Jobs
Interviews

150 Ethical Hacking Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 7.0 years

0 Lacs

haryana

On-site

We are looking for a certified ethical hacker to assist in enhancing the security of our network against potential threats. Your main responsibility will involve evaluating our company's network, servers, and overall infrastructure to discover any vulnerabilities that may exist. As a certified ethical hacker, you must possess the knowledge and expertise in utilizing various network and security tools, along with a high-level comprehension of computer and network security principles. This includes a deep understanding of encryption and cryptography. Responsibilities Your duties as a certified professional ethical hacker will encompass the following: - Conducting ethical hacking and penetration testing - Performing vulnerability assessments - Analyzing malware - Collaborating with other penetration testers and information security analysts - Ensuring web application security - Executing social engineering tactics - Enhancing database security - Implementing reverse engineering techniques - Safeguarding network security - Conducting threat modeling and risk assessment Job Qualifications and Skill Sets The qualifications necessary for a certified ethical hacker are as follows: - A Bachelor's degree in computer science, information technology security, or a related field - Security certifications such as Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH) - Demonstrated proficiency in penetration tests, vulnerability assessment, and security monitoring - Knowledge of the OSI model, TCP/IP, HTTP, SSL, and wireless networking - Experience with common network infrastructure and security tools - Familiarity with web applications, including HTTP and SQL injection attacks - Understanding of security testing methodologies as per the EC-Council standards - Ability to thrive in a fast-paced work environment,

Posted 1 day ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

As an Emerging Tech Specialist at our Applied Research center, you will focus on applying scientific and technical research to solve practical problems and develop new products or processes within a specific industry or field. Your responsibilities will include conducting research, analyzing data, and developing solutions that can be implemented in real-world settings. You will define the research agenda and collaborate with academia and partners to conduct applied research. Additionally, you will be responsible for building tech playbooks that can be utilized by product and implementation teams. Your key responsibilities will involve researching emerging tech trends, the ecosystem of players, use cases, and their impact on client businesses. This will include scanning and curating startups, universities, and tech partnerships to create an innovation ecosystem. You will rapidly design and develop Proof of Concepts (PoCs) in emerging tech areas, sharing design specifications with team members, integrating, and testing components. Furthermore, you will contribute to thought leadership by developing showcases that demonstrate the application of emerging technologies in a business context. As part of the Applied Research Center activities, you will contribute to the design, development, testing, and implementation of proof of concepts in emerging tech areas. You will also be involved in problem definition and requirements analysis, developing reusable components, and ensuring compliance with coding standards and secure coding guidelines. Your role will also include innovation consulting, where you will understand client requirements and implement solutions using emerging tech expertise. Additionally, you will be responsible for talent management, mentoring the team to acquire identified emerging tech skills, and participating in demo sessions and hackathons. You will work with startups to provide innovative solutions to client problems and enhance our offerings. In terms of technical requirements, you should have expertise in various emerging areas such as Advanced AI, New Interaction Models, Platforms and Protocols, Cybersecurity, Quantum, Autonomous Machines, and Emerging Research areas like Brain AGI and Space Semicon. You will also need advanced theoretical knowledge, experimental design expertise, data analysis skills, prototype development capabilities, and research tool proficiency. Preferred skills include experience in User Experience Design, Artificial Intelligence, Cybersecurity Competency Management, Machine Learning, Robotics Algorithms, and X Reality (XR) technologies. Soft skills like a collaborative mindset, communication skills, problem-solving approach, intellectual curiosity, and commercial awareness will be beneficial for this role.,

Posted 1 day ago

Apply

1.0 - 5.0 years

0 Lacs

telangana

On-site

As a Cybersecurity Trainer, you will play a crucial role in equipping professionals with the knowledge and skills necessary to navigate the dynamic landscape of cyber threats. Your primary responsibility will involve designing and delivering virtual training sessions that cover various cybersecurity domains like network security, ethical hacking, incident response, and risk management. You will be expected to develop and update training content, facilitate engaging live sessions, workshops, and webinars, and assess learners" performance through evaluations, labs, and hands-on exercises. Additionally, you will customize training programs to suit the specific requirements of clients or organizations and stay abreast of the latest industry trends, tools, certifications, and threats. To excel in this role, you should have prior experience as a Cybersecurity Trainer, IT Instructor, or Security Professional, with a deep understanding of cybersecurity frameworks, principles, and practices. Strong communication and presentation skills are essential, and experience in instructional design or curriculum development would be advantageous. Possessing relevant certifications such as CompTIA Security+, CEH, CISSP, or CISM is a requirement, along with the ability to simplify complex technical concepts for easy comprehension. Ideally, you should hold a Bachelor's degree in Cybersecurity, Computer Science, or a related field and be familiar with eLearning platforms like Moodle or Canvas. Experience with hands-on labs such as Cyber Range, TryHackMe, or Hack The Box would be beneficial. Joining our team offers you competitive compensation, flexible working hours, and the chance to make a meaningful impact on the future generation of cybersecurity professionals. You will thrive in a supportive, mission-driven work environment that prioritizes continuous learning and professional development.,

Posted 3 days ago

Apply

1.0 - 6.0 years

0 - 0 Lacs

thane

On-site

Quastech: Urgent opening for Cyber Security and Ethical Hacking Trainer for Thane location. Designation: Cyber Security and Ethical Hacking Trainer Location: Thane. Experience: 0-5yrs Salary: As per Market standards Notice Period: Immediate joinee to 15 days Working Days: 6 days Required Skills: *Proficient knowledge of Cyber Security and Ethical Hacking* Job Profile: Conducting lectures and preparing the material for students. As faculty, to teach students programming languages, designing languages About the Job Looking for a Cyber Security and Ethical Hacking Trainer to learn and understand Cyber Security and Ethical Hacking Training Mumbai. Deliver training based on latest technologies. INTERESTED CANDIDATES CAN SHARE THEIR UPDATED CV ON resource@quastech.in OR 7400095741

Posted 3 days ago

Apply

0.0 years

2 - 3 Lacs

Noida

Work from Office

Knowledge of scripting languages (Perl, Python, HTML, Java, Shell). Hands-on experience in dynamic analysis, container testing, fuzzing, OWASP top 10 and vulnerability scanning if have any certificate ( CEH, ethical hacking

Posted 3 days ago

Apply

0.0 - 3.0 years

0 Lacs

karnataka

On-site

The need for cybersecurity professionals is never-ending, the world needs really skilled and ethical hackers. We provide opportunities to make you more skilled! Here at CyberSapiens, we always look for enthusiastic individuals who are keen on their skills & interests. This way our crowd is something that makes you enjoy your work. Join us to explore yourself, as it is in your growth that we grow. We are looking for candidates interested in the hacking field for performing vulnerability assessments and penetration testing on websites and applications (any platform) and recommending remediations accordingly. Required Skills: Knowledge of Cyber Security concepts and/or a related certification. Experience: 0-1 (Freshers are welcome). If you are interested in this position, please share your updated resume at sales@cybersapiens.co to apply or send it to click@cybersapiens.in for consideration.,

Posted 4 days ago

Apply

0.0 - 1.0 years

1 - 3 Lacs

Kolkata

Work from Office

Cyber security instructor, SOC operations, Bug bounty operations, Network Security, Python Scripting, Security Consulting, Training Delivery, Student Mentorship, Assessment and Evaluation

Posted 4 days ago

Apply

5.0 - 10.0 years

8 - 12 Lacs

Noida, Gurugram

Work from Office

Min 4–7-year experience performing security testing on Industrial control system components like PLC’s, SCADA, IIOT devices etc. Proven experience in conducting penetration tests, vulnerability assessments, and security audits across diverse environments. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP etc. Strong knowledge of common security vulnerabilities, attack vectors, threat modelling and exploitation techniques. Proficiency in using penetration testing tools and frameworks such as Nessus, Burp Suite, Nmap, and other ethical hacking tools. Understanding of component/system architectures in OT environments. Understanding and evaluation of security testing methods. Knowledge of typical industrial protocols (e.g., Modbus, Profinet, OPC, DNP3.0, CAN) Excellent communication skills, with the ability to clearly articulate technical findings and recommendations to both technical and non-technical audiences Roles and Responsibilities Handle the training delivery for IEC 62443 topics and OT security Handle the OT security project delivery and AUdits

Posted 4 days ago

Apply

1.0 - 5.0 years

2 - 7 Lacs

Pune

Work from Office

About The Role : Job Title- I&A On-boarding Information Security Analyst, Associate Location- Pune, India Role Description: As I&A On-boarding Information Security Analyst you will be part of Access Lifecycle On-boarding global family which includes access management for application end user recertification On-boarding, user access for request & approval, user provision On-boarding and Functional Taxonomy SoD On-boarding & maintenance as well as IDAHO (Access concept) SME as central DB services. Deutsche Bank is looking for bright and open-minded individuals to support Business Identity & Access Services within Access Lifecycle Solution On-boarding team for application end user request & approval as well as end user access provision central service On-boarding. A key success factor of the Access Lifecycle Solution On-boarding team is the quick understanding of complex application set ups for Identity & Access Management and support Information Security Officer (ISO) and IT Application Owner (ITAO) along end-to-end central solution On-boarding process across DB. You will gain insights into the complete Identity & Access Management lifecycle as you will learn about the roles and entitlements and their set up, segregation of duties, application authentication and authorization process. What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities As I&A On-boarding Information Security Analyst you will be responsible to perform On-boarding assessments if an IT asset is applicable for end user application access for request & approval and business requirement gathering (based on existing KOP ID Admin procedures) to identify, how future user provisioning (ID Admin via automated connector or manual, centrally or decentral managed) will be set up between central request & approval platform and to be on-boarded application in adhering to Information Security (IS) internal and regulatory requirements. Efficiently engage, manage, and influence the main stakeholders, along with application On-boarding process including Information Security Officer, IT Application Owner, Engineering and Operations teams Provide process improvement inputs to various stakeholders involved. Proactively seek ways to improve upon existing practices and processes. Display insight and ability in identifying issues and develop successful solutions. Report and escalate potential risks to the management to help avoid / minimize the impact. Work with multiple, distributed teams (across different locations) Support develops key operational procedures where necessary and ensure adherence to all such defined policies. Comfortable with associated disciplines of Security Policy and Governance in banking domain Very good presentation and communication skills allowing to communicate with our stakeholders. A structured and methodological way of working with the objective to deliver high quality results. Supports tough people decisions to ensure people performance is aligned with organization imperatives and needs. Addresses individual performance issues, where necessary, to drive for high performance. Pro-active and flexible working approach, Team spirit Your skills and experience Minimum 5 years working experience in Identity & Access Management, Governance, Risk and Control related topics. Team management experience Basic knowledge and/or willingness to work with industry best practices and frameworks like ISO27001, NIST, CSA CCM, COBIT, ITIL Good business analyses knowledge of system design, development, implementation, and user support principles and practices Knowledge of IT Service Management or IT Governance or IT Delivery Management or IT Project Management or IT Delivery background or IT Security Knowledge on Database Systems, application interactions and server operating systems Excellent Excel knowledge Competencies: Self-motivated and flexibility to work autonomously in virtual and multicultural teams. Good communication skills (both written and verbal), fluent in English (written/verbal) Good analytical skills and problem-solving abilities Pro-active and flexible working approach A structured and methodological way of working with the objective to deliver high quality results. Flexible mindset with an eye for detail and continuous improvement Good understanding in business related information Being flexible, open minded, able to share information, transfer knowledge and expertise to stakeholders and other team members. How well support you . . . .

Posted 4 days ago

Apply

5.0 - 10.0 years

6 - 12 Lacs

Chennai

Remote

Job Description CyberSecOn is looking for a talented and dedicated Cyber Security Analyst who can work remotely. A Cyber Security Analyst is responsible for maintaining the security and integrity of data. The security analyst must possess knowledge of every aspect of information security to protect company assets from evolving threat vectors.The main responsibilities will include: Monitor and investigate security events and alerts from various sources, such as logs, network traffic, threat intelligence, and user reports. Conduct proactive and reactive threat hunting campaigns to uncover hidden or emerging threats on the cloud environment. Perform root cause analysis and incident response to contain and remediate cloud abuse incidents. Document and communicate findings, recommendations, and lessons learned to relevant stakeholders and management. Develop and update cloud abuse detection rules, indicators, and signatures. Research and stay updated on the latest cloud abuse trends, tactics, techniques, and procedures (TTPs) of threat actors. Provide guidance and training to other security teams and cloud users on best practices and standards for cloud security. Manage multiple client environment cyber security infrastructure and applications. Knowledge of ServiceNow, Zoho desk, Jira/Confluence, etc. Perform vulnerability risk reviews using Qualys, Rapid7 and/or Tenable. Responsible for managing and improving the defined patch management & configuration review process and activities. Proactively manage applications, infrastructure security & network risks; ensuring security infrastructure aligns with companys compliance requirements. Skills & Experience: 4 years + years of experience in a security analyst role, preferably in a SOC environment. Good knowledge on security analyst, engineering, and project management experience Experience in client management for security projects. Knowledge and hands-on experience with SIEM technologies such as Microsoft Sentinel, Rapid7 Insight IDR, Wazuh, etc. Create play books and automation on Microsoft sentinel is desirable. Strong experience in Virtualisation, Cloud (Azure, AWS, other service providers) design, configuration, and management. Ability to manage priorities, perform multiple tasks and work under dynamic environment and tight deadlines. Ability to perform vulnerability assessments, penetration testing using manual testing techniques, scripts, commercial and open-source tools. Experience and ability to perform Phishing campaign and/or similar social engineering exercise. Subject matter expert in one or multiple areas as Windows, Unix, Linux OS. Vendor or Security specific certifications is preferred. Demonstrated analytical, conceptual and problem-solving skills. Ability to work effectively with limited supervision on multiple concurrent operational activities. Ability to communicate effectively via email, report, procedures in a professional and succinct manner. Preferred : Candidates who can join immediately or within 15 days.

Posted 4 days ago

Apply

4.0 - 8.0 years

7 - 17 Lacs

Noida, Delhi

Work from Office

Conduct comprehensive penetration testing of networks, web applications, mobile applications, and other systems to identify security vulnerabilities. Perform vulnerability assessments and provide detailed recommendations for remediation. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP, MITRE ATT&CK etc. Strong knowledge of common security vulnerabilities, attack vectors, threat modelling and exploitation techniques. Proficiency in using penetration testing tools and frameworks such as Nessus, Burp Suite, Nmap, and other ethical hacking tools. Strong understanding of network protocols, network and application security architectures, and common vulnerabilities (e.g., OWASP Top Ten). Prepare detailed reports of findings, including risk analysis and recommended mitigations, and present these findings to stakeholders. Stay current with emerging security threats, vulnerabilities, and technology trends, and apply this knowledge to improve our security posture. Understanding of component/system architectures in IT and OT environments. Understanding and evaluation of security testing methods. Knowledge of typical industrial protocols (e.g., Modbus, Profinet, OPC, DNP3.0, CAN) Excellent communication skills, with the ability to clearly articulate technical findings and recommendations to both technical and non-technical audiences Source code review for control flow and security flaws IEC 62443 Standard plus at least one of: ISO/IEC 27001 IEC 61508 NIST CSF IEC 61162-460:2024 Proficient in developing VAPT documentation and methodologies specifically aligned with IEC 61162-460:2024 for maritime navigation and radiocommunication equipment cybersecurity. Automotive Vehicle Testing Support Skilled in providing cybersecurity testing support for automotive vehicles , including VAPT of ECUs and in-vehicle networks , threat modeling , and ensuring compliance with industry standards like ISO/SAE 21434. Roles and Responsibilities Min. one professional certification such as Certified Ethical Hacker (CEH), ISA/IEC 62443, OSCP or certified Penetration Tester preferred. Min 2–5 years of experience performing security testing on Industrial control system components like IOT devices, PLCs, SCADA, IIOT devices etc. Familiarity with operating systems (Windows, Linux) and their security features. Excellent problem-solving skills and the ability to think critically to identify and address security issues. Strong verbal and written communication skills, with the ability to document and present technical information to both technical and non-technical audiences. Perform and report on penetration testing of systems, including cloud, NIST 800-53 CA-8 security control and using methodologies that may include, NIST SP 800-115, IEC 62243, PTES, and Information Systems Security Assessment Framework (ISSAF). Develop and maintain up-to-date knowledge of security testing tools and techniques. Contribute to the development and maintenance of security testing methodologies and procedures. Team Collaboration and Training Collaborate with other members of the security team to develop and maintain security policies, procedures, and standards

Posted 4 days ago

Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

As a Senior Consultant in the Cyber Security department located in Gurugram, you will be responsible for various tasks and possess a range of skills and experiences. Your role will involve working on programming languages used for storing and processing raw data, having knowledge of operating systems such as Windows, macOS, Linux, UNIX, and other OSs, conducting penetration testing, understanding ethical hacking and coding practices, mastering advanced persistent threat management, ensuring firewall safety and management, utilizing encryption techniques and capabilities, conducting compliance assessments, and working with frameworks like COBIT and ITIL. You should have at least 5 years of relevant experience in cybersecurity, IT systems operation, and IT solutions development and maintenance. You must be well-versed in configuring and troubleshooting vulnerability management platforms like Tenable or Qualys, as well as patch management control platforms such as Microsoft MECM/SCCM. Experience in supporting patch management, vulnerability management, or configuration management programs is crucial, along with troubleshooting patch deployment and installation through log analysis and investigation. Your expertise should include knowledge of OWASP top 10 and other network security frameworks, hands-on experience in VAPT for application and network security, skills in configuration review, policy review, hardening of systems and networks, endpoint review, application code review, and testing tools. You should possess excellent communication and analytical skills to interact with clients directly, experience in Mobile AppSEC for Android and iOS, API testing, willingness to travel, good presentation and report-making skills, research knowledge in cyber security for consulting and customizing services, and hands-on working knowledge of tools like Burp, Nessus, Nmap, Qualys, Acunetix, Metasploit, and other relevant tools. Additionally, you should have knowledge of SIEM/SOAR, DLP, EDR/EPP, Firewall/IPS, Web Servers, and basic scripting knowledge in any language would be advantageous. Your role will also involve being willing to travel and actively participating in pre-sales activities, ensuring the highest level of security for clients and their systems.,

Posted 5 days ago

Apply

0.0 - 5.0 years

2 - 6 Lacs

Noida

Work from Office

Roles and Responsibilities can take corporate and classroom regular training batches of students and professionals Desired Candidate Profile CEHv12, NPT, WAPT, Linux, Cyber Security, Ethical Hacking Perks and Benefits 2 Lac to 6 Lacs

Posted 6 days ago

Apply

3.0 - 7.0 years

0 Lacs

haryana

On-site

As a Security Testing professional, you will be responsible for conducting application security assessments with 3-6 years of experience. This includes tasks such as Architecture and Design review, Code Review utilizing tools like CheckMarx, Penetration testing (Ethical Hacking), and Vendor Risk Assessment. You must possess a strong working knowledge of key security technologies such as Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). Your role will involve running and analyzing security Penetration testing to identify security vulnerabilities and recommend appropriate countermeasures for security enhancements. It is essential to have a solid understanding of protocols like HTTP, HTTPS, SSL, TLS, and SFTP to effectively carry out your responsibilities. If you have the requisite experience and skills in security testing, this opportunity in Gurgaon awaits your application. Join a dynamic team where your expertise will be valued, and your contributions will play a vital role in ensuring the security integrity of the applications under assessment.,

Posted 6 days ago

Apply

3.0 - 7.0 years

0 Lacs

chandigarh

On-site

As a Cybersecurity Trainer at Clinilaunch Research Institute in Bangalore, you will be responsible for delivering engaging and comprehensive training across various cybersecurity courses. With 3-5 years of experience, you will guide students through foundational and advanced cybersecurity topics, hands-on labs, and exam preparation for industry-recognized certifications. Your key responsibilities will include conducting training on Ethical Hacking, Network Security, Penetration Testing, Cybersecurity Risk Management, and Security Operations. Collaborating with the curriculum development team, you will enhance training content and methodologies. Assessing student progress and providing constructive feedback will be crucial in your role. To excel in this position, you must hold a Certified Ethical Hacker (CEH) certification from EC-Council and demonstrate proven experience as a cybersecurity trainer. Strong communication and presentation skills, along with in-depth knowledge of cybersecurity practices, are essential qualifications. Preferred certifications from EC-Council include Certified Network Defender (CND), Certified Chief Information Security Officer (C|CISO), Certified Security Analyst (ECSA), Certified Incident Handler (ECIH), and Certified Disaster Recovery Professional (CDRP). Your expertise in network security, ethical hacking, and threat intelligence, coupled with hands-on experience in tools like Kali Linux, Metasploit, and Wireshark, will be advantageous. As a passionate educator, you will simplify complex technical concepts for non-technical audiences and mentor aspiring cybersecurity professionals to prepare them for successful careers in the field. Your work will be on-site at Clinilaunch Research Institute in Bangalore, providing a conducive environment for professional growth and development. Stay updated on the latest cybersecurity trends, threats, and technologies to ensure the highest quality of training delivery.,

Posted 1 week ago

Apply

3.0 - 8.0 years

9 - 14 Lacs

Bengaluru

Work from Office

Educational Requirements Bachelor of Engineering Service Line Infosys Quality Engineering Responsibilities As part of the Infosys delivery team, your primary role would be to ensure effective Design, Development, Validation and Support activities, to assure that our clients are satisfied with the high levels of service in the technology domain. You will gather the requirements and specifications to understand the client requirements in a detailed manner and translate the same into system requirements. You will play a key role in the overall estimation of work requirements to provide the right information on project estimations to Technology Leads and Project Managers. You would be a key contributor to building efficient programs/ systems . If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Job Opening is for multiple locations- Bangalore, Hyderabad, Trivandrum, Chennai, Pune Technical and Professional Requirements: Security testing with 3-10 years exp - SAST/DAST/API, Network, Mobile Security/DevSecops/Cloud Security/Threat Modelling/Vulnerability Management/Logging & Audit/GRC/Security Operations/IAMSkills Required - Security Testing--Primary skills:Application Security,Application Security-Burpsuite,Application Security-Devsecops,Application Security-Ethical Hacking(CEH),Application Security-Nessus,Application Security-SSL(Secure Sockets Layer),Application Security-Threat Modeling,Application Security-Vulnerability Assessment/Penetration Testing,Application Security-Vulnerability Management,Application Security-Web Security,Application Security-Webservices Security,Security testing-Vulnerability testing,Technology-Application Security-Vulnerability Management-Qualys,Mobile Testing-Mobile Security Testing Preferred Skills: Technology-Application Security-Application Risk Profiling Threat Modeling Technology-Application Security-Ethical Hacking Technology-Application Security-Mobile Application Security Technology-Application Security-Penetration Testing (Black/White/Grey Box Testing) Technology-Application Security-Vulnerability Management Technology-Mobile Testing-Mobile Security Testing Technology-Security Testing-Security Testing - ALL Technology-Infrastructure Security-Secure Web Gateway-TrendMicro Interscan web security Virtual appliance

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

ludhiana, punjab

On-site

You will be responsible for delivering high-quality cybersecurity training sessions to individuals at various skill levels. Your role will involve preparing and presenting training materials, conducting hands-on labs, and providing ongoing support to ensure the success of our cybersecurity training programs. Key Responsibilities: - Develop, design, and deliver engaging cybersecurity training programs on various topics including network security, threat analysis, ethical hacking, risk management, data protection, and compliance. - Conduct theoretical and hands-on sessions using real-world examples and case studies to reinforce key concepts. - Evaluate the effectiveness of training programs and make improvements based on feedback. - Stay updated with the latest trends, threats, and best practices in the cybersecurity field to ensure training content is current. - Provide guidance and mentoring to participants, answering questions and offering solutions to cybersecurity challenges. - Develop training materials such as presentations, manuals, and lab exercises. - Administer exams or certifications to assess participants" understanding of the material. - Customize training solutions based on client or organizational needs. - Assist in creating documentation and resources for post-training reference. Qualifications: - Proven experience as a Cybersecurity professional with hands-on experience. - In-depth knowledge of cybersecurity principles, threat vectors, firewalls, encryption, vulnerability assessments, and incident response. - Relevant cybersecurity certifications such as CISSP, CEH, CISM, CompTIA Security+, or similar. - Prior experience in teaching or training, with the ability to explain complex technical concepts in an accessible manner. - Strong communication and presentation skills, with the ability to engage and motivate participants. - Ability to design and develop comprehensive training curricula. - Familiarity with various cybersecurity tools and technologies such as SIEM, penetration testing tools, firewalls, and antivirus software. - Experience with online learning platforms and delivering virtual training is a plus. - Strong problem-solving abilities and the capability to adapt to new challenges. Preferred Qualifications: - Bachelor's degree in Cybersecurity, Information Technology, or a related field. - Experience in corporate or enterprise-level cybersecurity training. - Knowledge of regulatory frameworks (e.g., GDPR, HIPAA, NIST) and compliance standards. - Experience with security certifications like CompTIA Network+, Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). This is a full-time, permanent position with a day shift schedule at an in-person work location.,

Posted 1 week ago

Apply

1.0 - 5.0 years

0 Lacs

haryana

On-site

As an ethical hacker at Greenlight Planet, your primary responsibility will be to identify security vulnerabilities in various vendor smartphones and provide recommendations on security measures. You will need to stay up-to-date with information dissemination channels, conduct testing on available jailbreaks, and create detection solutions to enhance the security of Android devices. Your tasks will include performing reconnaissance and testing hacking solutions from sources like the Darkweb and forums, collaborating with the Risk team on customer visits and field audits, standardizing phone model testing procedures, conducting periodic security reviews, and assisting in creating Mobile Device Management (MDM) policies. You will also work on Tampering Detection solutions for Android devices and recommend firmware upgrades to enhance security measures. To excel in this role, you should possess a strong understanding of Android mobile phone internals, including hardware, firmware, OS, and MDM-level security. Expertise in phone security bypass testing, hands-on experience with motherboard tampering, ISP PinOut, and Chip-Off methods of flashing, as well as practical experience with various testing tools like Chimera and Pandora are essential. Previous experience with Samsung, Nokia, Tecno, Infinix, Itel, VIVO, and ZTE smartphones is preferred, along with excellent problem-solving skills. This is a full-time position located in Gurugram/Mumbai, with benefits including cell phone reimbursement, flexible schedule, health insurance, internet reimbursement, provident fund, and work from home options. If you meet the required experience criteria and are capable of contributing to the global off-grid challenge with innovative security solutions, we encourage you to apply. Application Questions: - What's your expected CTC - What's your notice period - What's your current CTC ,

Posted 1 week ago

Apply

2.0 - 6.0 years

0 Lacs

kochi, kerala

On-site

As an Academic Advisor for Cybersecurity Training & Certification at Technovalley Software India Pvt. Ltd., located in Kochi, India, you will play a crucial role in guiding aspiring students, IT professionals, and corporate partners towards achieving internationally recognized certifications and unlocking global career opportunities. Your main responsibilities will include providing professional career guidance and counselling to individuals interested in pursuing Cybersecurity career paths such as Ethical Hacking, Cybersecurity Analyst, Computer Hacking Forensic Investigator, Offensive Security Certified Cybersecurity, Penetration Testing, SOC Analyst, Threat Intelligence, and Incident Response. You will be tasked with understanding the career aspirations and goals of each individual and recommending appropriate certification and training programs to align with their career trajectory. Additionally, you will educate prospective learners on global certification standards from renowned organizations like EC-Council, OffSec, CompTIA, PECB, and Microsoft. You will also offer insights into industry demand for Cybersecurity professionals, expected salary growth, and career scope in various Cybersecurity fields. Your role will involve coordinating the admission process, following up with leads, ensuring high admission conversion rates, and promoting scholarship opportunities for eligible candidates. Furthermore, you will be responsible for building relationships with students, acting as a student success partner, and collaborating with the placement cell to ensure certified students receive career assistance and placement opportunities. The desired qualifications for this role include a Bachelor's degree in Computer Science, Cybersecurity, IT, or related fields, along with a minimum of 2-3 years of experience in academic counselling, career guidance, or technical training consultation, preferably in Cybersecurity, IT Training, or EdTech industries. To excel in this role, you should possess a strong understanding of Cybersecurity certifications, excellent communication and negotiation skills, and the ability to work towards achieving aggressive targets. Your passion for helping individuals build careers in Cybersecurity, along with your familiarity with global job markets and career trends in Cybersecurity and IT Security domains, will be key assets in this position. Joining Technovalley will offer you the opportunity to work with India's leading Cybersecurity Training Company, engage with global professionals and industry leaders, and contribute to shaping the next generation of Cybersecurity professionals in India and beyond. This role also comes with a competitive salary, performance-based incentives, and the chance to drive career transformation in the cybersecurity space.,

Posted 1 week ago

Apply

3.0 - 5.0 years

5 - 9 Lacs

Bengaluru

Work from Office

The ideal candidate will have a strong background in IT Services & Consulting and excellent analytical skills. Roles and Responsibility Collaborate with cross-functional teams to identify and prioritize project requirements. Develop and maintain complex data models and reports using various tools and technologies. Analyze large datasets to extract insights and trends, and provide recommendations to stakeholders. Design and implement process improvements to increase efficiency and productivity. Develop and maintain technical documentation for projects and processes. Provide training and support to junior team members on new tools and technologies. Job Requirements Strong understanding of IT Services & Consulting industry trends and technologies. Excellent analytical and problem-solving skills with attention to detail. Ability to work collaboratively in a team environment and communicate effectively with stakeholders. Strong technical skills including data modeling, reporting, and visualization. Experience with process improvement methodologies and tools. Strong technical documentation and communication skills. Mandatory Skills: IDAM Security Consulting. Experience: 3-5 Years.

Posted 1 week ago

Apply

9.0 - 14.0 years

30 - 45 Lacs

Hyderabad, Bengaluru

Hybrid

Role & responsibilities Overall - At least 8+ years of experience in performing security engineering and assessments of complex systems with AI / ML / Data Science capabilities and services 3+ years of experience auditing existing AI or machine learning systems for security risks and compliance. Development and implementation of AI content filtering mechanisms. Deployment and operation of tools and processes to analyze security threats and vulnerabilities in AI or machine learning systems. Identification and protection of sensitive data within AI solutions. Design and implementation of strategies to protect AI systems from cyber-attacks. Design and implementation of adversarial test plans. Strong analytical and problem-solving skills Excellent communication skills, both written and verbal, with the ability to convey complex information in a clear and concise manner. A commitment to staying current with the latest developments in cybersecurity through ongoing training and professional development. Ability to work both independently and as part of a team in a fast-paced, dynamic environment. Flexible to provide coverage in US morning hours on a need-basis, and as required Preferred candidate profile Bachelor's or master's degree in computer science, mathematics, information systems, engineering, or cybersecurity. Industry certifications such as CISSP, SANS and/or other relevant certifications Experience designing, developing, and deploying secure AI systems. Training in secure coding standards and best practices for AI-related projects. Knowledge of ethical hacking techniques. Ability to develop security protocols and policies. Excellent communication, problem-solving, and analytical skills. Ability to work independently and as part of a team.

Posted 1 week ago

Apply

4.0 - 8.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Security Analyst at Dedalus, a prominent healthcare technology company, you will have the opportunity to contribute to the team in Chennai, India, and play a crucial role in enhancing healthcare services for a healthier planet. Your primary responsibility will involve Security Vulnerability Analysis and Penetration Testing, where you will assess, exploit, and report security vulnerabilities in software applications and infrastructure, providing recommendations for appropriate solutions. Working alongside a highly skilled team, your work will have a significant impact on the healthcare sector. Your duties will include: - Conducting Security Vulnerability Analysis, Threat Modelling, and Risk Assessment - Performing static code reviews using automated SAST tools and analyzing false positives - Executing dynamic testing (DAST) with tools like Burp-suite, Invicti, or Nessus - Conducting manual Penetration Testing and utilizing Ethical Hacking techniques to identify vulnerabilities - Compiling assessment and validation reports on identified vulnerabilities, risks, impact, recommended solutions, and Proof of Concepts (POCs) - Explaining threats and presenting assessment reports to the Developer and Architect community To excel in this role, you must meet the following essential requirements: - Minimum of four years of experience in security vulnerability analysis and Penetration Testing (VAPT) on cloud services, web products, or enterprise applications - Proficiency in using Appsec tools, including industry-standard tools like Burp-suite, Invicti, Fortify, and open-source tools such as Kali, Nmap, Wireshark, Metasploit, ZAP, and Echo Mirage - Technical knowledge of Software Development Life Cycle (SDLC) and implementation essentials for various application types (Desktop, Web, API, Mobile, and Cloud) - Ability to review Java or .NET code with a focus on security vulnerabilities and familiarity with OWASP, GDPR, and ISO Security standards - Certification in VAPT or Ethical Hacking in Mobile, Web, or Cloud security is mandatory - Exposure to DevAppSec automation and scripting is preferred - Knowledge of AI tools and securing Docker containers like Kubernetes is advantageous - Understanding of real-world threats and data protection regulations is desirable Join Dedalus and be part of a diverse and inclusive workplace where innovation and collaboration drive better healthcare outcomes for millions of patients worldwide. Dedalus is dedicated to fostering a work environment that encourages learning, innovation, and meaningful contributions to healthcare. If you are passionate about making a difference in the healthcare sector, join us on this journey to transform and improve healthcare options globally. Application Closing Date: 18th August 2025 Dedalus is committed to promoting diversity and inclusion in the workplace, ensuring respect, inclusion, and success for all employees and communities. Our dedication to diversity and inclusion is reflected in our work culture, emphasizing the importance of an inclusive and diverse workforce to drive innovation and create better healthcare solutions globally.,

Posted 2 weeks ago

Apply

2.0 - 6.0 years

5 - 12 Lacs

Noida, Gurugram

Hybrid

>> Job Description Experience: 3+ years with at-least 2-3 years in client facing advisory consulting role and managing a medium sized team Preferred Certifications: CEH, ECSA, OSCP, CISSP, CCSK, OCSE, CCSP, AWS Security Desired skill set: 1. Strong understanding of IT security standards and frameworks (OWASP, NIST, CIS) 2. Strong understanding of security risks in networks and application platforms 3. Strong understanding of network security, infrastructure security and application security 4. Strong understanding of OSI, TCP/IP model and network basics 5. Demonstrate technical penetration testing skills on IT infrastructure, web applications, mobile platforms and Red teaming 6. Strong technical skills: Information security, network security, Windows security, UNIX/Linux security, web and mobile application security, Cloud platforms 7. Broad knowledge of security technologies for applications, databases, networks, servers, and desktops 8. Solid technical skills in both information security architecture and penetration testing and ability to assess testing tools and deploy the right ones. 9. Scripting and programming experience is beneficial 10. Ability to perform manual penetration testing 11. Experience in Application Security Testing (Web, Mobile & ERP [SAP]), or related functions Vulnerability Assessment, Penetration testing 12. Perform penetration testing of various thick client software, web applications, and communications infrastructure to assist in hardening the cybersecurity posture against malicious actors 13. Conduct security research on the latest emerging advanced persistent threats (APTs), malware, and other security developments to assist in enterprise security efforts. Apply this security research into assessments. 14. Perform technical writing to communicate the preparation, testing, and recommendation phases for various security tests. Work with stakeholders to remediate system vulnerabilities. 15. Train team members and colleagues on the latest cybersecurity tactics, techniques, and procedures (TTPs) to grow the skill of the firm 16. Understanding of various security technologies including end point security, perimeter security, advanced threat protection, malware defense and security management 17. Expertise in the phases of penetration testing. Familiarity with Kali Linux distribution and the associated penetration testing tools suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag exercises considered a plus. 18. Good Understanding of OWASP top 10 and mitigation techniques 19. Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, Security Misconfiguration, CSRF, authentication/ authorization issues 20. Database testing: MySQL, Oracle, NoSQL 21. Understanding of cyber security management, cyber analytics, security intelligence platforms and threat intelligence frameworks 22. Writing business proposals and response to client RFP/ RFIs 23. Identifying business opportunities and lead delivery and program management for large cyber security programs 24. Delivery team and client relationship management 25. Experience on both commercial, open source tools and frameworks but not limited: Burpsuite, Metasploit, Core-Impact, Kali-Linux, AppScan, WebInspect, SSLScan, Soap UI Pro, SonarQube, Qualys, Nikto, Nessus, nmap, sqlmap, OWASP ZAP .

Posted 2 weeks ago

Apply

1.0 years

3 Lacs

IN

Remote

About the job: Position Overview: We are seeking a highly skilled and motivated ASM Specialist to join our Offensive Security Operations team. This role involves simulating real-world cyberattacks, identifying vulnerabilities, and actively managing the attack surface of enterprise environments. You will work closely with red teamers, threat intelligence analysts, and security stakeholders to detect, map, and reduce digital exposure across the organization's infrastructure. Key responsibilities: 1. Lead and execute Attack Surface Management (ASM) operations to identify external-facing vulnerabilities. 2. Simulate real-world attack scenarios within defined rules of engagement. 3. Maintain comprehensive visibility of internet-facing assets, including shadow IT. 4. Analyze and prioritize vulnerabilities based on risk and threat intelligence. 5. Collaborate with blue/red teams to improve security posture and reduce exposure. 6. Utilize frameworks such as MITRE ATT&CK for planning and simulation. 7. Communicate technical findings effectively to both technical and non-technical audiences. 8. Keep updated with latest threat actor tactics, techniques, and procedures (TTPs). Who can apply: Only those candidates can apply who: have minimum 1 years of experience are Computer Science Engineering students Salary: ₹ 3,00,000 /year Experience: 1 year(s) Deadline: 2025-08-17 23:59:59 Skills required: Ethical Hacking, Network Security, Network Management, Web Application Security, Cybersecurity, Security tools, Web Application Testing and Network Monitoring Other Requirements: 1. Experience in cybersecurity, red teaming, vulnerability management, or reverse engineering. 2. Holds certifications like OSCP, CRTO, GCIA, or equivalent. 3. Proven expertise in Red Team operations and ASM platforms/tools. 4. Strong knowledge of adversary simulation and threat intelligence. 5. Familiar with TTPs, DDoS, malware operations, and network scanning. 6. Understands how malicious code exploits vulnerabilities. 7. Exposure to cloud, DevOps, and enterprise environments. 8. Scripting/automation skills in Python, PowerShell are a plus. 9. Hands-on with tools like Shodan, Censys, and other recon platforms. 10. Excellent written and verbal communication skills. 11. Can explain technical findings to leadership and non-tech teams. 12. Strong prioritization, problem-solving, and time management. 13. Able to work in high-pressure, fast-paced settings. 14. Experience managing large-scale ASM programs. 15. Skilled at converting raw threat intelligence into insights. 16. Deep understanding of attack chains and defense evasion. 17. Experience working with globally distributed cybersecurity teams. 18. Passion for continuous learning and upskilling. 19. Bachelor’s or higher in Computer Science, InfoSec, IT, or related field. About Company: Beyond Cloud, a leading cybersecurity consultancy, empowers businesses to navigate the digital landscape confidently in cybersecurity, information security, and risk management. We provide innovative solutions to protect their valuable assets and manage cyber threats effectively. Our team of experts specializes in Penetration testing, Red Teaming, cybersecurity risk management, security operations, and cyber resilience. We are one of the top cybersecurity firms in India, offering a wide range of cybersecurity services. Trust Beyond Cloud for your cyber protection and safeguarding your business against emerging cyber threats.

Posted 2 weeks ago

Apply

2.0 - 7.0 years

0 - 1 Lacs

Visakhapatnam

Work from Office

FACULTY for Computer Science Engineering GITAM School of Technology , GITAM (Deemed to be University) The Department of Computer Science Engineering at GITAM invites bright and young faculty for Visakhapatnam Campus. GITAM is looking for applicants with a passion for teaching and demonstrated excellence in research. We are looking for candidates with specializations like Theoretical Computer Science ( Algorithms, Complexity, Graph Theory, Formal Methods) Systems and Architectures ( Networks, Operating Systems, Architectures, Distributed Systems including Cloud Computing and Blockchain) Cyber Security and Cyber Physical Systems ( IoT, Sensor networks, Edge computing) Data Structure & Database Expected to teach Undergraduate & Postgraduate courses, conduct independent research and provide services to the university. GITAM is looking to expand its Computer Science Engineering Faculty to global standards in the field of teaching and research. The faculty is expected to publish in Scopus indexed/Web of Science journals. Location : Visakhapatnam Essentials Deliver engaging lectures and hands-on laboratory sessions across undergraduate and graduate courses, with a specialization in Theoretical Computer Science ( Algorithms, Complexity, Graph Theory, Formal Methods) Systems and Architectures ( Networks, Operating Systems, Architectures, Distributed Systems including Cloud Computing and Blockchain) Cyber Security and Cyber Physical Systems ( IoT, Sensor networks, Edge computing) Data Structure & Database Develop and deliver effective and engaging undergraduate and/or graduate courses in the sciences, ensuring alignment with the curriculum objectives and fostering a conducive learning environment. Employ innovative teaching methodologies, incorporating technology and interactive methods to enhance student understanding and critical thinking. Provide academic advisement and mentorship to students, assisting them in their academic and professional development. Conduct original research in the candidate's field of expertise, leading to scholarly publications in reputable journals, conference presentations, and contributions to the scientific community. Secure external research funding through grant applications and collaborative projects, contributing to the advancement of knowledge and the institution's research profile. Supervise and mentor graduate students in research projects, fostering their growth as emerging scholars. Participate in departmental and institutional committees, contributing to academic governance and decision-making processes. Engage in outreach activities that promote the sciences and the institution's visibility in the local and global community. Collaborate with colleagues on interdisciplinary projects, fostering a culture of cross-disciplinary research and teaching. Stay current with advancements and trends in the sciences by attending conferences, workshops, and professional development opportunities. Continuously enhance teaching strategies and research methodologies to promote academic excellence and innovation. Foster relationships with industry partners, community organizations, and government agencies to facilitate collaboration, research opportunities and knowledge dissemination. Contribute to public lectures, seminars, and workshops to promote scientific literacy and engagement beyond the academic community. Qualification: Ph.D Computer Science Engineering A good academic record, with a Ph.D. degree in the relevant field and First class or equivalent at Bachelor’s and Master’s level in the relevant branch. Experience of teaching and / or research in an academic/research position equivalent to that of Assistant Professor in a University, College or Accredited Research Institution/industry with publications in the peer-reviewed or UGC-listed journals

Posted 2 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies