Jobs
Interviews

150 Ethical Hacking Jobs - Page 3

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 - 8.0 years

9 - 14 Lacs

Bangalore Rural, Bengaluru, Delhi / NCR

Work from Office

Position 1: Web and Network PT Consultant Proposed designation Consultant Role type Individual contributor Reporting to Work timings 12 PM to 9 PM Roles & responsibilities • Perform manual application penetration tests on one or more of the following to discover and exploit vulnerabilities: web applications, internal applications, APIs, internal and external networks, and mobile applications • Plan and execute network penetration testing and Red teaming assessments to simulate real-world attack scenarios. • Perform manual network and application penetration tests on internal network, Active Directory environment, web applications. • Perform social engineering assessment to assess the security awareness and physical security controls of the organization. • Ability to independently research for new vulnerabilities in systems and software and modify and customize tools, known exploits, POCs and scripts to meet operational requirement. • Research and stay up-to-date with the latest attack techniques, tools, and emerging threats. • Present technical reports to clients, explaining the outcomes of the testing and providing detailed insights and recommendations. • Collaborate effectively with cross-functional teams, including developers, IT operations, and business stakeholders to integrate security best practices seamlessly into project workflows. • Provide mentorship and guidance to junior security staff and foster a culture of proactive security awareness within the organization. This role is for you if you have the below • We are seeking an experienced and highly skilled Consultant with over 5+ years of working experience in the field of cybersecurity, including network penetration testing, vulnerability assessment, Active directory testing, phishing assessment and web application penetration testing. The ideal candidate will possess a strong working knowledge of Network protocols, performing OSINT to identify publicly available information and testing and exploiting Microsoft services like Windows Servers, Active directory, Certificate Services. Mandatory technical & functional skills JOB DESCRIPTIONS 2 • Perform manual application penetration tests on one or more of the following to discover and exploit vulnerabilities: web applications, internal applications, APIs, internal and external networks, and mobile applications • 5+ years of professional experience in cybersecurity, with a focus on Network penetration testing and Red teaming. • Strong understanding of Network protocols, web applications, cryptography, various operating systems and security technologies. • Strong understanding of exploitation of Microsoft platform used in enterprise environment such as windows Servers, Active Directory Certificate Service, Azure, etc. • Experience in one or more of the following a plus: Web application penetration testing, mobile application penetration testing application architecture and business logic analysis. • Relevant certifications, such as GWAPT, OSCP, OSEP, CRTP, CRTO, OSWA, are strongly preferred. Other information Interview process: Please expect 2-3 rounds of interview Does the job role involve travelling: No Does the busy season apply to this role: Seasonality of the work is dependent on the projects/ deliverable timelines Working location: Bangalore/Pune/Gurugram

Posted 3 weeks ago

Apply

0.0 - 1.0 years

0 - 2 Lacs

Mumbai, Mumbai Suburban, Navi Mumbai

Work from Office

Create and deliver cyber security awareness training programs. Collaborate with IT security teams to develop and implement effective security policies and procedures, SOP and supporting documents. Timely initiation, management, closure of activities. Required Candidate profile Exp:1+Years Location - Ghansoli Np : Immediate joiner Any Queries- kanchan@peshr.com/9867762401

Posted 3 weeks ago

Apply

3.0 - 7.0 years

15 - 20 Lacs

Hyderabad

Remote

Role & responsibilities IT Security - Monitor and analyze security alerts / logs and information, escalating as needed. Monitor and control access to secure data and segmented network environments. This individual will be responsible for conducting penetration tests and vulnerability assessments. Configure security devices and tools following management guidelines and vendor specifications. Test proposed security configurations and changes in the IT Security laboratory. Analyze, respond to, and lead security incidents, including Application and Network attempted and realized breaches. Conduct regular security vulnerability scans of wired & wireless network infrastructure and data. Recommend IT Security solutions as needed. Disaster Recovery - Assist the DR team in the DR process as needed. Provide IT Security support to the DR team as needed. Participate in quarterly DR tests. Reporting - Monitor, gather and report on IT Security related incidents and provide regular activity reports. Report on the status of Remediation work related to the implementation, change, retirement or upgrade of IT Security and DR controls and processes.

Posted 3 weeks ago

Apply

2.0 - 6.0 years

3 - 4 Lacs

Bareilly, Moradabad

Work from Office

Location: Bareilly & Moradabad Division Key Responsibilities: Conduct interactive training sessions on Cyber Security fundamentals, online safety, digital hygiene, and responsible internet usage for school and college students. Develop and deliver workshops on topics like cyber threats, phishing, password security, social media safety, and digital footprint management . Customize content and modules based on students' age groups and institutional needs. Use engaging training methods such as case studies, simulations, real-life examples, multimedia presentations, and hands-on demonstrations. Travel to assigned schools and colleges as per the training calendar. Prepare training reports, attendance records, and feedback summaries. Coordinate with institutional authorities for scheduling, permissions, and feedback. Represent GLA University professionally and promote cyber safety awareness in every session. Requirements: Graduate/Postgraduate in Computer Science, IT, Cyber Security, or a related field. Certifications in Cyber Security (e.g., CEH, CompTIA Security+, CISSP) will be an advantage. 2-6 years of experience in conducting Cyber Security awareness workshops or training for students. Strong communication skills in English and Hindi. Ability to explain complex topics in a simple, relatable way for young learners. Confident, energetic, and willing to travel extensively across cities. Good documentation and reporting skills.

Posted 3 weeks ago

Apply

1.0 - 4.0 years

4 - 9 Lacs

Noida

Work from Office

Perform vulnerability assessments and penetration testing Implement security standards and compliance practices Monitor networks for security breaches and threats Requirement: Certified Ethical Hacker (CEH)

Posted 3 weeks ago

Apply

0.0 - 1.0 years

0 Lacs

Hyderabad

Work from Office

Job Overview: We are looking for dynamic and passionate fresher trainers who are eager to make an impact through teaching. If you have excellent communication skills, prior experience in workshops, tutoring, or student mentoring, and a strong foundation in any one technology (e.g., Python, Java, Web Dev, AI/ML, Cloud, Data Science, etc.), we invite you to join our vibrant training team. This role also offers exciting opportunities to upskill and teach new technologies with full support. Key Responsibilities: Conduct training sessions, workshops, and mentoring programs for students or professionals. Deliver engaging and interactive classes both online and offline. Collaborate with senior trainers and curriculum developers to enhance content delivery. Continuously learn new technologies as per industry demand and be ready to teach them. Track student performance and provide feedback for improvement. Support in developing training materials, assignments, quizzes, and project-based learning. Maintain a positive and motivating learning environment. Required Skills & Attributes: Excellent communication and soft skills (verbal and written). A passion for teaching and mentoring students. Prior experience in conducting sessions/workshops/tutoring (college-level, internships, volunteering, etc.). Strong knowledge in at least one of the following: Programming & DSA (Python, Java, C/C++) Web Development (HTML, CSS, JS, React, etc.) Data Science / AI / ML Cloud Computing / AWS / DevOps Cybersecurity / Ethical Hacking Quick learner with a growth mindset. Open to learning new technologies and tools as required. Ability to simplify complex topics for beginner learners. Preferred Qualifications: Masters/ bachelor's degree in engineering, Computer Science, IT, or a related field. Exposure to public speaking, volunteering as a teaching assistant, or leading student communities is a plus. Certifications (if any) are a bonus but not mandatory. What We Offer: Structured training and mentorship to grow as a professional trainer. Opportunity to work on live projects, bootcamps, and industrial workshops. Continuous learning environment with access to latest tools and content. A collaborative and supportive work culture. Rapid career growth for top performers. If you're passionate about teaching, eager to learn, and want to make a real impact apply now! - radha.c@fixityedx.com

Posted 4 weeks ago

Apply

2.0 - 5.0 years

10 - 14 Lacs

Pune

Work from Office

About The Role Exciting opportunity for an experienced Security Incident Responder to join our IT Security team in Pune. Take a key role in driving success by enabling a seamless, global security incident response capability. This is a full-time, on-site position based in our Baner office. About You You have a curious mindset and are highly passionate about security engineering and the evolving role of AI in this domain. You also have: - Experience between 2 to 5 years working as a SOC Analyst, Incident Responder or Detection Engineer. - Knowledge applications of security frameworks DFIR, Cyber Kill Chain, MITRE ATT&CK. - Confidence and the ability to remain calm under pressure. It would be beneficial if you possess: - Understanding of software development practices, DevSecOps, enterprise security tools. - Knowledge Artificial Intelligence utilization within the Incident management process. - Awareness of regulatory environment and requirements (e.g. GDPR) - Experience securing cloud-based services (preferably hosted in AWS or Microsoft Azure cloud environments), combined with insight into vulnerability management and scanning tools. - Knowledge of techniques to tune SIEMs, threat hunting, and implementing security best practices. - Security qualifications e.g. GIAC Certifications, AWS, Azure, CEH, OSCP. Key Responsibilities - Act as Incident Commander, coordinating security incident response across teams and time zones, ensuring seamless handoffs. - Collaborate with in-house analysts and MDR partners for timely detection, alerting, and monitoring of security events. - Manage and triage security alerts, document incidents, and maintain detailed reports. - Develop, maintain, and test Incident Response playbooks while driving process and capability improvements. - Design use cases for automation and AI to enhance incident management speed and efficiency. - Review and optimize security platform configurations, ensuring compliance, stability, and alignment with IT best practices. Benefits and Perks Join us for a rewarding career with competitive compensation, leave entitlements, health coverage, and financial security. Enjoy work-life balance, growth, and recognition for your exceptional performance. Our team will unveil the intricacies of our benefit package during the selection process. Company Overview Hansen Technologies (ASX: HSN) is a global software and services provider, serving energy, water/utilities, and telecommunications industries. With customers in 80+ countries, we foster collaboration across 36 global offices. From 5G advancements to renewable energy transitions, we empower customers to overcome challenges, innovate, and drive new business models.

Posted 4 weeks ago

Apply

8.0 - 11.0 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Dear Candidate, We are hiring an engineer focused on API security to protect data and ensure secure service interaction. Key Responsibilities: Perform API threat modeling. Implement rate limiting, token validation, and encryption. Conduct audits and penetration tests. Required Skills & Qualifications: Familiarity with OAuth2, OpenID, mTLS. Hands-on with API gateways and security tools. Strong knowledge of secure coding principles. Soft Skills: Strong troubleshooting and problem-solving skills. Ability to work independently and in a team. Excellent communication and documentation skills. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies

Posted 4 weeks ago

Apply

8.0 - 11.0 years

35 - 37 Lacs

Kolkata, Ahmedabad, Bengaluru

Work from Office

Dear Candidate, Seeking a Security Automation Engineer to automate detection and remediation of threats. Key Responsibilities: Build SOAR workflows and automated playbooks. Monitor logs and alerts using SIEM tools. Respond to security incidents and conduct root cause analysis. Required Skills & Qualifications: Experience with tools like Splunk, XSOAR, Sentinel. Scripting in Python or Bash. Familiar with SOC and threat intel operations. Note: If interested, please share your updated resume and preferred time for a discussion. If shortlisted, our HR team will contact you. Kandi Srinivasa Reddy Delivery Manager Integra Technologies

Posted 4 weeks ago

Apply

1.0 - 3.0 years

3 - 5 Lacs

Bengaluru

Work from Office

Responsibilities: Design and deliver technical training programs Collaborate with stakeholders on curriculum development Conduct hands-on exercises and assessments Maintain up-to-date knowledge of emerging technologies

Posted 4 weeks ago

Apply

0.0 - 1.0 years

2 - 3 Lacs

Gadchiroli

Work from Office

[{"Salary":null , "Posting_Title":"Trainer - Cyber Security" , "Is_Locked":false , "City":"Gadchiroli" , "Industry":"NGO / Social Services","Job_Description":" Handling students virtually and training and developing skills to be job ready for cybersecurity space. Provide cyber training at an intermediate level for software Engineering/Software development personnel. Preparing Study materials for training students via a variety of training methods for improving training deliveries. Handling student queries effectively and efficiently. Maintain training related to MIS (attendance, feedback forms evaluation scores and certificate issued). Conduct training sessions on cybersecurity fundamentals, ethical hacking, network security, malware analysis, and related topics. Stay updated with the latest cybersecurity trends, threats, and best practices. Conduct workshops and awareness sessions on cybersecurity Requirements Bachelor/Master degree in Cyber Security, Information Technology Computer Science, or a related field. Strong understanding of cybersecurity principles, network security, ethical hacking, firewalls, and intrusion detection systems. Hands-on experience with security tools, penetration testing, and vulnerability assessments. Good communication, presentation, and training skills. Prior experience in training, mentoring, or teaching is an added advantage.

Posted 4 weeks ago

Apply

1.0 - 5.0 years

5 - 14 Lacs

Mumbai Suburban

Work from Office

Job Summary: We are looking for enthusiastic Cyber Security Engineers with atleast 1 year of experience to join our dynamic team. The ideal candidate should have strong networking skills, extensive experience in Vulnerability Assessment and Penetration Testing (VAPT), and a solid understanding of network architecture, protocols, and security tools and the passion to learn, perfom and grow in the organisation. The role involves conducting in-depth security assessments on network devices and web applications, including the application of fuzzing techniques. Key Responsibilities: Vulnerability Assessment and Penetration Testing (VAPT): Lead and conduct comprehensive VAPT on network devices and web applications to identify and address security vulnerabilities. Network Security Expertise: Apply deep knowledge of network protocols, firewalls, IDS/IPS, and VPNs to ensure robust security across the network. Custom Security Tool Development: Develop and maintain custom security tools and scripts using Python, Bash, or PowerShell to enhance security assessments and automate processes. Network Tools Proficiency: Utilize tools such as Wireshark, Nmap, Nessus, Burp Suite, and others for network analysis and security testing. Security Assessments: Perform thorough security assessments on network devices, ensuring alignment with industry standards and best practices. Protocol Fuzzing Understanding: Apply protocol fuzzing techniques to uncover vulnerabilities in network devices and recommend effective remediation strategies. Communication: Clearly articulate complex security issues to both technical and non-technical stakeholders, ensuring a comprehensive understanding of risks and solutions. Continuous Improvement: Stay updated with the latest cybersecurity trends, threats, and technologies to enhance the organization's security posture. Qualifications: Experience: 1-2 years of relevant experience in cybersecurity, with a focus on networking, VAPT, and security assessments. Technical Skills: Strong networking skills and understanding of network architecture. Proficiency in network protocols, firewalls, IDS/IPS, and VPNs. Advanced programming skills in Python, Bash, or C/C++. Expertise in using network security tools (e.g., Wireshark, Nmap, Nessus, Burp Suite). Certifications: CEH, OSCP, or CRTP certifications are highly desirable. Communication: Excellent verbal and written communication skills, capable of conveying security concepts to diverse audiences. Problem-Solving: Strong analytical and problem-solving abilities, with keen attention to detail. Preferred Skills: Experience in security assessments on network devices. Understanding of web application fuzzing techniques. Ability to work independently and as part of a team. Education: Masters /Bachelors degree in Computer Science, Information Technology, Cyber Security, Electronics, Telecommunication or a related field (or equivalent experience).

Posted 1 month ago

Apply

4.0 - 9.0 years

19 - 32 Lacs

Nashik

Work from Office

exp in Penetration Testing of embedded systems or research related cybersecurity roles. -knowledge in automotive bus and interface systems like CAN, LIN,JTAG, I2C, SPI. Exp in several hacking tools, idially directy usable in embedded automotive

Posted 1 month ago

Apply

4.0 - 9.0 years

19 - 32 Lacs

Nagpur

Work from Office

exp in Penetration Testing of embedded systems or research related cybersecurity roles. -knowledge in automotive bus and interface systems like CAN, LIN,JTAG, I2C, SPI. Exp in several hacking tools, idially directy usable in embedded automotive

Posted 1 month ago

Apply

7.0 - 12.0 years

22 - 35 Lacs

Nashik

Work from Office

Creation of test cases, execution of penetration- fuzz testing together with team on automotive ECU’s & embedded controllers. -Identify weaknesses and vulnerabilities. -Presenting/Reporting of findings of Penetration Tests to authority Required Candidate profile Engineering Graduate. Must have thorough knowledge of Automobile Industry. Ceber Security certification is added advantage. knowledge of Python, CAN, Security Algorithm., decoding security algorithm

Posted 1 month ago

Apply

7.0 - 12.0 years

22 - 35 Lacs

Nagpur

Work from Office

Creation of test cases, execution of penetration- fuzz testing together with team on automotive ECU’s & embedded controllers. -Identify weaknesses and vulnerabilities. -Presenting/Reporting of findings of Penetration Tests to authority Required Candidate profile Engineering Graduate. Must have thorough knowledge of Automobile Industry. Ceber Security certification is added advantage. knowledge of Python, CAN, Security Algorithm., decoding security algorithm

Posted 1 month ago

Apply

7.0 - 12.0 years

22 - 35 Lacs

Sindhudurg

Work from Office

Creation of test cases, execution of penetration- fuzz testing together with team on automotive ECU’s & embedded controllers. -Identify weaknesses and vulnerabilities. -Presenting/Reporting of findings of Penetration Tests to authority Required Candidate profile Engineering Graduate. Must have thorough knowledge of Automobile Industry. Ceber Security certification is added advantage. knowledge of Python, CAN, Security Algorithm., decoding security algorithm

Posted 1 month ago

Apply

7.0 - 12.0 years

22 - 35 Lacs

Pune

Work from Office

Creation of test cases, execution of penetration- fuzz testing together with team on automotive ECU’s & embedded controllers. -Identify weaknesses and vulnerabilities. -Presenting/Reporting of findings of Penetration Tests to authority Required Candidate profile Engineering Graduate. Must have thorough knowledge of Automobile Industry. Ceber Security certification is added advantage. knowledge of Python, CAN, Security Algorithm., decoding security algorithm

Posted 1 month ago

Apply

4.0 - 9.0 years

19 - 32 Lacs

Pune

Work from Office

exp in Penetration Testing of embedded systems or research related cybersecurity roles. -knowledge in automotive bus and interface systems like CAN, LIN,JTAG, I2C, SPI. Exp in several hacking tools, idially directy usable in embedded automotive

Posted 1 month ago

Apply

5.0 - 10.0 years

2 - 7 Lacs

Pune

Work from Office

: Job Title- I&A On-boarding Information Security Analyst, Associate Location- Pune, India Role Description: As I&A On-boarding Information Security Analyst you will be part of Access Lifecycle On-boarding global family which includes access management for application end user recertification On-boarding, user access for request & approval, user provision On-boarding and Functional Taxonomy SoD On-boarding & maintenance as well as IDAHO (Access concept) SME as central DB services. Deutsche Bank is looking for bright and open-minded individuals to support Business Identity & Access Services within Access Lifecycle Solution On-boarding team for application end user request & approval as well as end user access provision central service On-boarding. A key success factor of the Access Lifecycle Solution On-boarding team is the quick understanding of complex application set ups for Identity & Access Management and support Information Security Officer (ISO) and IT Application Owner (ITAO) along end-to-end central solution On-boarding process across DB. You will gain insights into the complete Identity & Access Management lifecycle as you will learn about the roles and entitlements and their set up, segregation of duties, application authentication and authorization process. What well offer you . 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities As I&A On-boarding Information Security Analyst you will be responsible to perform On-boarding assessments if an IT asset is applicable for end user application access for request & approval and business requirement gathering (based on existing KOP ID Admin procedures) to identify, how future user provisioning (ID Admin via automated connector or manual, centrally or decentral managed) will be set up between central request & approval platform and to be on-boarded application in adhering to Information Security (IS) internal and regulatory requirements. Efficiently engage, manage, and influence the main stakeholders, along with application On-boarding process including Information Security Officer, IT Application Owner, Engineering and Operations teams Provide process improvement inputs to various stakeholders involved. Proactively seek ways to improve upon existing practices and processes. Display insight and ability in identifying issues and develop successful solutions. Report and escalate potential risks to the management to help avoid / minimize the impact. Work with multiple, distributed teams (across different locations) Support develops key operational procedures where necessary and ensure adherence to all such defined policies. Comfortable with associated disciplines of Security Policy and Governance in banking domain Very good presentation and communication skills allowing to communicate with our stakeholders. A structured and methodological way of working with the objective to deliver high quality results. Supports tough people decisions to ensure people performance is aligned with organization imperatives and needs. Addresses individual performance issues, where necessary, to drive for high performance. Pro-active and flexible working approach, Team spirit Your skills and experience Minimum 5 years working experience in Identity & Access Management, Governance, Risk and Control related topics. Team management experience Basic knowledge and/or willingness to work with industry best practices and frameworks like ISO27001, NIST, CSA CCM, COBIT, ITIL Good business analyses knowledge of system design, development, implementation, and user support principles and practices Knowledge of IT Service Management or IT Governance or IT Delivery Management or IT Project Management or IT Delivery background or IT Security Knowledge on Database Systems, application interactions and server operating systems Excellent Excel knowledge Competencies: Self-motivated and flexibility to work autonomously in virtual and multicultural teams. Good communication skills (both written and verbal), fluent in English (written/verbal) Good analytical skills and problem-solving abilities Pro-active and flexible working approach A structured and methodological way of working with the objective to deliver high quality results. Flexible mindset with an eye for detail and continuous improvement Good understanding in business related information Being flexible, open minded, able to share information, transfer knowledge and expertise to stakeholders and other team members. How well support you . . . .

Posted 1 month ago

Apply

3.0 - 7.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 5 plus years of experience Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding Practices: Knowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat Modeling: Ability to conduct threat modeling sessions to identify and mitigate security risks Preferred technical and professional experience Vulnerability Assessment: Experience in conducting vulnerability assessments and penetration testing Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST) tools. Security Tools: Proficiency in using security tools like Burp Suite, Nessus, or Fortify

Posted 1 month ago

Apply

4.0 - 7.0 years

10 - 11 Lacs

Mumbai, Nagpur, Thane

Work from Office

EMERSON INNOVATION CENTER is looking for Product Security Engineer to join our dynamic team and embark on a rewarding career journey Analyzing customer needs to determine appropriate solutions for complex technical issues Creating technical diagrams, flowcharts, formulas, and other written documentation to support projects Providing guidance to junior engineers on projects within their areas of expertise Conducting research on new technologies and products in order to recommend improvements to current processes Developing designs for new products or systems based on customer specifications Researching existing technologies to determine how they could be applied in new ways to solve problems Reviewing existing products or concepts to ensure compliance with industry standards, regulations, and company policies Preparing proposals for new projects, identifying potential problems, and proposing solutions Estimating costs and scheduling requirements for projects and evaluating results

Posted 1 month ago

Apply

10.0 - 20.0 years

25 - 40 Lacs

Bengaluru

Work from Office

Job Title: Senior Cyber Defense Operations Analyst Location: Bengaluru, India Experience: 8+ years Job Type: Full-time Department: Cybersecurity / Information Security / SOC Job Summary: We are seeking a highly skilled and experienced Senior Cyber Defense Operations Analyst to join our cybersecurity team in Bengaluru. The ideal candidate will lead and coordinate cyber defense activities, manage incident response efforts, monitor threats, and provide strategic guidance to strengthen our cyber defense posture. This is a hands-on technical and leadership role within a fast-paced, mission-critical environment. Key Responsibilities: Lead day-to-day operations of Cyber Defense including threat detection, response, and mitigation. Manage and mentor a team of SOC analysts and incident responders. Monitor SIEM and other security tools for indications of compromise, suspicious behavior, and known threats. Coordinate and manage high-severity incidents and support root cause analysis and post-incident reviews. Develop and implement advanced threat detection use cases and response playbooks. Work closely with IT, Infrastructure, and AppSec teams to address vulnerabilities and security gaps. Participate in threat hunting and proactive intelligence-driven defense activities. Collaborate with global security teams to align local and enterprise-wide defense strategies. Ensure compliance with internal security policies, industry standards, and regulatory frameworks (e.g., ISO 27001, NIST, GDPR). Regularly review and improve security operations processes and toolsets. Provide executive-level reporting on threat landscape, incident metrics, and defense posture. Required Qualifications: 8+ years of experience in cybersecurity with a strong focus on Security Operations or Cyber Defense. Proven experience with SIEM (e.g., Splunk, QRadar, LogRhythm), EDR (e.g., CrowdStrike, SentinelOne), and SOAR platforms. Strong understanding of MITRE ATT&CK, cyber kill chain, and threat intelligence frameworks. Expertise in incident response, digital forensics, malware analysis, and threat hunting. Familiarity with cloud security (AWS, Azure, or GCP), including monitoring and defending cloud-native environments. Experience with scripting (Python, PowerShell, etc.) for automation and analysis. Strong understanding of TCP/IP, network protocols, and security architectures. Certifications such as CISSP, GCIA, GCIH, CEH, or similar are highly desirable. Preferred Qualifications: Experience working in a global or large-scale enterprise security environment. Knowledge of DevSecOps and integration of security into CI/CD pipelines. Understanding of data privacy regulations relevant to cybersecurity (e.g., GDPR, HIPAA). Leadership experience in managing small-to-mid sized security teams. Benefits: Competitive salary and performance-based bonuses Health and wellness benefits Flexible work hours and hybrid work options Learning and development support (certifications, courses) Opportunity to work with cutting-edge cybersecurity technologies Please share your updated profiles to naseeruddin.khaja@infosharesystems.com

Posted 1 month ago

Apply

3.0 - 8.0 years

1 - 2 Lacs

Greater Noida

Work from Office

Key Responsibilities Performing (Web, mobile, Cloud-based AWS, Azure, etc.), thick-clients business solutions and infrastructure pentest as assigned by the customer Work on full assessment & revalidation cases within customer defined timelines. Handling report creation based on pentest outcome as per customer template Develop new test cases, scenario & able to perform API pentesting. Develops, tests and validates solutions to remediate exploitable conditions on devices such as web servers, mail servers, routers, firewalls and intrusion detection systems | Provide results report and help team to evaluates, codes and implements software fixes (patches) to address system vulnerabilities such as malicious code (e.g., viruses), system exploitation using SQL injection, cross-site scripting, buffer overflows, parameter tampering, hidden field manipulation, cookie poisoning and web services manipulation | Conducts security assessments of systems and applications using penetration tests, ethical hacking tools and risk assessment/mediation methodologies to evaluate vulnerabilities. Perform source code review & configurations reviews against CIS benchmarks and security standard. Participating in end user calls with customer for requirement gathering, explanation of findings, technical discussions. About you Education, qualifications, and certifications Degree / Diploma Holders with good knowledge in pentest domain. Excellent verbal & written communication skills in English language Mandatory skill set Proficiency in Pentest tool such as using Burp suite and Kali Linux. Proficiency in Python and Java, Javascript, and other coding languages. Good experience in performing security penetration testing and vulnerability assessment. Experience in testing diverse infra components including various enterprise platforms such as private clouds, Openshift infra, dockers/container infra etc. Experience in Source code reviews, red team exercises, security architecture configuration reviews, and technical security compliance reviews Knowledge on Web-based applications and services (SOAP/REST) Well versed in writing reports, test cases etc. OSWP/ OSCE certification (preferred), SANS or Certified Penetration Tester, Certified Expert Penetration Tester or GIAC Certified Penetration Tester. Secondary skill set Knowledge on Azure & scripting language. Nice to have knowledge on other hacker tools;Appscan, Fortify, Wireshark, nmap, netcat, ZAP, FireBug, Nessus, John the Ripper. Experience Minimum of 3+ years related work experience in customer facing organizations within Pentest domain.

Posted 1 month ago

Apply

2.0 - 5.0 years

7 - 12 Lacs

Pune

Work from Office

Minimum requirement: Min 3-year experience performing security testing on Industrial control system components like PLCs, SCADA, IIOT devices etc. Equivalent science or engineering degree Min. one professional certifications such as Certified Ethical Hacker (CEH), ISA/IEC 62443, OSCP or certified Penetration Tester preferred.

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies