Jobs
Interviews

150 Ethical Hacking Jobs - Page 2

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0.0 - 1.0 years

3 - 3 Lacs

Vijayawada, Hyderabad

Work from Office

Job Title: Technical Trainer Openings : 3 Positions Type : Full-time offer with a 3-months internship period Stipend during Internship : 15,000/month CTC post-internship : 3.6 LPA Office Location : Hyderabad (Travel required for training programs in colleges) Experience : 01 years Immediate Joining Required Job Overview: We are looking for dynamic and passionate fresher trainers who are eager to make an impact through teaching. If you have excellent communication skills, prior experience in workshops, tutoring, or student mentoring, and a strong foundation in any one technology (e.g., Python, Java, Web Dev, AI/ML, Cloud, Data Science, etc.), we invite you to join our vibrant training team. This role also offers exciting opportunities to upskill and teach new technologies with full support. Key Responsibilities: Conduct training sessions, workshops, and mentoring programs for students or professionals. Deliver engaging and interactive classes both online and offline. Collaborate with senior trainers and curriculum developers to enhance content delivery. Continuously learn new technologies as per industry demand and be ready to teach them. Track student performance and provide feedback for improvement. Support in developing training materials, assignments, quizzes, and project-based learning. Maintain a positive and motivating learning environment. Required Skills & Attributes: Excellent communication and soft skills (verbal and written). A passion for teaching and mentoring students. Prior experience in conducting sessions/workshops/tutoring (college-level, internships, volunteering, etc.). Strong knowledge in at least one of the following: Programming & DSA (Python, Java, C/C++) Web Development (HTML, CSS, JS, React, etc.) Data Science / AI / ML Cloud Computing / AWS / DevOps Cybersecurity / Ethical Hacking Quick learner with a growth mindset. Open to learning new technologies and tools as required. Ability to simplify complex topics for beginner learners. Preferred Qualifications: Master’s/ bachelor's degree in engineering, Computer Science, IT, or a related field. Exposure to public speaking, volunteering as a teaching assistant, or leading student communities is a plus. Certifications (if any) are a bonus but not mandatory. What We Offer: Structured training and mentorship to grow as a professional trainer. Opportunity to work on live projects, bootcamps, and industrial workshops. Continuous learning environment with access to latest tools and content. A collaborative and supportive work culture. Rapid career growth for top performers. If you're passionate about teaching, eager to learn, and want to make a real impact—apply now! - radha.c@fixityedx.com

Posted 2 weeks ago

Apply

3.0 - 5.0 years

0 Lacs

Lucknow

Work from Office

Key responsibilities Design and deliver instructor-led training on Cyber Security & Networking concepts. Create, update, and maintain training content, lab exercises, and case studies aligned with current industry standards. Provide practical exposure through real-world simulations, labs, and tools (e.g., Wireshark, Kali Linux, Metasploit, Cisco Packet Tracer, etc.). Conduct pre and post-assessments, doubt-clearing sessions, and track learner progress. Tailor sessions based on audiencefreshers, professionals, or corporate employees. Stay updated with the latest trends, threats, and tools in the cybersecurity domain. Deliver sessions on weekends or weekdays as per availability Requirements:- Strong knowledge of: Cyber Security Fundamentals (CIA triad, types of attacks, threat vectors) Network Security (firewalls, IDS/IPS, VPNs) Ethical Hacking & Penetration Testing Risk Assessment, Compliance & Governance Networking Protocols (TCP/IP, DNS, DHCP, etc.) Hands-on with tools like Nmap, Burp Suite, Wireshark, Nessus, Metasploit, Snort. Familiarity with certifications like CEH, CISSP, CompTIA Security+, CCNA is a plus. Excellent communication, presentation, and interpersonal skills. Prior training experience is mandatory.

Posted 2 weeks ago

Apply

1.0 - 8.0 years

3 - 10 Lacs

Pune

Work from Office

Static/dynamic testing of mobile applications, Vulnerability Assessment, Penetration Testing, Cyber Security Assessment & Consulting. Secure Code Review, Web Application Security Testing, Firewall Rule Audit, Secure Configuration Review, Wireless Penetration Testing.

Posted 2 weeks ago

Apply

11.0 - 15.0 years

35 - 40 Lacs

Pune

Work from Office

JD:- Application Security Lead Education Criteria (Must): B.Sc (IT/CS) / B.Tech in any Engineering background, BCA, MCA & M.Sc. Information Technology, or related field. CEH, CISSP, CISA, CISM, CRISC (If any security related certification) 11-15 years of experience in Application Security, Network Security, and IT Risk & Compliance, with hands-on expertise in security assessments, process audits, and application reviews. Experience in BFSI is preferred. Lead and manage the AppSec team consisting of L1 and L2 resources. Serve as the primary point of contact between the Client and the team for all project-related activities. Monitor daily operations, ensure resource optimization, and address any issues that arise during the engagement. Application & Security Review - Oversee the review of application security including web, mobile, API, and other banking applications. Perform comprehensive reviews of Network Architecture, Source Code, VAPT reports, and configuration audits. Review deliverables from L1 and L2 resources, ensuring completeness and quality. Compliance and Risk Management Reporting Stakeholder Management Skill-Vulnerability Assessment, Manual Penetration Testing using OWASP checklists, Penetration Testing, OWASP Top 10, OWASP ZAP, Ethical Hacking, Static/dynamic testing of mobile applications, Vulnerability Mitigation.

Posted 2 weeks ago

Apply

5.0 - 10.0 years

7 - 12 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Skill Set : VAPT, OS Hardening, Ethical Hacking, SIEM, DLP, IAM, IRM Experience : 5+ Years Location : India/US Develop and implement strategic plans to achieve organizational goals and objectives. Lead and mentor teams, fostering collaboration, accountability, and high performance. Analyze business operations, identify areas for improvement, and recommend solutions. Oversee budgeting, financial analysis, and resource allocation to optimize operational efficiency. Monitor key performance indicators (KPIs) to ensure alignment with company goals. Build and maintain relationships with key stakeholders, partners, and clients. Ensure compliance with industry standards, regulations, and company policies. Drive innovation and process improvements to maintain competitive advantage.

Posted 2 weeks ago

Apply

2.0 - 7.0 years

9 - 13 Lacs

Mumbai

Work from Office

As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. * Responsible for security researcher to provide insight and understanding of new and existing information security threats * Responsible to participate in recommending improvements to SOC security process, procedures, policies, security incident management and vulnerability management processes * You will be involved in evaluating, recommending, implementing, and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems * Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements * Work in a 24x7 Security Operation Centre (SOC) environment Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * Minimum 2+ years’ experience in SIEM. * Proven expertise in handling the daily monitoring of Information Security events on the QRadar / ArcSight / Splunk console platform * Proficient in monitoring security events from various SOC channels (SIEM, Tickets, Email and Phone), based on the security event severity to handle the service support teams, tier2 information security specialists * Expertise in threat modelling and Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach. Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications

Posted 2 weeks ago

Apply

3.0 - 7.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 4 plus years of experience Application Security TestingExperience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding PracticesKnowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat ModellingAbility to conduct threat modelling sessions to identify and mitigate security risks Preferred technical and professional experience Vulnerability AssessmentExperience in conducting vulnerability assessments and penetration testing Application Security TestingExperience with static and dynamic application security testing (SAST/DAST) tools. Security ToolsProficiency in using security tools like Burp Suite, Nessus, or Fortify

Posted 2 weeks ago

Apply

3.0 - 8.0 years

3 - 12 Lacs

Pune

Work from Office

Responsibilities: Deliver structured training sessions (online or in-person) based on the provided 4-month CEH-aligned syllabus Teach tools such as Nmap, Burp Suite, Metasploit, Wireshark, SQLMap, John the Ripper, Aircrack-ng, etc.

Posted 2 weeks ago

Apply

3.0 - 6.0 years

4 - 7 Lacs

Kochi

Work from Office

Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Main Responsibilities Tier 1 SOC analysts are incident responders, remediating serious attacks escalated, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity and suspicious activities, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when new threats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Other responsibilities and additional duties as assigned by the security management team or service delivery manager Requirements: Min 1 Years Experience as SOC Analyst (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows. Excellent written and verbal communication skills Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting

Posted 2 weeks ago

Apply

3.0 - 6.0 years

4 - 6 Lacs

Kochi

Work from Office

Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Main Responsibilities Tier 2 SOC analysts are incident responders, remediating serious attacks escalated from Tier 1, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity and suspicious activities, escalate to managed service support teams, tier 3 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when new threats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Other responsibilities and additional duties as assigned by the security management team or service delivery manager Requirements: Min 3 Years Experience as SOC Analyst (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows. Excellent written and verbal communication skills Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting

Posted 2 weeks ago

Apply

3.0 - 6.0 years

4 - 6 Lacs

Kochi

Work from Office

Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Main Responsibilities Tier 2 SOC analysts are incident responders, remediating serious attacks escalated from Tier 1, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity and suspicious activities, escalate to managed service support teams, tier 3 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when new threats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Other responsibilities and additional duties as assigned by the security management team or service delivery manager Requirements: Min 3 Years Experience as SOC Analyst (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows. Excellent written and verbal communication skills Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting.

Posted 2 weeks ago

Apply

4.0 - 8.0 years

0 Lacs

noida, uttar pradesh

On-site

KPMG entities in India are professional services firm(s) affiliated with KPMG International Limited, established in August 1993. Our professionals leverage the global network of firms, understanding local laws, regulations, markets, and competition. With offices across India, in cities like Ahmedabad, Bengaluru, Mumbai, and more, we offer services to national and international clients across various sectors. Our focus is on delivering rapid, performance-based, industry-focused, and technology-enabled services, showcasing our understanding of global and local industries and the Indian business environment. As a Security Code Reviewer at KPMG in India, your primary responsibilities will include performing manual security code reviews for common programming languages such as Java and .NET. You will also be tasked with conducting automated testing of running applications and static code using tools like SAST and DAST. Additionally, you will be required to perform manual application penetration tests on various platforms like web applications, internal applications, APIs, and networks to identify and exploit vulnerabilities. The ideal candidate should have at least 6 months of formal programming experience in Java or C#, and possess 4 to 8 years of overall experience in the field. It would be advantageous to have one or more major ethical hacking certifications such as GWAPT, CREST, OSCP, OSWE, or OSWA. Providing technical leadership and guidance to team members, communicating effectively with both technical and non-technical audiences, and collaborating with Cyber teams to develop new testing techniques are also key aspects of this role. Moreover, having a minimum of three years of recent experience working with security testing tools like AppScan, NetsSparker, Acunetix, Checkmarx, BurpSuite, and others will be beneficial. This position offers equal employment opportunities and encourages individuals with a passion for cybersecurity to apply and contribute to our dynamic team at KPMG in India.,

Posted 3 weeks ago

Apply

4.0 - 8.0 years

0 Lacs

vadodara, gujarat

On-site

As a Senior Technical Recruiter at VikingCloud, you will be a key player in our dynamic team, focusing on elevating your recruitment career. VikingCloud is a leading Predict-to-Prevent cybersecurity and compliance company that provides businesses with a comprehensive solution to make informed, predictive, and cost-effective risk mitigation decisions faster. Our platform, Asgard, monitors and analyzes over 6 billion online events daily to ensure our 4+ million customers stay ahead of cybersecurity and compliance disruptions. In this role, you will be responsible for sourcing, screening, and selecting top-tier talent in IT roles, including VMware, DevOps, Ethical Hackers, NOC Engineers, and Desktop Engineers. Your expertise in IT infrastructure hiring will be crucial in assessing candidates" technical skills and ensuring a seamless recruitment process. Key Responsibilities: - Talent Sourcing: Proactively source candidates through job boards, social media, networking, and referrals. - Candidate Screening: Conduct initial assessments to evaluate technical and soft skills, experience, and organizational fit. - Interview Coordination: Schedule interviews between candidates and hiring managers for a smooth process. - Candidate Relationship Management: Build strong relationships with candidates to provide a positive experience. - Offer Management: Facilitate offer discussions, manage negotiations, and ensure smooth onboarding. - IT Hiring Expertise: Assess candidates" technical skills in VMware, DevOps, Ethical Hacking, NOC engineering, and Desktop Engineering. - Compliance and Documentation: Ensure legal and company policy compliance in recruitment activities. - Market Insights: Stay updated on industry trends for informed recruitment strategies. - Team Collaboration: Work closely with managers and HR teams to develop effective recruitment plans. - Employer Branding: Promote the company's brand through candidate engagement and culture representation. Qualifications: - Experience: 4 to 8 years in corporate recruiting, particularly in IT infrastructure hiring. - Technical Knowledge: Strong understanding of IT technical skills and roles. - Communication Skills: Excellent verbal and written communication to engage effectively. - Interpersonal Skills: Strong relationship-building skills with diverse teams. - Organization: Detail-oriented with strong time management skills. - Problem-Solving: Ability to address challenges and achieve recruitment goals. - Ethics and Integrity: Maintain professionalism, ethics, and integrity in all activities. VikingCloud is an equal opportunities employer, and we look forward to welcoming candidates with PAN India Corporate hiring experience to join our team.,

Posted 3 weeks ago

Apply

3.0 - 6.0 years

3 - 7 Lacs

Gurugram

Work from Office

This role involves the development and application of engineering practice and knowledge in designing, managing and improving the processes for Industrial operations, including procurement, supply chain and facilities engineering and maintenance of the facilities. Project and change management of industrial transformations are also included in this role. - Grade Specific Focus on Industrial Operations Engineering. Develops competency in own area of expertise. Shares expertise and provides guidance and support to others. Interprets clients needs. Completes own role independently or with minimum supervision. Identifies problems and relevant issues in straight forward situations and generates solutions. Contributes in teamwork and interacts with customers. Skills (competencies)

Posted 3 weeks ago

Apply

3.0 - 4.0 years

7 - 11 Lacs

Chennai, India

Work from Office

Hello Visionary! We empower our people to stay resilient and relevant in a constantly changing world. We’re looking for people who are always searching for creative ways to grow and learn. People who want to make a real impact, now and in the future. Does that sound like youThen it seems like you’d make a great addition to our vibrant team. We are looking for a Penetration Tester. This position is available for Chennai Location. You’ll make a difference by: Having experience in performing advanced penetration testing on networks, web & mobile applications, and systems. Having ability to Identify vulnerabilities, exploit weaknesses, and assess the security posture of various assets. Having ability to develop and maintain automated testing tools and scripts. Creating detailed reports outlining findings, risks, and recommended actions. Having Extensive experience in penetration testing, vulnerability assessment, and ethical hacking. Having Proficiency with penetration testing tools such as Metasploit, Burp Suite, Nmap, Nessus, and others. Strong understanding of network protocols, web and mobile applications, and operating systems. Maintaining documentation of testing methodologies, tools, and processes. Knowledge of scripting and programming languages (e.g., Python, Bash). You’ll win us over by: Having An engineering degree B.E/B.Tech/M.E/M.Tech with good academic record. 3-4 Years of relevant experience as Penetration Tester. Having Good command over English language (spoken & written) is non-negotiable. Working closely with business partners to understand their needs and translate them into technical requirements. Communicating findings, risks, and remediation strategies to both technical and non-technical stakeholders. Foster strong relationships with business units to ensure security measures align with business goals. Certification Preferred: Entry level certifications like CEH, eJPT, eWPT. Other certifications like eWPTX, OSCP is an advantage. We’ll support you with: Hybrid working Opportunities. Diverse and inclusive culture. Great variety of learning & development opportunities. Join us and be yourself! We value your unique identity and perspective, recognizing that our strength comes from the diverse backgrounds, experiences, and thoughts of our team members. We are fully committed to providing equitable opportunities and building a workplace that reflects the diversity of society. We also support you in your personal and professional journey by providing resources to help you thrive. Come bring your authentic self and create a better tomorrow with us. Make your mark in our exciting world at Siemens. This role is based in Chennai and is an Individual contributor role. You might be required to visit other locations within India and outside. In return, you'll get the chance to work with teams impacting - and the shape of things to come. We're Siemens. A collection of over 319,000 minds building the future, one day at a time in over 200 countries. Find out more about Siemens careers at

Posted 3 weeks ago

Apply

0.0 - 3.0 years

1 - 4 Lacs

Malappuram

Work from Office

RedTeam Hacker Academy seeks a skilled Cyber Security Trainer to deliver hands-on training in CEH, CPENT, CySA+, and more. Must have strong tech skills, certifications, and a passion for teaching. Online/offline sessions + mentoring responsibilities.

Posted 3 weeks ago

Apply

3.0 - 6.0 years

4 - 9 Lacs

Gurugram

Work from Office

Position - Ethical Hacker (Penetration Tester / Cybersecurity Analyst) Location: Gurgaon (onsite) Job Type: Full-Time Department: Cybersecurity / Information Security Job Summary We are seeking a skilled and motivated Ethical Hacker to join our cybersecurity team. As an Ethical Hacker, you will be responsible for identifying security vulnerabilities in systems, networks, and applications by simulating cyberattacks in a controlled and lawful manner. Your insights and recommendations will play a key role in strengthening our organizations security posture. Key Responsibilities: Conduct penetration testing on web applications, networks, systems, APIs, and mobile platforms. Identify and document security vulnerabilities, exploits, and misconfigurations. Use a variety of tools and techniques (manual and automated) to simulate real-world cyberattacks. Provide detailed reports and presentations to technical and non-technical stakeholders. Recommend and verify remediation strategies for identified vulnerabilities. Collaborate with developers, IT teams, and other stakeholders to improve security defenses. Stay current on cybersecurity trends, zero-day exploits, and new ethical hacking methodologies. Assist in compliance audits (e.g., ISO 27001, PCI-DSS, SOC 2). Participate in red teaming, blue teaming, and purple teaming exercises if applicable. Required Skills & Qualifications: Proven experience in penetration testing, vulnerability assessment, or related cybersecurity roles. Proficiency in tools such as Metasploit, Burp Suite, Nmap, Nessus, Wireshark, and others. Strong understanding of operating systems (Windows, Linux), networking, and web technologies. Familiarity with programming/scripting languages like Python, Bash, JavaScript, or PowerShell. Deep knowledge of OWASP Top 10, CVE, CVSS, and secure coding practices. Preferred Certifications CEH (Certified Ethical Hacker) OSCP (Offensive Security Certified Professional)

Posted 3 weeks ago

Apply

6.0 - 11.0 years

9 - 14 Lacs

New Delhi, Hyderabad

Work from Office

Company Name- CIPL (www.cipl.org.in) We have opening for our one government client Ministry of Home Affairs. Client Name- I4C (Indian Cybercrime Coordination Centre) Designation- Cybercrime Threat Intelligence Analyst - Hyderabad , Vacancy -1 Cybercrime Investigator/ Cyber Crime Investigation Researcher - Delhi , Vacancy- 2 Detect emerging Cybercrime threats based upon analysis, data feeds crime reporting and sources (internal & external intelligence sources). Working within the team and the wider Inf-ormation Security group to build new tools for intelligence gathering. * Knowledge of innovative technologies like block-chain, Artificial Intelligence/Machine Learning, IOT Security, Cloud Security will be an added advantage. * Knowledge of cryptography protocols. * Ability to derive intelligence out of data and reports generated and ability to conduct research in that direction and development of tools to handle such threats and overcome such risks. * Building and maintaining senior management dashboards to provide a clear understanding of team activities and threat landscape. * Identify and suggest appropriate infrastructure with suitable mitigation strategies for cyber crime * Evaluate target systems to analyze results of scans, identify and recommend resolutions * Producing periodic Cybercrime threat analysis reports with mitigation measures. * Programming skills with proficiency in one or more of the following, Python, Java, C++. * Excellent knowledge of digital hardware, computer programming, cyber security practices, databases & operating systems artifacts. * Review unlawful and suspicious content in open source and escalate violations to the appropriate govt. department. * Collect, organize, analyze and develop reliable actionable intelligence about cybercrime, criminals, criminal infrastructure from open sources. Must have advanced understanding of how to use open-source including social media for intelligence. * Ability to draft Sop's/ RFP/ Advisory Manuals/ Reports pertaining to Cyber Security/Inf-ormation Security/Cybercrime Investigation. * Proven ability to work both independently and as a team and present/develop ideas. * Ability to work effectively with technical and non-technical stakeholders. * Ability to communicate (verbal and written) with stakeholders in non-technical terms. * Experience with multiple social media platf-orms. * Using data from social media, open sources, search engines, public records, and the deep web to compile detailed reports on cybercrime, criminals and criminal infrastructure.

Posted 3 weeks ago

Apply

4.0 - 9.0 years

24 - 96 Lacs

Bengaluru

Work from Office

Responsibilities: * Conduct regular vulnerability assessments & penetration tests. * Develop cybersecurity strategy & policies. * Collaborate with IT teams on risk management. * Implement threat detection & response measures.

Posted 3 weeks ago

Apply

1.0 - 5.0 years

5 - 8 Lacs

Pune

Work from Office

Key Role Deliverables: Facilitating ISO and SOC 2 corporate-wide examinations Assisting special compliance and audit related projects as assigned Assisting internal VAPT audits and sharing the reports with the management Planning and conducting testing to confirm continuous efficiency and effectiveness of information system controls Understanding the business and IT infrastructure including applications and servers through interactions and walkthrough Managing and measuring the IT Security Framework and developing and maintaining a technology risk assessment program for business applications and processes Collecting information and reviewing information systems policies, standards and procedures to verify that they address the organization's internal and external requirements and to identify information systems control deficiencies Performing a root cause analysis of the various risks/ incidents identified and development of solutions to mitigate the risks and the flow of data and information and performing a threat and risk analysis of each process Assisting with development and implementation of corporate compliance procedures and controls Keeping the department updated with the latest technological changes and cybersecurity advancements Reviewing of Business Impact Analysis, Risk Assessment, Current State Network assessment and Recovery Strategy Analysis Prerequisites: Attention to detail Good understanding of IT and network security Experience of working in cyber security risk management preferred Excellent time management skills preferred Ability to work well under pressure with tight deadlines while delivering high quality and output Experience 0-2 years Education BE/ B.Tech or equivalent specialization in IT are preferred One or more of the following information security certifications or advanced degree in information security/cybersecurity: CISSP/SSCP/CISM/CRSC/CISA/HISP or equivalent CEH V11 or other equivalent Ethical Hacker degree is preferable

Posted 3 weeks ago

Apply

8.0 - 12.0 years

0 Lacs

haryana

On-site

You will be working at Retrotech Business Solutions, a prominent provider of high-quality, refurbished IT assets distributed worldwide. The company's core values revolve around sustainability and environmental responsibility, making a significant impact through the refurbishment and resale of IT assets, rather than their disposal. With 8-10 years of experience, you will be offered a competitive salary package, with no limitations for the right candidate. The work shift is aligned with US timings from 05:30 PM to 02:30 AM IST, offering an on-site, full-time opportunity. Your primary responsibilities will include expertise in Asp.NET, Angular js, multiple databases (MongoDB, MySQL, NoSQL), website designing, development, and deployment. Proficiency in JavaScript frameworks like Angular, hands-on experience with AI tools, and knowledge of Ethical Hacking are essential. You will also be working as a full-stack developer handling both frontend and backend aspects. Your role demands a deep technical understanding of modern software development, a commitment to quality software processes, and best practices. A fervor for technology and digital transformation, coupled with an innovative mindset and problem-solving skills, will be critical for your success at Retrotech. Retrotech offers a unique benefits package, ensuring a conducive work environment. You will experience a fast-paced work culture with 5 working days, excluding the Last Saturday for Training and Development. Recognition, personal development programs, health insurance, work-life balance, international exposure, and equal opportunity & diversity inclusion are some of the key highlights of the benefits provided. Moreover, you can expect significant growth opportunities within the organization. Retrotech fosters a culture of inclusivity and diversity, where your talent will be nurtured. Regular catchups with your manager as your career coach will guide you towards achieving your career goals and aspirations effectively.,

Posted 3 weeks ago

Apply

2.0 - 6.0 years

0 Lacs

ahmedabad, gujarat

On-site

Job Title: Assistant Professor/Lecturer IMS & Cyber Security Company: Arrivo Edu Pvt. Ltd. Location: Ahmedabad, Gujarat Job Type: Full-Time Job Description: We are seeking a Assistant Professor/Lecturer in IMS & Cyber Security to teach, mentor students in the field of networking, Server Operating Systems, Firewall, Scripting, Ethical Hacking, Cyber Security. Responsibilities: Deliver engaging lectures and hands-on training. Guide students in projects and research work. Collaborate with industry and academic teams. Qualifications: Masters in IT, or related field. Teaching or industry experience in IMS & Cyber Security. Strong knowledge of network security, ethical hacking. Relevant certifications (CEH, CCNA, etc.) preferred. Benefits: Competitive salary and perks. Professional development. Access to latest technology and resources. Apply Now: Send your resume/CV to roshanivyas@arrivoedu.com with the subject Application for Lecturer IMS & Cyber Security. Website: https://arrivoedu.com/,

Posted 3 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

maharashtra

On-site

JOB DESCRIPTION About KPMG in India KPMG entities in India are professional services firm(s). These Indian member firms are affiliated with KPMG International Limited. KPMG was established in India in August 1993. Our professionals leverage the global network of firms, and are conversant with local laws, regulations, markets and competition. KPMG has offices across India in Ahmedabad, Bengaluru, Chandigarh, Chennai, Gurugram, Jaipur, Hyderabad, Jaipur, Kochi, Kolkata, Mumbai, Noida, Pune, Vadodara and Vijayawada. KPMG entities in India offer services to national and international clients in India across sectors. We strive to provide rapid, performance-based, industry-focused and technology-enabled services, which reflect a shared knowledge of global and local industries and our experience of the Indian business environment. i. BE/B. TECH/BCA/B.SC/M.SC/MCA/M. Tech-(Computers/Electronics/IT) ii. Minimum one certification such as CEH/OSCP and/or equivalent. iii. Having at least 5+ years of post-qualification relevant work experience including appearance before court of law while presenting the extracted cyber evidence. iv. Experience in all kinds of digital forensic work- Computer, macbook, Mobile, Cloud APIs, CCTV and AV, Database, Network etc including reporting v. Experience in analysis of malware, incident response, email and log analysis, threat modeling and assessments vi. Experience in Ethical Hacking, VAPT, OSINT etc. vii. Experience in handling cyber- crime cases, website defacement, email and VOIP analysis, image and video forensic viii. Dynamic and Static Malware analysis QUALIFICATIONS Graduation from premier institutes is preferred. Proficiency in Marathi language is must. Knowledge of IT Act, DPDP Act, CrPC, IPC, etc, laws is preferred,

Posted 3 weeks ago

Apply

1.0 - 6.0 years

2 - 6 Lacs

Hyderabad

Work from Office

Responsibilities: * Train teams on cyber security best practices * Conduct regular threat hunting exercises * Develop & deliver CEH-certified training programs * Collaborate with IT department on incident response plans

Posted 3 weeks ago

Apply

0.0 - 1.0 years

1 - 3 Lacs

Chennai

Work from Office

We are seeking a qualified and passionate Assistant Professor in the field of Information Security and Digital Forensics. This full-time faculty role involves a dynamic mix of teaching, research, mentoring, and academic leadership, aimed at equipping students with cutting-edge knowledge and practical skills in the cybersecurity and digital forensics domains. Key Responsibilities: 1) Teaching & Curriculum Development 2) Design and deliver engaging lectures in Information Security and Digital Forensics. 3) Develop and continuously update curriculum to align with current industry standards and emerging technologies. 4) Supervise undergraduate and postgraduate student projects and theses. 5) Research & Innovation 6) Student Mentorship & Engagement 7) Mentor and guide students academically and professionally. 8) Organize and lead weekly training programs and workshops in information security and digital forensics at HQ. Industry Tools & Technologies Maintain proficiency in and teach the use of modern digital forensics and cybersecurity tools, including: FTK, EnCase, Cellebrite, XRY (Forensics) VA/PT tools, Nmap, Splunk (Security assessment and monitoring) Continuous Learning & Contribution Stay current with advancements in the field and integrate emerging trends and tools into teaching and research activities. Participate in academic committees, accreditation processes, and departmental development initiatives.

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies