts in conducting investigations and incident response activities. Mentor and train junior analysts on DFIR techniques, tools, and best practices. Conduct R&D activities to identify new tools and techniques for forensic analysis and incident response. This includes staying up-to-date with industry trends and emerging technologies to continually enhance our forensic capabilities Document and present findings, including preparing detailed forensic analysis reports. Requirements: Bachelor/master's degree in digital Forensics, Computer Science, or a related field. 5-8 years of experience in digital forensics and incident response. Experience in leading a team of forensic analysts. In-depth knowledge of digital forensic tools and techniques. Excellent written and verbal communication skills. Ability to effectively communicate technical concepts to non-technical stakeholders. Ability to manage multiple cases simultaneously and provide timely updates and status reports. Ability to work independently and as part of a team. Experience with forensic analysis of system and application logs, web applications logs, network traffic, and other digital artifacts. Strong analytical and problem-solving skills. Excellent searching skills and self-learning. Preferred Qualifications: Relevant industry certifications such as AccessData Certified Examiner (ACE), EC-Council Certified Hacking Forensic Investigator (EC-CHFI), GCFA, GCFE, EnCE or other relevant certifications. Experience with programming languages for scripting/automation of tasks. Experience with reverse engineering and malware analysis. Strong analytical and problem-solving skills. Experience in R&D activities. Familiarity with legal and regulatory requirements related to digital forensics and incident response.
Posted 1 month ago
2.0 - 7.0 years
3 - 7 Lacs
Greater Noida
Work from Office
Lloyd Institute of Forensic Science, Greater Noida affiliated to National Forensic Sciences University, an institution of national importance under the aegis of the Ministry of Home Affairs, which facilitates and promotes studies and research and to achieve excellence in the field of forensic science in conjunction with applied behavioral science studies, law, criminology and other allied areas and technology and other related fields, invites online application from the eligible candidates for various non teaching posts Scientific Assistant - Multimedia Forensic Master's degree in Multimedia Forensics/Forensic Science (with specialization in Cyber Forensics / Forensic Physics) / Computer Applications/Electronics/ Computer Science/IT/Cyber Security/Digital Forensic/ Physics/ Cyber Security Management/ Digital Forensics OR B.E./B. Tech. Computer Science & Engineering (Cyber Security).OR BE/ B. Tech in Information Technology/ Computer Science/Electronics and Communication/Information Communication Technology/ EEE with good academic record from a recognized Lab Assistant Digital Forensic Multimedia Forensic Cyber Security & Information Security Bachelor's degree in Multimedia Forensics/Cyber Security / Digital Forensics / Computer Science / information Technology / Electronics and Communication or B.E./B.Tech. in all Engineering/Technology Branches OR B.Sc. (Information Technology (IT)/Computer Science (CS)/Electronics) with good academic record Obtained from recognized University.2. Should have adequate proficiency in English & Hindi
Posted 1 month ago
5.0 - 10.0 years
9 - 14 Lacs
Kolkata
Work from Office
Date 10 Jun 2025 Location: Kokata, WB, IN Company Astom At Astom, we understand transport networks and what moves peope. From high-speed trains, metros, monorais, and trams, to turnkey systems, services, infrastructure, signaing and digita mobiity, we offer our diverse customers the broadest portfoio in the industry. Every day, 80,000 coeagues ead the way to greener and smarter mobiity wordwide, connecting cities as we reduce carbon and repace cars. Coud you be the fu-time Weding Expert in Kokata were ooking for Your future roe Take on a new chaenge and appy your comprehensive weding process expertise in a new cutting-edge fied. You work aongside dedicated, innovative, and coaborative teammates. You' contribute to the exceence of our manufacturing process by ensuring the highest weding standards from tender to warranty phases. Day-to-day, you coaborate with teams across the business (Tech. Bid, Product Eng., Industria Quaity, etc.), oversee the preparation of wed pans, and much more. You specificay take care of the performance and assessment of Weding Procedure Quaification, but aso ensure the compatibiity and handing of weding consumabes & parent materias. We ook to you for: Participation in technica reviews and wed sequence definitions Conducting suppier audits and ensuring equipment suitabiity Aocation of quaified weders and preparation of wed pans Visua inspection before, during, and after weding Supporting the reduction of defects through root cause anaysis Ensuring compiance with heath, safety, and environmenta standards A about you We vaue passion and attitude over experience. Thats why we dont expect you to have every singe ski. Instead, weve isted some that we think wi hep you succeed and grow in this roe: Degree in Engineering (BE/B.Tech) or an IWE certification Experience or understanding of heavy meta weding in industries such as ocomotive or automotive Knowedge of internationa weding standards and technoogica advancements Famiiarity with MS Office toos (Word, Exce, PowerPoint) Proficiency in the Engish anguage Abiity to train engineers and weders A coaborative mindset with a goba vision Things you enjoy Join us on a ife-ong transformative journey the rai industry is here to stay, so you can grow and deveop new skis and experiences throughout your career. You aso: Enjoy stabiity, chaenges and a ong-term career free from boring daiy routines Work with the atest standards for rai weding quaity and safety Coaborate with transverse teams and hepfu coeagues Contribute to innovative projects that impact goba mobiity Utiise our fexibe working environment Steer your career in whatever direction you choose across functions and countries Benefit from our investment in your deveopment, through award-winning earning Progress towards eadership and advanced technica roes Benefit from a fair and dynamic reward package that recognises your performance and potentia, pus comprehensive and competitive socia coverage (ife, medica, pension) You dont need to be a train enthusiast to thrive with us. We guarantee that when you step onto one of our trains with your friends or famiy, you be proud. If youre up for the chaenge, wed ove to hear from you! Important to note As a goba business, were an equa-opportunity empoyer that ceebrates diversity across the 63 countries we operate in. Were committed to creating an incusive workpace for everyone.
Posted 1 month ago
5.0 - 10.0 years
5 - 10 Lacs
Hyderabad
Work from Office
Naresh IT KPHB & Ameerpet branches are looking out for Experienced offline Faculties for Cyber Security.Candidate should be good in CyberSecurity,Ethical Hacking,Networking, Cyber Forensics etc.Should have rich experience in giving classroom training
Posted 1 month ago
2.0 - 7.0 years
6 - 16 Lacs
Greater Noida
Work from Office
Lloyd Institute of Forensic Science, Greater Noida affiliated to National Forensic Sciences University, an institution of national importance under the aegis of the Ministry of Home Affairs, which facilitates and promotes studies and research and to achieve excellence in the field of forensic science in conjunction with applied behavioral science studies, law, criminology and other allied areas and technology and other related fields, invites online application from the eligible candidates for various teaching posts in the following disciplines Digital Forensic Multimedia Forensic Cyber Security & Information Security Requirement A good academic record, A master's degree with 60% marks (or equivalent grade on a point scale wherever the grading system is followed) with Ph.D. in a concerned /relevant/allied subject from an Indian University or an equivalent degree from an accredited Foreign University Excellent academic background, high-quality publications, potential to get research funding from Government agencies and industries, appropriate academic professional activities undertaken, and a good innovative teaching record would be some of the important criteria for selection. Minimum Qualification Professor- - Actively engaged in research with a minimum of 10 research publications in the UGC- CARElisted journals. - A minimum of ten years of teaching experience in university/college as Assistant Professor/Associate Professor/Professor, and/or research experience at an equivalent Level at the University/National Level Institutions with Experience of Ph.D. guidance. . OR An outstanding professional, having a Ph.D. degree in the relevant/allied/applied disciplines, from any academic institution/industry, who has made a significant contribution to the knowledge in the concerned/allied/relevant discipline, provided he/she has ten years experience. Associate Professor - Experience of Ph.D. guidance Explanation: Experience of Ph.D. guidance means that registration of Ph.D. student as such should have been completed, wherein candidate is a sole/principal supervisor(guide). - Minimum eight years of experience of teaching and / or research in an academic/research position equivalent to that of Assistant Professor in a University, College or Accredited Research Institution/industry - Minimum five publications in the UGC-CARE listed Journals Assistant Professor - Minimum two publications in the UGC-CARE listed Journals.
Posted 1 month ago
3.0 - 7.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Job Description: Value Proposition Diverse and High-Stakes Casework : This role offers the unique opportunity to lead investigations that span cyber threats, internal misconduct, and complex fraud providing a dynamic, intellectually engaging portfolio. Direct Access and Influence : You will operate with strategic autonomy and collaborate closely with senior leadership, enabling swift decision-making and measurable impact on enterprise risk posture Job Details Position Title : Principal Financial Crimes Investigator Career Leve l: P4 Job Category : Assistant Vice President Role Type : Hybrid Job Location : Bangalore About the Team: Join a high-impact team within the Enterprise Cybersecurity Office (ECSO) dedicated to safeguarding the integrity, trust, and resilience of the organization. Our Financial Crimes & Investigations team operates at the intersection of physical security, cybersecurity, and corporate ethics, addressing complex insider threats, fraud schemes, and reputational risks. We work discreetly, rigorously, and collaboratively protecting people, data, and brand. Impact : As a Principal Financial Crimes Investigator, you will lead multifaceted internal investigations across fraud, code of ethics, insider threat, and cyber incidents. This role combines deep investigative experience with digital forensics, intelligence analysis, and interdepartmental collaboration. You ll act as a trusted problem-solver, often navigating high-stakes and confidential matters while influencing risk-aware outcomes across the enterprise. Key Deliverables (Duties and Responsibilities) Investigations & Forensics: Lead complex investigations into policy violations, insider threats, loss events, fraud (physical & digital), and code of conduct breaches. Use enterprise forensic tools to conduct computer and network-based incident analysis. Apply digital evidence gathering and forensic protocols in accordance with industry standards. Threat Intelligence & Research Conduct open-source intelligence (OSINT) research to assess threats to personnel, infrastructure, and systems. Produce and disseminate strategic threat assessments using the intelligence cycle. Reporting & Communication Draft clear, concise, and objective investigative reports supported by facts, interviews, and digital/physical evidence. Interface with internal stakeholders, including legal, HR, compliance, and leadership, to recommend mitigation or recovery actions. Coordinate with external agencies such as law enforcement where applicable. Governance & Risk Mitigation Identify internal control failures or systemic vulnerabilities during investigations and recommend remediations. Contribute to the strengthening of incident response and ethical governance policies. Skills and Qualification (Functional and Technical Skills) Investigative Acumen: Proven experience conducting sensitive and complex investigations. Digital Forensics: Working knowledge of enterprise and host forensic tools (preferred). OSINT & Threat Analysis: Ability to transform open-source data into actionable intelligence. Interviewing & Interrogation: Skilled at eliciting truthful, insightful responses while maintaining neutrality. Reporting: Strong documentation and reporting abilities with attention to detail and legal accuracy. Interpersonal Communication: Effective at managing high-sensitivity conversations and cross-functional interactions. Preferred Qualifications Education: Bachelor s degree with 12+ years of relevant experience in corporate or military environments. Certifications (Preferred): Certified Fraud Investigator or equivalent Private Investigator License or equivalent Leadership Qualities Operate with integrity, discretion, and a strong ethical compass. Lead investigations independently while coaching junior staff when needed. Serve as a trusted advisor to business units on risk, ethics, and resilience. Navigate ambiguity with composure and bring structure to complex situations. Relationships & Collaboration Partner with legal, HR, cybersecurity, compliance, and facilities security teams. Represent the investigative function in cross-enterprise incident reviews and audits. Engage with law enforcement and regulatory bodies when required.
Posted 1 month ago
7.0 - 15.0 years
16 - 18 Lacs
Bengaluru
Work from Office
Required Skills Technology | Sentinel SIEM Tool Expert | Level 3 Support Technology | Securonix SIEM Tools Expert | Level 3 Support Technology | ArcSight SIEM Tools Administrator | Level 2 Support Technology | Cybersecurity General Administrator | Level 2 Support Technology | Network Traffic Analysis Administrator | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | CompTIA Security+/Certified SOC Analyst (CSA)/GIAC Security Essentials (GSEC)/Certified Ethical Hacker (CEH)/Cisco Certified CyberOps Associate/GIAC Certified Incident Handler (GCIH)/GIAC Security Operations Certified (GSOC) Delivery Skills required are: - Technical Expertise: - *Expert knowledge of threat detection techniques and tools. *Leading incident response efforts, including advanced techniques for containment, eradication, and recovery. *Conducting in-depth digital forensics investigations. *Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems. Analytical Skills: - *Deep understanding of log analysis techniques and tools. *Identifying patterns and anomalies in large datasets. *Integrating threat intelligence into monitoring and response processes. *Staying updated on the latest threat intelligence and applying it to enhance security. Collaboration and Coordination: - *Working closely with other IT and security teams to ensure comprehensive security coverage. *Leading the coordination of response efforts during major incidents. *Ensuring effective communication and collaboration among all stakeholders. *Coordinating with external partners and vendors for specialized support. Continuous Improvement: - *Continuously evaluating and improving security processes and procedures. *Implementing lessons learned from incidents to enhance the overall security posture. *Contributing to the development and updating of security policies and procedures.
Posted 1 month ago
12.0 - 15.0 years
55 - 60 Lacs
Ahmedabad, Chennai, Bengaluru
Work from Office
Dear Candidate, We are seeking a Cybersecurity Analyst to detect, investigate, and prevent security threats across digital assets and systems. Key Responsibilities: Monitor and analyze security alerts, logs, and events. Perform threat intelligence, malware analysis, and incident response. Conduct vulnerability assessments and patch management. Support compliance and audit activities (ISO, NIST, GDPR). Educate staff on cybersecurity best practices and awareness. Required Skills & Qualifications: Experience with SIEM tools (Splunk, AlienVault, QRadar). Knowledge of firewalls, IDS/IPS, endpoint protection, and antivirus. Familiarity with scripting for automation and reporting. Strong analytical, investigative, and communication skills. Security certifications preferred (e.g., CompTIA Security+, SOC Analyst, CISSP). Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies
Posted 1 month ago
2.0 - 3.0 years
4 - 6 Lacs
Bhopal, Indore, Rajkot
Work from Office
Job Summary: We are seeking an experienced Cyber Security Trainer to join our team. The ideal candidate will have a solid background in cybersecurity principles and practices, combined with a passion for teaching and helping students understand complex cybersecurity concepts. You will be responsible for delivering high-quality training sessions and supporting students as they develop skills essential to succeed in the cybersecurity field. Key Responsibilities: Deliver engaging and interactive training sessions on cybersecurity topics, including but not limited to network security, threat analysis, malware protection, digital forensic, and ethical hacking. Develop and update course materials, including presentations, handouts, and online resources, to reflect the latest cybersecurity trends and practices. Conduct hands-on labs and exercises to help students gain practical experience with cybersecurity tools and techniques. Assess students' understanding and progress through evaluations, assignments, and feedback sessions. Stay updated with the latest cybersecurity developments and incorporate new knowledge into training programs. Support and mentor students as they navigate their learning journey, answering questions, and providing guidance on cybersecurity career paths. Qualifications: Bachelors degree in Technology (BTech) or a Master’s in Computer Applications (MCA), or a Master's degree in Technology (MTech) 2-3 years of experience in cybersecurity or a related field, with proven knowledge of current cybersecurity threats, tools, and practices. Previous experience in teaching, training, or mentoring is highly desirable. Excellent communication skills, with the ability to simplify complex topics and engage a diverse audience. Strong knowledge of cybersecurity tools and technologies, such as firewalls, intrusion detection systems, SIEM, and vulnerability assessment tools. Preferred Skills: Relevant certifications in cybersecurity, such as CompTIA Security+, CISSP, CEH, or similar. Familiarity with e-learning platforms and digital training tools. Strong problem-solving skills and adaptability to different learning styles. Why Join Us: Opportunity to make a meaningful impact on the next generation of cybersecurity professionals. Collaborative and supportive work environment. Access to continuous learning and professional development opportunities.
Posted 1 month ago
2.0 - 6.0 years
3 - 8 Lacs
Hyderabad, Bengaluru
Hybrid
About the Role: Uber's Security Response and Investigations (SRI) team is the cybersecurity incident response body at Uber. SRI responds to security incidents and mitigates security threats across the company. The SRI team is made of three teams: vSOC (virtual Security Operations Center), Investigations and Automation, and Incident Command. You will be joining the vSOC team. As a Security Analyst on the vSOC team, You will be on the front-line of defence for the Uber Security Incident Response program. You will be handling triage for all security alerts for Uber globally across all environments (cloud, prod, corp). You will build Standard Operating Procedures (SOP) and help improve the incident response program. You will serve as an incident coordinator during high and critical severity incidents. Expect to work weekend shift (Saturday / Sunday) Basic Qualifications: Good understanding of cybersecurity fundamentals. This includes but is not limited to network protocols (e.g. TCP/IP stack) and security, system security, email security, etc. 2+ years of hands-on experience in a cybersecurity role. 1+ year of hands-on experience with security monitoring and response in a SOC environment. Strong problem-solving skills. Good communication skills. Preferred Qualifications: Experience with cybersecurity forensic methodologies and software. Experience driving complex incidents or leading investigations end-to-end. Threat hunting and Automation experience(SOAR/Python). Applied knowledge of cyber intel frameworks such as ATT&CK framework and kill-chain model. Experience working crisis events for a global company. Ability to work across geographically distributed teams. Certifications in Security is a plus
Posted 1 month ago
0.0 - 1.0 years
0 - 0 Lacs
Bengaluru
Work from Office
Assist in document verification, fingerprint analysis, and digital evidence collection. Support forensic investigations across physical and cyber domains with proper documentation. Stay updated on forensic tools, techniques, and legal standards. Performance bonus Retention bonus
Posted 1 month ago
3.0 - 5.0 years
4 - 6 Lacs
Noida, New Delhi, Gurugram
Work from Office
Incident handling, forensic analysis, and VAPT SIEM tools cybersecurity frameworks Log analysis, monitoring, detecting and investigating security incidents and breaches. CEH,CSA,CompTIA Security+,GCIH,security incidents
Posted 1 month ago
12.0 - 15.0 years
55 - 60 Lacs
Ahmedabad, Chennai, Bengaluru
Work from Office
Dear Candidate, We are hiring a Digital Forensics Analyst to investigate cyber incidents, recover digital evidence, and support legal and compliance teams. Ideal for professionals with a strong background in cybersecurity and forensic analysis. Key Responsibilities: Perform forensic imaging and analysis on digital devices Investigate incidents involving malware, breaches, or data leaks Document evidence for regulatory, legal, or HR use Collaborate with SOC and legal teams to support investigations Required Skills & Qualifications: Experience with forensic tools (EnCase, FTK, Autopsy, X-Ways) Knowledge of file systems, OS internals, and memory analysis Understanding of chain-of-custody and evidence handling Bonus: GIAC (GCFA, GCFE) or related digital forensics certifications Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies
Posted 1 month ago
0.0 - 5.0 years
2 - 7 Lacs
Bengaluru
Work from Office
Required Skills Technology | Sentinel SIEM Tool Administrator | Level 2 Support Technology | Securonix SIEM Tools Administrator | Level 2 Support Education Qualification : B.Sc Certification Mandatory / Desirable : Technology | Microsoft Certified: Security, Compliance, and Identity Fundamentals / CISSP/CISM/CEH/GIAC Certified Incident Handler/Certified SOC Analyst (CSA)/CompTIA Cybersecurity Analyst (CySA+)/Cisco Certified CyberOps Associate Delivery Skills required are: - Technical Skills: - *Identifying and analyzing potential threats and vulnerabilities using various tools and techniques. *Leading and managing the response to security incidents, including containment, eradication, and recovery. *Implementing and maintaining security monitoring systems, such as SIEM (Security Information and Event Management) tools. *Prioritizing and remediating vulnerabilities based on risk assessments. Operational Skills: - *Developing, implementing, and enforcing security policies, standards, and procedures. *Managing and maintaining secure configurations for systems, networks, and applications. *Overseeing the timely application of security patches and updates to systems and software. Analytical Skills: - *Analyzing logs and event data from various sources to identify patterns and anomalies. *Utilizing advanced analytics to detect and investigate security incidents. *Conducting digital forensics investigations to uncover evidence of security breaches. Collaboration and Teamwork: - *Collaborating with other IT and security teams to enhance the organization s security posture. *Coordinating response efforts during security incidents with internal and external stakeholders. *Leading incident response teams and ensuring effective communication and collaboration.
Posted 1 month ago
7.0 - 15.0 years
9 - 17 Lacs
Bengaluru
Work from Office
Required Skills Technology | Sentinel SIEM Tool Expert | Level 3 Support Technology | Securonix SIEM Tools Expert | Level 3 Support Technology | ArcSight SIEM Tools Administrator | Level 2 Support Technology | Cybersecurity General Administrator | Level 2 Support Technology | Network Traffic Analysis Administrator | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | CompTIA Security+/Certified SOC Analyst (CSA)/GIAC Security Essentials (GSEC)/Certified Ethical Hacker (CEH)/Cisco Certified CyberOps Associate/GIAC Certified Incident Handler (GCIH)/GIAC Security Operations Certified (GSOC) Delivery Skills required are: - Technical Expertise: - *Expert knowledge of threat detection techniques and tools. *Leading incident response efforts, including advanced techniques for containment, eradication, and recovery. *Conducting in-depth digital forensics investigations. *Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems. Analytical Skills: - *Deep understanding of log analysis techniques and tools. *Identifying patterns and anomalies in large datasets. *Integrating threat intelligence into monitoring and response processes. *Staying updated on the latest threat intelligence and applying it to enhance security. Collaboration and Coordination: - *Working closely with other IT and security teams to ensure comprehensive security coverage. *Leading the coordination of response efforts during major incidents. *Ensuring effective communication and collaboration among all stakeholders. *Coordinating with external partners and vendors for specialized support. Continuous Improvement: - *Continuously evaluating and improving security processes and procedures. *Implementing lessons learned from incidents to enhance the overall security posture. *Contributing to the development and updating of security policies and procedures.
Posted 1 month ago
3.0 - 8.0 years
15 - 30 Lacs
Bengaluru
Work from Office
Qualifications & Experience: Minimum of 2 years of hands-on experience in digital forensics, cybercrime investigations, or related technical fields. Exposure across both public and private sectors is preferred. Proven expertise in identifying, containing, mitigating, and recovering from cybersecurity incidents, with strong post-incident reporting capabilities. Demonstrated ability to independently develop and continuously improve skills in Digital Forensics, DFIR methodologies, and evolving cybersecurity trends. In-depth knowledge of forensic best practices, industry standards, and investigative methodologies for both host-based and network-level analysis. Proficient in the forensic preservation of digital evidence across a variety of platforms in a forensically sound and defensible manner. Familiarity with internationally recognized digital evidence acquisition and handling standards (e.g., NIST, ISO 27037). Hands-on experience with forensic tools and techniques supporting internal investigations, such as employee misconduct or data exfiltration cases. Experience serving as an escalation point for suspected security incidents or intrusions, including initial triage and scoping. Proficient with endpoint detection and response (EDR) tools and live forensics techniques. Practical knowledge of forensic analysis on multiple operating systems: Windows, macOS, and Linux. Strong command of DFIR-related open-source tools, memory analysis, and full-disk forensics. Capable of leading or participating in large-scale forensic investigations both independently and as part of a team. Skilled in performing root cause analysis and post-incident forensic reviews for cyber events and security breaches. Proven ability to prepare comprehensive investigation reports, breach summaries, and documentation for privacy and data exposure incidents. Exceptional attention to detail and ability to maintain thorough and accurate investigative records and chain-of-custody documentation. Preferred Certifications (one or more): CHFI (Computer Hacking Forensic Investigator) CIH (Certified Incident Handler) CSA (Certified SOC Analyst) CEH (Certified Ethical Hacker) GSEC (GIAC Security Essentials) GCIH (GIAC Certified Incident Handler) GCIA (GIAC Certified Intrusion Analyst) GCFE (GIAC Certified Forensic Examiner) GREM (GIAC Reverse Engineering Malware) GCFA (GIAC Certified Forensic Analyst)
Posted 1 month ago
0.0 - 5.0 years
5 - 9 Lacs
Pune
Work from Office
Responsibilities: Monitor systems, respond to incidents. Collaborate with teams on threat management strategies. Manage access control & encryption. Maintain compliance standards. Conduct regular security assessments. Office cab/shuttle Food allowance Health insurance Provident fund
Posted 1 month ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
39581 Jobs | Dublin
Wipro
19070 Jobs | Bengaluru
Accenture in India
14409 Jobs | Dublin 2
EY
14248 Jobs | London
Uplers
10536 Jobs | Ahmedabad
Amazon
10262 Jobs | Seattle,WA
IBM
9120 Jobs | Armonk
Oracle
8925 Jobs | Redwood City
Capgemini
7500 Jobs | Paris,France
Virtusa
7132 Jobs | Southborough