Jobs
Interviews

99 Digital Forensics Jobs - Page 4

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 3.0 years

4 - 6 Lacs

Bhopal, Indore, Rajkot

Work from Office

Job Summary: We are seeking an experienced Cyber Security Trainer to join our team. The ideal candidate will have a solid background in cybersecurity principles and practices, combined with a passion for teaching and helping students understand complex cybersecurity concepts. You will be responsible for delivering high-quality training sessions and supporting students as they develop skills essential to succeed in the cybersecurity field. Key Responsibilities: Deliver engaging and interactive training sessions on cybersecurity topics, including but not limited to network security, threat analysis, malware protection, digital forensic, and ethical hacking. Develop and update course materials, including presentations, handouts, and online resources, to reflect the latest cybersecurity trends and practices. Conduct hands-on labs and exercises to help students gain practical experience with cybersecurity tools and techniques. Assess students' understanding and progress through evaluations, assignments, and feedback sessions. Stay updated with the latest cybersecurity developments and incorporate new knowledge into training programs. Support and mentor students as they navigate their learning journey, answering questions, and providing guidance on cybersecurity career paths. Qualifications: Bachelors degree in Technology (BTech) or a Master’s in Computer Applications (MCA), or a Master's degree in Technology (MTech) 2-3 years of experience in cybersecurity or a related field, with proven knowledge of current cybersecurity threats, tools, and practices. Previous experience in teaching, training, or mentoring is highly desirable. Excellent communication skills, with the ability to simplify complex topics and engage a diverse audience. Strong knowledge of cybersecurity tools and technologies, such as firewalls, intrusion detection systems, SIEM, and vulnerability assessment tools. Preferred Skills: Relevant certifications in cybersecurity, such as CompTIA Security+, CISSP, CEH, or similar. Familiarity with e-learning platforms and digital training tools. Strong problem-solving skills and adaptability to different learning styles. Why Join Us: Opportunity to make a meaningful impact on the next generation of cybersecurity professionals. Collaborative and supportive work environment. Access to continuous learning and professional development opportunities.

Posted 3 months ago

Apply

2.0 - 6.0 years

3 - 8 Lacs

Hyderabad, Bengaluru

Hybrid

About the Role: Uber's Security Response and Investigations (SRI) team is the cybersecurity incident response body at Uber. SRI responds to security incidents and mitigates security threats across the company. The SRI team is made of three teams: vSOC (virtual Security Operations Center), Investigations and Automation, and Incident Command. You will be joining the vSOC team. As a Security Analyst on the vSOC team, You will be on the front-line of defence for the Uber Security Incident Response program. You will be handling triage for all security alerts for Uber globally across all environments (cloud, prod, corp). You will build Standard Operating Procedures (SOP) and help improve the incident response program. You will serve as an incident coordinator during high and critical severity incidents. Expect to work weekend shift (Saturday / Sunday) Basic Qualifications: Good understanding of cybersecurity fundamentals. This includes but is not limited to network protocols (e.g. TCP/IP stack) and security, system security, email security, etc. 2+ years of hands-on experience in a cybersecurity role. 1+ year of hands-on experience with security monitoring and response in a SOC environment. Strong problem-solving skills. Good communication skills. Preferred Qualifications: Experience with cybersecurity forensic methodologies and software. Experience driving complex incidents or leading investigations end-to-end. Threat hunting and Automation experience(SOAR/Python). Applied knowledge of cyber intel frameworks such as ATT&CK framework and kill-chain model. Experience working crisis events for a global company. Ability to work across geographically distributed teams. Certifications in Security is a plus

Posted 3 months ago

Apply

0.0 - 1.0 years

0 - 0 Lacs

Bengaluru

Work from Office

Assist in document verification, fingerprint analysis, and digital evidence collection. Support forensic investigations across physical and cyber domains with proper documentation. Stay updated on forensic tools, techniques, and legal standards. Performance bonus Retention bonus

Posted 3 months ago

Apply

3.0 - 5.0 years

4 - 6 Lacs

Noida, New Delhi, Gurugram

Work from Office

Incident handling, forensic analysis, and VAPT SIEM tools cybersecurity frameworks Log analysis, monitoring, detecting and investigating security incidents and breaches. CEH,CSA,CompTIA Security+,GCIH,security incidents

Posted 3 months ago

Apply

12.0 - 15.0 years

55 - 60 Lacs

Ahmedabad, Chennai, Bengaluru

Work from Office

Dear Candidate, We are hiring a Digital Forensics Analyst to investigate cyber incidents, recover digital evidence, and support legal and compliance teams. Ideal for professionals with a strong background in cybersecurity and forensic analysis. Key Responsibilities: Perform forensic imaging and analysis on digital devices Investigate incidents involving malware, breaches, or data leaks Document evidence for regulatory, legal, or HR use Collaborate with SOC and legal teams to support investigations Required Skills & Qualifications: Experience with forensic tools (EnCase, FTK, Autopsy, X-Ways) Knowledge of file systems, OS internals, and memory analysis Understanding of chain-of-custody and evidence handling Bonus: GIAC (GCFA, GCFE) or related digital forensics certifications Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Srinivasa Reddy Kandi Delivery Manager Integra Technologies

Posted 3 months ago

Apply

0.0 - 5.0 years

2 - 7 Lacs

Bengaluru

Work from Office

Required Skills Technology | Sentinel SIEM Tool Administrator | Level 2 Support Technology | Securonix SIEM Tools Administrator | Level 2 Support Education Qualification : B.Sc Certification Mandatory / Desirable : Technology | Microsoft Certified: Security, Compliance, and Identity Fundamentals / CISSP/CISM/CEH/GIAC Certified Incident Handler/Certified SOC Analyst (CSA)/CompTIA Cybersecurity Analyst (CySA+)/Cisco Certified CyberOps Associate Delivery Skills required are: - Technical Skills: - *Identifying and analyzing potential threats and vulnerabilities using various tools and techniques. *Leading and managing the response to security incidents, including containment, eradication, and recovery. *Implementing and maintaining security monitoring systems, such as SIEM (Security Information and Event Management) tools. *Prioritizing and remediating vulnerabilities based on risk assessments. Operational Skills: - *Developing, implementing, and enforcing security policies, standards, and procedures. *Managing and maintaining secure configurations for systems, networks, and applications. *Overseeing the timely application of security patches and updates to systems and software. Analytical Skills: - *Analyzing logs and event data from various sources to identify patterns and anomalies. *Utilizing advanced analytics to detect and investigate security incidents. *Conducting digital forensics investigations to uncover evidence of security breaches. Collaboration and Teamwork: - *Collaborating with other IT and security teams to enhance the organization s security posture. *Coordinating response efforts during security incidents with internal and external stakeholders. *Leading incident response teams and ensuring effective communication and collaboration.

Posted 3 months ago

Apply

7.0 - 15.0 years

9 - 17 Lacs

Bengaluru

Work from Office

Required Skills Technology | Sentinel SIEM Tool Expert | Level 3 Support Technology | Securonix SIEM Tools Expert | Level 3 Support Technology | ArcSight SIEM Tools Administrator | Level 2 Support Technology | Cybersecurity General Administrator | Level 2 Support Technology | Network Traffic Analysis Administrator | Level 2 Support Education Qualification : Engineer - B.E / B.Tech / MCA Certification Mandatory / Desirable : Technology | CompTIA Security+/Certified SOC Analyst (CSA)/GIAC Security Essentials (GSEC)/Certified Ethical Hacker (CEH)/Cisco Certified CyberOps Associate/GIAC Certified Incident Handler (GCIH)/GIAC Security Operations Certified (GSOC) Delivery Skills required are: - Technical Expertise: - *Expert knowledge of threat detection techniques and tools. *Leading incident response efforts, including advanced techniques for containment, eradication, and recovery. *Conducting in-depth digital forensics investigations. *Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems. Analytical Skills: - *Deep understanding of log analysis techniques and tools. *Identifying patterns and anomalies in large datasets. *Integrating threat intelligence into monitoring and response processes. *Staying updated on the latest threat intelligence and applying it to enhance security. Collaboration and Coordination: - *Working closely with other IT and security teams to ensure comprehensive security coverage. *Leading the coordination of response efforts during major incidents. *Ensuring effective communication and collaboration among all stakeholders. *Coordinating with external partners and vendors for specialized support. Continuous Improvement: - *Continuously evaluating and improving security processes and procedures. *Implementing lessons learned from incidents to enhance the overall security posture. *Contributing to the development and updating of security policies and procedures.

Posted 3 months ago

Apply

3.0 - 8.0 years

15 - 30 Lacs

Bengaluru

Work from Office

Qualifications & Experience: Minimum of 2 years of hands-on experience in digital forensics, cybercrime investigations, or related technical fields. Exposure across both public and private sectors is preferred. Proven expertise in identifying, containing, mitigating, and recovering from cybersecurity incidents, with strong post-incident reporting capabilities. Demonstrated ability to independently develop and continuously improve skills in Digital Forensics, DFIR methodologies, and evolving cybersecurity trends. In-depth knowledge of forensic best practices, industry standards, and investigative methodologies for both host-based and network-level analysis. Proficient in the forensic preservation of digital evidence across a variety of platforms in a forensically sound and defensible manner. Familiarity with internationally recognized digital evidence acquisition and handling standards (e.g., NIST, ISO 27037). Hands-on experience with forensic tools and techniques supporting internal investigations, such as employee misconduct or data exfiltration cases. Experience serving as an escalation point for suspected security incidents or intrusions, including initial triage and scoping. Proficient with endpoint detection and response (EDR) tools and live forensics techniques. Practical knowledge of forensic analysis on multiple operating systems: Windows, macOS, and Linux. Strong command of DFIR-related open-source tools, memory analysis, and full-disk forensics. Capable of leading or participating in large-scale forensic investigations both independently and as part of a team. Skilled in performing root cause analysis and post-incident forensic reviews for cyber events and security breaches. Proven ability to prepare comprehensive investigation reports, breach summaries, and documentation for privacy and data exposure incidents. Exceptional attention to detail and ability to maintain thorough and accurate investigative records and chain-of-custody documentation. Preferred Certifications (one or more): CHFI (Computer Hacking Forensic Investigator) CIH (Certified Incident Handler) CSA (Certified SOC Analyst) CEH (Certified Ethical Hacker) GSEC (GIAC Security Essentials) GCIH (GIAC Certified Incident Handler) GCIA (GIAC Certified Intrusion Analyst) GCFE (GIAC Certified Forensic Examiner) GREM (GIAC Reverse Engineering Malware) GCFA (GIAC Certified Forensic Analyst)

Posted 3 months ago

Apply

0.0 - 5.0 years

5 - 9 Lacs

Pune

Work from Office

Responsibilities: Monitor systems, respond to incidents. Collaborate with teams on threat management strategies. Manage access control & encryption. Maintain compliance standards. Conduct regular security assessments. Office cab/shuttle Food allowance Health insurance Provident fund

Posted 3 months ago

Apply

0.0 - 5.0 years

6 - 16 Lacs

Greater Noida

Work from Office

ABOUT JOB Designation: Cybersecurity Trainer Job Purpose : Proven experience in cybersecurity concepts, hands-on experience with tools and techniques across the security domain, and relevant industry certifications. You will be responsible for training students as per a structured semester-based roadmap that includes areas like ethical hacking, digital forensics, malware analysis, penetration testing, and more. A. Knowledge Strong understanding of security principles and best practices. Hands-on experience with tools and platforms used in SOC, VAPT, forensic analysis, and exploit development. Passion for teaching and mentoring. B. Functional Skills Deliver high-quality training in the following areas: Network Defense and Python Programming Ethical Hacking, Intrusion Detection, and Prevention Vulnerability Assessment and Penetration Testing (VAPT) Digital Forensics, Governance Risk and Compliance (GRC), Reverse Engineering Cyber Threat Intelligence (CTI), Exploit Development, OSINT Develop course content, lab exercises, and assessments aligned with semester-wise skill development. Train and mentor students on real-world scenarios and tools (e.g., Wireshark, Metasploit, Burp Suite, Splunk). C. Attributes Dynamic, energetic, team player, thrives among strong colleagues. Ability to work in fast paced evolving environment . Be willing and able to exercise judgment and take risks. Accept criticism and constructive feedback , while being extremely adaptable and flexible. Reflection of an impeccable persona in walk-talk while dealing with academia High spiritual quotient (Social quotient -SQ, Intelligence quotient - IQ, Emotional Quotient - EQ) D. Qualification & Years of Experience ME/M.Tech and BE/B.Tech in Computer Science /Information Technology from reputed university & Institute of eminence PhD Degree in the relevant field of subject is desirable. Industry and Global Experience is desirable. Certifications (Any of the following required) CEH (Certified Ethical Hacker) CompTIA Security+ / CySA+ OSCP (Offensive Security Certified Professional) CHFI (Computer Hacking Forensic Investigator) CISA/CISM (Certified Information Systems Auditor / Manager) CPT / CVAPT (Certified Penetration Tester / Certified VAPT Professional) GIAC Certifications (GSEC, GCIA, GREM etc.) E. Salary as per norms F. Location: Greater Noida, Delhi/NCR G. Apply for the position by sending your CV at careers@glbitm.ac.in H. Visit our websites career page at www.glbitm.ac.in

Posted 3 months ago

Apply

2.0 - 7.0 years

6 - 14 Lacs

Hyderabad, Bengaluru

Work from Office

Shift - Sun-Thu, Tue - Sat Timings - 6:30 AM- 3 PM IST, 2:30-11 PM IST Hybrid - 3 days per week (No cab facilities from Uber) Location : Hyderabad / Bangalore (India) Skills: Digital Forensic and Incident Response. Security Investigation and Triage. 2+ years of experience are mandatory in the security domain. Certification: Any Security Certification is a plus. Title: Security Analyst About the Role: Uber's Security Response and Investigations (SRI) team is the cybersecurity incident response body at Uber. SRI responds to security incidents and mitigates security threats across the company. The SRI team is made of three teams: vSOC (virtual Security Operations Center), Investigations and Automation, and Incident Command. You will be joining the vSOC team. As a Security Analyst on the vSOC team, You will be on the front-line of defense for the Uber Security Incident Response program. You will be handling triage for all security alerts for Uber globally across all environments (cloud, prod, corp). You will build Standard Operating Procedures (SOP) and help improve the incident response program. You will serve as an incident coordinator during high and critical severity incidents. Expect to work weekend shift (Saturday / Sunday) Basic Qualifications: Good understanding of cybersecurity fundamentals. This includes but is not limited to network protocols (e.g. TCP/IP stack) and security, system security, email security, etc. 2+ years of hands-on experience in a cybersecurity role. 1+ year of hands-on experience with security monitoring and response in a SOC environment. Strong problem-solving skills. Good communication skills. Preferred Qualifications: Experience with cybersecurity forensic methodologies and software. Experience driving complex incidents or leading investigations end-to-end. Threat hunting and Automation experience(SOAR/Python). Applied knowledge of cyber intel frameworks such as ATT&CK framework and kill-chain model. Experience working crisis events for a global company. Ability to work across geographically distributed teams.

Posted 3 months ago

Apply

3.0 - 6.0 years

0 - 0 Lacs

Gurugram

Work from Office

Role & responsibilities Assistant Professor (Forensic Science) The Department of Forensic Science, Amity University Haryana, invites applications from eligible and motivated candidates for the position of Assistant Professor (Permanent Position) in the field of Forensic Science. Candidates with demonstrated expertise and/or research experience in any of the following areas will be given preference: Digital Forensics Cyber Forensics Cyber Security Preferred candidate profile Ph.D.in Forensic Science. He /She should have minimum three years of experience. Desirable Specialization: Candidates with demonstrated expertise and/or research experience in any of the following areas will be given preference: Digital Forensics Cyber Forensics Cyber Security Additional Requirements: Proven academic and research credentials with publications in peer-reviewed journals Strong communication skills and aptitude for teaching and mentoring Familiarity with modern pedagogical methods and forensic instrumentation

Posted 3 months ago

Apply

7 - 12 years

17 - 27 Lacs

Gurugram

Work from Office

Your potential, unleashed. Indias impact on the global economy has increased at an exponential rate and Deloitte presents an opportunity to unleash and realise your potential amongst cutting edge leaders, and organizations shaping the future of the region, and indeed, the world beyond. At Deloitte, your whole self to work, every day. Combine that with our drive to propel with purpose and you have the perfect playground to collaborate, innovate, grow, and make an impact that matters. The team Deloitte helps organizations prevent cyberattacks and protect valuable assets. We believe in being secure, vigilant, and resilient—not only by looking at how to prevent and respond to attacks, but at how to manage cyber risk in a way that allows you to unleash new opportunities. Embed cyber risk at the start of strategy development for more effective management of information and technology risks. Your work profile. Reporting to the Director of SOC Engineering, a Sentinel is primarily responsible for the build development and maintenance of the Sentinel SIEM. The engineer will participate in installing, configuring, and maintaining Microsoft Sentinel; design and develop detections; implement operational and technical security controls; and adhere to organisational security policies and procedures. About the team The engineering team provides a number of services to internal and external stakeholders including: Working on onboarding new clients to the service on the Microsoft Sentinel SIEM platform Working closely with a large SOC to maintain adequate connectors and analytics. Working with clients for the development of new detections bespoke to client use cases, threats and environments. Assist on internal SOC quality of life or process improvement projects. As part of a small team you will experience diverse days, find yourself hands on building and developing as well as handling client tickets or SOC queries. Engineering: Analyze and define data requirements and specifications. Oversight of data system performance, capacity, availability, serviceability, and recoverability. Analyze and plan for anticipated changes in data capacity requirements. Install, configure and support data system components. Raise/manage/close vendor support cases. Develop and facilitate data-gathering methods. Manage the compilation, cataloguing, caching, distribution, and retrieval of data. Provide a managed flow of relevant information to represent data in creative formats. Part of Data and Security Engineering escalation roster for critical alerts. Data Analysis Analyze data sources to provide actionable recommendations and strategic insights. Assess the validity of source data and subsequent findings. Conduct hypothesis testing using statistical processes. Develop strategic insights from large data sets. Develop data standards, policies, and procedures. Client facing Interface with customers to address concerns, issues, or escalations; track and drive to closure any issues that impact the service and its value to clients. Work with product owners to onboard additional data sources. Present technical information to technical and non-technical audiences. Professional Experience: Experience working with Microsoft Sentinel. Experience writing SIEM queries, constructing alert logic, and building dashboards. Experience integrating custom log sources into Microsoft Sentinel. An understanding of the information technology marketplace including modern security operations and Digital Forensics/Incident Response. Demonstrate a high level of flexibility and resourcefulness, being able to adapt to change and challenges. Experience communicating with a high level of professionalism. Previous technical experience owning and delivering complex, technical bodies of work. Evidence of working with or in the Enterprise market. A demonstrable track record of success. Ideally, experience working in or with a cyber security team. Ideally, experience working with Endpoint Detection and Response products such as Microsoft Defender ATP. How you’ll grow Connect for impact Our exceptional team of professionals across the globe are solving some of the world’s most complex business problems, as well as directly supporting our communities, the planet, and each other. Know more in our Global Impact Report and our India Impact Report . Empower to lead You can be a leader irrespective of your career level. Our colleagues are characterised by their ability to inspire, support, and provide opportunities for people to deliver their best and grow both as professionals and human beings. Know more about Deloitte and our One Young World partnership. Inclusion for all At Deloitte, people are valued and respected for who they are and are trusted to add value to their clients, teams and communities in a way that reflects their own unique capabilities. Know more about everyday steps that you can take to be more inclusive. At Deloitte, we believe in the unique skills, attitude and potential each and every one of us brings to the table to make an impact that matters. Drive your career At Deloitte, you are encouraged to take ownership of your career. We recognise there is no one size fits all career path, and global, cross-business mobility and up / re-skilling are all within the range of possibilities to shape a unique and fulfilling career. Know more about Life at Deloitte. Everyone’s welcome entrust your happiness to us Our workspaces and initiatives are geared towards your 360-degree happiness. This includes specific needs you may have in terms of accessibility, flexibility, safety and security, and caregiving. Here’s a glimpse of things that are in store for you. Interview tips We want job seekers exploring opportunities at Deloitte to feel prepared, confident and comfortable. To help you with your interview, we suggest that you do your research, know some background about the organisation and the business area you’re applying to. Check out recruiting tips from Deloitte professionals. *Caution against fraudulent job offers*: We would like to advise career aspirants to exercise caution against fraudulent job offers or unscrupulous practices. At Deloitte, ethics and integrity are fundamental and not negotiable. We do not charge any fee or seek any deposits, advance, or money from any career aspirant in relation to our recruitment process. We have not authorized any party or person to collect any money from career aspirants in any form whatsoever for promises of getting jobs in Deloitte or for being considered against roles in Deloitte. We follow a professional recruitment process, provide a fair opportunity to eligible applicants and consider candidates only on merit. No one other than an authorized official of Deloitte is permitted to offer or confirm any job offer from Deloitte. We advise career aspirants to exercise caution.

Posted 4 months ago

Apply

6 - 10 years

8 - 12 Lacs

Bengaluru

Work from Office

Job Description Principal Security Software Engineer Are you interested in building large-scale distributed software for the cloud? Oracles Service Cloud team is building Software-as-a-Service technologies that operate at high scale in a broadly distributed multi-tenant cloud environment. Our customers run their businesses on our cloud, and our mission is to provide them with best in class compute, storage, networking, database, security, and an ever expanding set of foundational cloud-based services. Were looking for hands-on engineers with expertise and passion in identifying and resolving difficult security problems in distributed systems, virtualized infrastructure, and highly available services. If this is you, at Oracle you can design and build innovative new systems from the ground up. These are exciting times in our space - we are growing fast, still at an early stage, and working on ambitious new initiatives. An engineer at any level can have significant technical and business impact. As a Principal Security Software Engineer you will review the software design and development for all components of Oracles Service Cloud team. Develops and execute programs and processes to reduce information security risk and strengthen Oracles security posture. You should value simplicity and scale, work comfortably in a collaborative, agile environment, and be excited to learn. Things you'll do:* Penetration testing* Hardening of network, software and firmware* Security tool development (e.g. scanning tools)* Security metrics definition and delivery* Consult across different software development teams* Attack vector modeling* Champion secure coding practices Minimum Qualifications: Bachelors or Masters degree in Computer Science or related field 7+ years of experience in software engineering or related field Experience working in a large cloud or Internet software company preferred Strong application/product/software security background Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, verbal and written communication skills Ability to succeed through collaboration and working through internal and external organizations and individuals Prior DevOps or continuous delivery and deployment experience preferred Strong security testing experience with Fortify, Burp, Zap or Webinspect. Thorough understanding of latest security principles, techniques, and protocols. Security certifications is a plus. Skills Required: Application architecture and design reviews; Penetration Testing and Vulnerability assessments; Web Services and API security assessments; Product Security Assessments and Threat Modeling; Dynamic Vulnerability Scanning using automated application scanners; Execute Secure Code Audits using manual and automated methods to review product codes; Secure SDLC Processes including DevOps and Agile; Knowledge of languages, including Java, .Net, PHP, C++, and XML; Security Testing tools, including Nmap, Nessus, Web Inspect, BurpSuite, ZAP Scanner, Fortify Secure code scanner, SOAP UI, Kali Linux, and Metasploit; Operating Systems including Windows and Linux; Cryptographic algorithms, hashing algorithms, encryption; and Network and web related protocols, including TCP/IP, TLS/SSL, HTTP, and FTP. Detailed Description and Job Requirements As a member of the software security team, you will assist in defining and developing software for tasks associated with the security testing of software applications. Provide technical leadership to other software developers. Specify, design and implement modest changes to existing software architecture to meet changing needs. Develop, implement, and enforce Oracles security policies. Develop, implement, and manage Oracles compliance with operational security procedures. Develop Security Review threat model and operationalization standards for cloud services to be built and deployed into Oracles Service cloud. Duties and tasks are varied and complex needing independent judgment. Fully competent in own area of expertise. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans status or any other characteristic protected by law. Career Level - IC4 Career Level - IC4 Responsibilities Supports the strengthening of Oracles security posture, focusing on one or more of the following: risk management; regulatory compliance; threat and vulnerability management; incident management and response; security policy development and enforcement; privacy; information security education, training and awareness (ISETA); digital forensics and similar focus areas.Risk Management: Brings advanced level skills to assess the information security risk associated with existing and proposed business operational programs, systems, applications, practices and procedures in very complex, business-critical environments. May conduct and document very complex information security risk assessments. May assist in the creation and implementation of security solutions and programs.Regulatory Compliance: Brings advanced level skills to manage programs to establish, document and track compliance to industry and government standards and regulations, e.g. ISO-27001, PCI-DSS, HIPAA, FedRAMP, GDPR, etc. Researches and interprets current and pending governmental laws and regulations, industry standards and customer and vendor contracts to communicate compliance requirements to the business. Participates in industry forums monitoring developments in regulatory compliance.Threat and Vulnerability Management: Brings advanced level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required.Incident Management and response: Brings advanced level skills to respond to security events, identifying possible intrusions and responding in line with Oracle incident response playbooks. May operate as Incident Commander on serious incidents.Digital Forensics: Brings advanced level skills to conduct data collection, preservation and forensic analysis of digital media independently, where an advanced understanding of forensic techniques is required.Other areas of focus may include duties providing advanced level skills and knowledge to manage Information Security Education, Training and Awareness programs. In Security role, may manage the creation, review and approval of corporate information security policies.Mentors and trains other team members. Compiles information and reports for management.

Posted 4 months ago

Apply

6 - 11 years

7 - 10 Lacs

Thiruvananthapuram

Work from Office

Job Description Principal Security Software Engineer Are you interested in building large-scale distributed software for the cloud? Oracles Service Cloud team is building Software-as-a-Service technologies that operate at high scale in a broadly distributed multi-tenant cloud environment. Our customers run their businesses on our cloud, and our mission is to provide them with best in class compute, storage, networking, database, security, and an ever expanding set of foundational cloud-based services. Were looking for hands-on engineers with expertise and passion in identifying and resolving difficult security problems in distributed systems, virtualized infrastructure, and highly available services. If this is you, at Oracle you can design and build innovative new systems from the ground up. These are exciting times in our space - we are growing fast, still at an early stage, and working on ambitious new initiatives. An engineer at any level can have significant technical and business impact. As a Principal Security Software Engineer you will review the software design and development for all components of Oracles Service Cloud team. Develops and execute programs and processes to reduce information security risk and strengthen Oracles security posture. You should value simplicity and scale, work comfortably in a collaborative, agile environment, and be excited to learn. Things you'll do:* Penetration testing* Hardening of network, software and firmware* Security tool development (e.g. scanning tools)* Security metrics definition and delivery* Consult across different software development teams* Attack vector modeling* Champion secure coding practices Minimum Qualifications: Bachelors or Masters degree in Computer Science or related field 7+ years of experience in software engineering or related field Experience working in a large cloud or Internet software company preferred Strong application/product/software security background Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, verbal and written communication skills Ability to succeed through collaboration and working through internal and external organizations and individuals Prior DevOps or continuous delivery and deployment experience preferred Strong security testing experience with Fortify, Burp, Zap or Webinspect. Thorough understanding of latest security principles, techniques, and protocols. Security certifications is a plus. Skills Required: Application architecture and design reviews; Penetration Testing and Vulnerability assessments; Web Services and API security assessments; Product Security Assessments and Threat Modeling; Dynamic Vulnerability Scanning using automated application scanners; Execute Secure Code Audits using manual and automated methods to review product codes; Secure SDLC Processes including DevOps and Agile; Knowledge of languages, including Java, .Net, PHP, C++, and XML; Security Testing tools, including Nmap, Nessus, Web Inspect, BurpSuite, ZAP Scanner, Fortify Secure code scanner, SOAP UI, Kali Linux, and Metasploit; Operating Systems including Windows and Linux; Cryptographic algorithms, hashing algorithms, encryption; and Network and web related protocols, including TCP/IP, TLS/SSL, HTTP, and FTP. Detailed Description and Job Requirements As a member of the software security team, you will assist in defining and developing software for tasks associated with the security testing of software applications. Provide technical leadership to other software developers. Specify, design and implement modest changes to existing software architecture to meet changing needs. Develop, implement, and enforce Oracles security policies. Develop, implement, and manage Oracles compliance with operational security procedures. Develop Security Review threat model and operationalization standards for cloud services to be built and deployed into Oracles Service cloud. Duties and tasks are varied and complex needing independent judgment. Fully competent in own area of expertise. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans status or any other characteristic protected by law. Career Level - IC4 Responsibilities Supports the strengthening of Oracles security posture, focusing on one or more of the following: risk management; regulatory compliance; threat and vulnerability management; incident management and response; security policy development and enforcement; privacy; information security education, training and awareness (ISETA); digital forensics and similar focus areas.Risk Management: Brings advanced level skills to assess the information security risk associated with existing and proposed business operational programs, systems, applications, practices and procedures in very complex, business-critical environments. May conduct and document very complex information security risk assessments. May assist in the creation and implementation of security solutions and programs.Regulatory Compliance: Brings advanced level skills to manage programs to establish, document and track compliance to industry and government standards and regulations, e.g. ISO-27001, PCI-DSS, HIPAA, FedRAMP, GDPR, etc. Researches and interprets current and pending governmental laws and regulations, industry standards and customer and vendor contracts to communicate compliance requirements to the business. Participates in industry forums monitoring developments in regulatory compliance.Threat and Vulnerability Management: Brings advanced level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required.Incident Management and response: Brings advanced level skills to respond to security events, identifying possible intrusions and responding in line with Oracle incident response playbooks. May operate as Incident Commander on serious incidents.Digital Forensics: Brings advanced level skills to conduct data collection, preservation and forensic analysis of digital media independently, where an advanced understanding of forensic techniques is required.Other areas of focus may include duties providing advanced level skills and knowledge to manage Information Security Education, Training and Awareness programs. In Security role, may manage the creation, review and approval of corporate information security policies.Mentors and trains other team members. Compiles information and reports for management.

Posted 4 months ago

Apply

0.0 - 2.0 years

2 - 6 Lacs

bengaluru

Work from Office

Experience : Investigator or analysist in Digital forensics Technical support for the global customers of Mobile and digital forensics product Testing digital devices and mobile apps, trouble ticketing, issue reporting

Posted Date not available

Apply

0.0 - 2.0 years

3 - 5 Lacs

pune

Work from Office

Cybersecurity Trainer Wanted! We're looking for an experienced Cybersecurity Trainer to educate and empower our teams with the latest security skills and knowledge! Responsibilities: - Design and deliver engaging cybersecurity training programs - Develop and update training content to stay current with industry trends - Conduct workshops, webinars, and online training sessions - Assess training effectiveness and provide recommendations for improvement Requirements: - Strong background in cybersecurity (certifications like CompTIA Security+ or CISSP a plus) - Excellent communication and presentation skills - Experience in training or teaching Experience 6months to 2+years Compensation 1)Depends on interview based perfomance. 2)Last CTC base. Ready to shape the future of cybersecurity? Let's connect! naina.asutkar@skillected.com OR Contact us +91 89563 60689 #Cybersecurity #Trainer #CybersecurityTraining #InfoSec #CareerOpportunity

Posted Date not available

Apply

1.0 - 5.0 years

3 - 6 Lacs

pune

Work from Office

Job Summary : We are seeking a proactive and technically skilled information security (SOC) Engineer/Analyst to monitor, detect, and respond to cybersecurity threats in real-time. The ideal candidate will have strong analytical skills, be detail-oriented, and possess a sound understanding of threat landscapes, SIEM tools, and incident response. The ideal candidate will possess a strong foundational understanding of cybersecurity governance, robust technical skills in security operations, and a commitment to staying abreast of the evolving threat landscape and internal security requirements. Key Responsibilities Monitor security events and alerts from SIEM and other security tools. Perform initial triage and investigation of potential threats or anomalous behavior. Escalate incidents according to severity and defined procedures. Document incidents, provide root cause analysis, and maintain detailed logs. Analyze threat intelligence feeds and correlate with internal data. Assist in threat hunting and vulnerability management activities. Support continuous improvement of SOC processes and playbooks. Collaborate with other IT and Security teams for incident resolution. Assist in developing and tuning SIEM rules, queries, and dashboards for threat detection. Contribute to vulnerability management and secure configuration of internal systems and cloud environments. Support the testing and execution of recovery plans for security systems and data. Document incident findings, remediation steps, and contribute to post-incident reviews. Required Skills & Qualifications : Bachelors degree in Computer Science, Cybersecurity, or related field. 1–3 years of experience in a SOC environment or similar security operations role. Familiarity with SIEM tools (e.g., Splunk, QRadar, Sentinel). Understanding of TCP/IP, firewalls, IDS/IPS, and common attack vectors. Knowledge of malware, phishing, ransomware, and social engineering tactics. Hands-on experience with endpoint protection, network monitoring, and forensic tools. Excellent communication and documentation skills. Preferred Certifications : CompTIA Security+ or CySA+ Vendor-specific SIEM certifications.

Posted Date not available

Apply

15.0 - 20.0 years

20 - 25 Lacs

hyderabad

Work from Office

Position Overview: We are seeking a dynamic and experienced Head of Security Operations Center to lead and manage security operations across multiple SOCs. This role requires strategic leadership with deep expertise in cybersecurity operations, team management, customer engagement, and service delivery. The candidate will be responsible for driving operational excellence, governing SLAs and ensuring high customer satisfaction while maintaining a strong security posture and complaince. Key Responsibilities: 1. Strategic Leadership & Operations Management Oversee and manage multiple SOC, ensuring 24x7 operations, driving efficiency, and resilience. Develop and execute security strategies to enhance SOC capabilities and effectiveness. Define and implement standard operating procedures and best practices across all SOCs. Align SOC operations with business objectives, regulatory requirements, and industry best practices. Drive continuous improvement in threat detection, incident response, and operational processes. 2. Team Management & Leadership Build, mentor, and lead high-performing SOC teams across multiple locations. Establish structured training programs to enhance analysts' skills in threat analysis, forensics, and incident response. Foster a culture of collaboration, accountability, and continuous learning within SOC teams. Ensure proper workload distribution, resource allocation, and performance tracking. Minimise resource penalty by forecasting resource requirements for each account. 3. Customer Handling & Relationship Management Act as the primary point of contact for key customers, ensuring high levels of satisfaction and engagement. Help get CSAT score and positive review for TCL Manage customer escalations effectively and ensure timely resolution of security concerns. Conduct regular customer meetings, security briefings, and reporting to build trust and transparency. Work closely with account management and sales teams to align SOC services with customer needs. 4. SLA Governance & Compliance Define, monitor, and ensure adherence to SLAs for all SOC operations as per RFP. Implement robust processes to meet and exceed KPI targets for threat detection, response times, and resolution. Validate and submit monthly/quarterly/half yearly SLA and ensure timely payment from customer 5. Revenue & Business Growth Identify opportunities to optimize SOC revenue through service enhancements and upselling. Collaborate with business leaders to develop new security service offerings. Ensure cost-efficient SOC operations while maintaining high service quality. Support the sales and pre-sales teams in customer engagements, RFPs, and proposal development. 6. Threat Management & Incident Response Lead proactive threat-hunting, intelligence-sharing, and security monitoring efforts. Establish and maintain a robust incident response framework for rapid threat detection and mitigation. Collaborate with internal and external stakeholders to strengthen threat intelligence capabilities. Ensure minimal business impact by streamlining response and recovery processes. 7. Stakeholder & Executive Reporting Provide regular reports and insights to senior leadership on SOC performance, threats, and risk posture. Act as the key security advisor to C-level executives, clients, and internal stakeholders. Collaborate with IT, network, and business teams to align security strategies with organizational goals. Qualifications & Experience: Must-Have: Education: Bachelors or Masters degree. Experience: 15+ years in Cloud and cybersecurity, with at least 5 years leading large teams in CCSS Domain. Certifications: CISSP, CISM, CISA, CEH, or equivalent preferred. Good to have Technical Skills: Expertise in SIEM, SOAR, EDR, and other security monitoring tools. Strong understanding of cyber threat intelligence, malware analysis, and digital forensics. Soft Skills: Strong leadership, People management skills, decision-making, and problem-solving abilities. Excellent verbal and written communication and interpersonal skills for managing both internal teams and external customers. Ability to handle high-pressure situations and make critical security decisions. Experience in stakeholder management and executive reporting.

Posted Date not available

Apply

0.0 years

2 - 3 Lacs

chennai

Work from Office

Key Responsibilities: Assist in planning and conducting cybersecurity audits under supervision. Review and validate IT policies, procedures, and security controls. Collect and document audit evidence (logs, reports, screenshots). Support risk assessments and gap analysis activities. Participate in audit walkthroughs and internal interviews. Track and follow up on audit findings and corrective actions. Help prepare audit reports and summaries for review by senior auditors. Support coordination with external auditors or certifying bodies. Qualifications & Skills: Bachelors degree in Computer Science, IT, Cybersecurity, or a related field. Basic knowledge of cybersecurity frameworks (ISO 27001, NIST, CIS). Understanding of information security principles and risk management. Good documentation and communication skills. Willingness to learn audit processes and compliance standards. Preferred Certifications (Optional but Advantageous): ISO 27001:2022 ISMS Internal Auditor (or willingness to pursue) CISA Awareness level Microsoft SC-900 / CompTIA Security+ Familiarity with GRC tools is a plus

Posted Date not available

Apply

2.0 - 5.0 years

4 - 5 Lacs

bareilly

Work from Office

Department of Applied Sciences & Humanities Qualification Master s Degree in the Relevant Subject Area Job Description Applicants have a master s degree in the relevant subject area. Candidate must have qualified NET in the relevant area or Ph.D. in the relevant subject. Ph.D. preferred. Specialization: - Forensic Science, Digital Forensics, Experience: Minimum 2 years of relevant industry experience.

Posted Date not available

Apply

2.0 - 5.0 years

4 - 5 Lacs

bareilly

Work from Office

Department of Applied Sciences & Humanities Qualification Master s Degree in the Relevant Subject Area Job Description Applicants have a master s degree in the relevant subject area. Candidate must have qualified NET in the relevant area or Ph.D. in the relevant subject. Ph.D. preferred. Specialization: - Forensic Science, Digital Forensics, Experience: Minimum 2 years of relevant industry experience.

Posted Date not available

Apply

6.0 - 8.0 years

16 - 17 Lacs

bengaluru

Work from Office

Technology | CompTIA Security+/Certified SOC Analyst (CSA)/GIAC Security Essentials (GSEC)/Certified Ethical Hacker (CEH)/Cisco Certified CyberOps Associate/GIAC Certified Incident Handler (GCIH)/GIAC Security Operations Certified (GSOC) Delivery Skills required are: - Technical Expertise: - *Expert knowledge of threat detection techniques and tools. *Leading incident response efforts, including advanced techniques for containment, eradication, and recovery. *Conducting in-depth digital forensics investigations. *Expertise in configuring and optimizing SIEM (Security Information and Event Management) systems. Analytical Skills: - *Deep understanding of log analysis techniques and tools. *Identifying patterns and anomalies in large datasets. *Integrating threat intelligence into monitoring and response processes. *Staying updated on the latest threat intelligence and applying it to enhance security. Collaboration and Coordination: - *Working closely with other IT and security teams to ensure comprehensive security coverage. *Leading the coordination of response efforts during major incidents. *Ensuring effective communication and collaboration among all stakeholders. *Coordinating with external partners and vendors for specialized support. Continuous Improvement: - *Continuously evaluating and improving security processes and procedures. *Implementing lessons learned from incidents to enhance the overall security posture. *Contributing to the development and updating of security policies and procedures.

Posted Date not available

Apply

5.0 - 9.0 years

7 - 11 Lacs

bengaluru

Work from Office

Education Qualification : B.Sc Skills : Primary -> Technology | Sentinel SIEM Tool Administrator | Level 2 Support | 2 - Knowledgeable Primary -> Technology | Splunk SIEM Tool Administrator | Level 2 Support | 2 - Knowledgeable Secondary -> Technology | Qradar SIEM Tool Administrator | Level 2 Support | 2 - Knowledgeable Secondary -> Technology | Network Security Administrator | Level 2 Support | 2 - Knowledgeable Certification : Technology | Microsoft Certified: Security, Compliance, and Identity Fundamentals / CISSP/CISM/CEH/GIAC CIH/CSA/CompTIA CySA+/Cisco Certified CyberOps Associate/Splunk Core Certified User/IBM Certified SOC Analyst - IBM QRadar SIEM V7.3.2 Delivery Skills required are: - Technical Skills: - *Identifying and analyzing potential threats and vulnerabilities using various tools and techniques. *Leading and managing the response to security incidents, including containment, eradication, and recovery. *Implementing and maintaining security monitoring systems, such as SIEM (Security Information and Event Management) tools. *Prioritizing and remediating vulnerabilities based on risk assessments. Operational Skills: - *Developing, implementing, and enforcing security policies, standards, and procedures. *Managing and maintaining secure configurations for systems, networks, and applications. *Overseeing the timely application of security patches and updates to systems and software. Analytical Skills: - *Analyzing logs and event data from various sources to identify patterns and anomalies. *Utilizing advanced analytics to detect and investigate security incidents. *Conducting digital forensics investigations to uncover evidence of security breaches. Collaboration and Teamwork: - *Collaborating with other IT and security teams to enhance the organization s security posture. *Coordinating response efforts during security incidents with internal and external stakeholders. *Leading incident response teams and ensuring effective communication and collaboration.

Posted Date not available

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies