Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
4.0 - 8.0 years
7 - 17 Lacs
Noida, Delhi
Work from Office
Conduct comprehensive penetration testing of networks, web applications, mobile applications, and other systems to identify security vulnerabilities. Perform vulnerability assessments and provide detailed recommendations for remediation. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP, MITRE ATT&CK etc. Strong knowledge of common security vulnerabilities, attack vectors, threat modelling and exploitation techniques. Proficiency in using penetration testing tools and frameworks such as Nessus, Burp Suite, Nmap, and other ethical hacking tools. Strong understanding of network protocols, network and application security architectures, and common vulnerabilities (e.g., OWASP Top Ten). Prepare detailed reports of findings, including risk analysis and recommended mitigations, and present these findings to stakeholders. Stay current with emerging security threats, vulnerabilities, and technology trends, and apply this knowledge to improve our security posture. Understanding of component/system architectures in IT and OT environments. Understanding and evaluation of security testing methods. Knowledge of typical industrial protocols (e.g., Modbus, Profinet, OPC, DNP3.0, CAN) Excellent communication skills, with the ability to clearly articulate technical findings and recommendations to both technical and non-technical audiences Source code review for control flow and security flaws IEC 62443 Standard plus at least one of: ISO/IEC 27001 IEC 61508 NIST CSF IEC 61162-460:2024 Proficient in developing VAPT documentation and methodologies specifically aligned with IEC 61162-460:2024 for maritime navigation and radiocommunication equipment cybersecurity. Automotive Vehicle Testing Support Skilled in providing cybersecurity testing support for automotive vehicles , including VAPT of ECUs and in-vehicle networks , threat modeling , and ensuring compliance with industry standards like ISO/SAE 21434. Roles and Responsibilities Min. one professional certification such as Certified Ethical Hacker (CEH), ISA/IEC 62443, OSCP or certified Penetration Tester preferred. Min 2–5 years of experience performing security testing on Industrial control system components like IOT devices, PLCs, SCADA, IIOT devices etc. Familiarity with operating systems (Windows, Linux) and their security features. Excellent problem-solving skills and the ability to think critically to identify and address security issues. Strong verbal and written communication skills, with the ability to document and present technical information to both technical and non-technical audiences. Perform and report on penetration testing of systems, including cloud, NIST 800-53 CA-8 security control and using methodologies that may include, NIST SP 800-115, IEC 62243, PTES, and Information Systems Security Assessment Framework (ISSAF). Develop and maintain up-to-date knowledge of security testing tools and techniques. Contribute to the development and maintenance of security testing methodologies and procedures. Team Collaboration and Training Collaborate with other members of the security team to develop and maintain security policies, procedures, and standards
Posted 1 month ago
5.0 - 9.0 years
0 Lacs
haryana
On-site
As a Senior Consultant in the Cyber Security department located in Gurugram, you will be responsible for various tasks and possess a range of skills and experiences. Your role will involve working on programming languages used for storing and processing raw data, having knowledge of operating systems such as Windows, macOS, Linux, UNIX, and other OSs, conducting penetration testing, understanding ethical hacking and coding practices, mastering advanced persistent threat management, ensuring firewall safety and management, utilizing encryption techniques and capabilities, conducting compliance assessments, and working with frameworks like COBIT and ITIL. You should have at least 5 years of relevant experience in cybersecurity, IT systems operation, and IT solutions development and maintenance. You must be well-versed in configuring and troubleshooting vulnerability management platforms like Tenable or Qualys, as well as patch management control platforms such as Microsoft MECM/SCCM. Experience in supporting patch management, vulnerability management, or configuration management programs is crucial, along with troubleshooting patch deployment and installation through log analysis and investigation. Your expertise should include knowledge of OWASP top 10 and other network security frameworks, hands-on experience in VAPT for application and network security, skills in configuration review, policy review, hardening of systems and networks, endpoint review, application code review, and testing tools. You should possess excellent communication and analytical skills to interact with clients directly, experience in Mobile AppSEC for Android and iOS, API testing, willingness to travel, good presentation and report-making skills, research knowledge in cyber security for consulting and customizing services, and hands-on working knowledge of tools like Burp, Nessus, Nmap, Qualys, Acunetix, Metasploit, and other relevant tools. Additionally, you should have knowledge of SIEM/SOAR, DLP, EDR/EPP, Firewall/IPS, Web Servers, and basic scripting knowledge in any language would be advantageous. Your role will also involve being willing to travel and actively participating in pre-sales activities, ensuring the highest level of security for clients and their systems.,
Posted 1 month ago
0.0 - 5.0 years
2 - 6 Lacs
Noida
Work from Office
Roles and Responsibilities can take corporate and classroom regular training batches of students and professionals Desired Candidate Profile CEHv12, NPT, WAPT, Linux, Cyber Security, Ethical Hacking Perks and Benefits 2 Lac to 6 Lacs
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
haryana
On-site
As a Security Testing professional, you will be responsible for conducting application security assessments with 3-6 years of experience. This includes tasks such as Architecture and Design review, Code Review utilizing tools like CheckMarx, Penetration testing (Ethical Hacking), and Vendor Risk Assessment. You must possess a strong working knowledge of key security technologies such as Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). Your role will involve running and analyzing security Penetration testing to identify security vulnerabilities and recommend appropriate countermeasures for security enhancements. It is essential to have a solid understanding of protocols like HTTP, HTTPS, SSL, TLS, and SFTP to effectively carry out your responsibilities. If you have the requisite experience and skills in security testing, this opportunity in Gurgaon awaits your application. Join a dynamic team where your expertise will be valued, and your contributions will play a vital role in ensuring the security integrity of the applications under assessment.,
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
chandigarh
On-site
As a Cybersecurity Trainer at Clinilaunch Research Institute in Bangalore, you will be responsible for delivering engaging and comprehensive training across various cybersecurity courses. With 3-5 years of experience, you will guide students through foundational and advanced cybersecurity topics, hands-on labs, and exam preparation for industry-recognized certifications. Your key responsibilities will include conducting training on Ethical Hacking, Network Security, Penetration Testing, Cybersecurity Risk Management, and Security Operations. Collaborating with the curriculum development team, you will enhance training content and methodologies. Assessing student progress and providing constructive feedback will be crucial in your role. To excel in this position, you must hold a Certified Ethical Hacker (CEH) certification from EC-Council and demonstrate proven experience as a cybersecurity trainer. Strong communication and presentation skills, along with in-depth knowledge of cybersecurity practices, are essential qualifications. Preferred certifications from EC-Council include Certified Network Defender (CND), Certified Chief Information Security Officer (C|CISO), Certified Security Analyst (ECSA), Certified Incident Handler (ECIH), and Certified Disaster Recovery Professional (CDRP). Your expertise in network security, ethical hacking, and threat intelligence, coupled with hands-on experience in tools like Kali Linux, Metasploit, and Wireshark, will be advantageous. As a passionate educator, you will simplify complex technical concepts for non-technical audiences and mentor aspiring cybersecurity professionals to prepare them for successful careers in the field. Your work will be on-site at Clinilaunch Research Institute in Bangalore, providing a conducive environment for professional growth and development. Stay updated on the latest cybersecurity trends, threats, and technologies to ensure the highest quality of training delivery.,
Posted 1 month ago
3.0 - 8.0 years
9 - 14 Lacs
Bengaluru
Work from Office
Educational Requirements Bachelor of Engineering Service Line Infosys Quality Engineering Responsibilities As part of the Infosys delivery team, your primary role would be to ensure effective Design, Development, Validation and Support activities, to assure that our clients are satisfied with the high levels of service in the technology domain. You will gather the requirements and specifications to understand the client requirements in a detailed manner and translate the same into system requirements. You will play a key role in the overall estimation of work requirements to provide the right information on project estimations to Technology Leads and Project Managers. You would be a key contributor to building efficient programs/ systems . If you think you fit right in to help our clients navigate their next in their digital transformation journey, this is the place for you! Additional Responsibilities: Job Opening is for multiple locations- Bangalore, Hyderabad, Trivandrum, Chennai, Pune Technical and Professional Requirements: Security testing with 3-10 years exp - SAST/DAST/API, Network, Mobile Security/DevSecops/Cloud Security/Threat Modelling/Vulnerability Management/Logging & Audit/GRC/Security Operations/IAMSkills Required - Security Testing--Primary skills:Application Security,Application Security-Burpsuite,Application Security-Devsecops,Application Security-Ethical Hacking(CEH),Application Security-Nessus,Application Security-SSL(Secure Sockets Layer),Application Security-Threat Modeling,Application Security-Vulnerability Assessment/Penetration Testing,Application Security-Vulnerability Management,Application Security-Web Security,Application Security-Webservices Security,Security testing-Vulnerability testing,Technology-Application Security-Vulnerability Management-Qualys,Mobile Testing-Mobile Security Testing Preferred Skills: Technology-Application Security-Application Risk Profiling Threat Modeling Technology-Application Security-Ethical Hacking Technology-Application Security-Mobile Application Security Technology-Application Security-Penetration Testing (Black/White/Grey Box Testing) Technology-Application Security-Vulnerability Management Technology-Mobile Testing-Mobile Security Testing Technology-Security Testing-Security Testing - ALL Technology-Infrastructure Security-Secure Web Gateway-TrendMicro Interscan web security Virtual appliance
Posted 1 month ago
3.0 - 7.0 years
0 Lacs
ludhiana, punjab
On-site
You will be responsible for delivering high-quality cybersecurity training sessions to individuals at various skill levels. Your role will involve preparing and presenting training materials, conducting hands-on labs, and providing ongoing support to ensure the success of our cybersecurity training programs. Key Responsibilities: - Develop, design, and deliver engaging cybersecurity training programs on various topics including network security, threat analysis, ethical hacking, risk management, data protection, and compliance. - Conduct theoretical and hands-on sessions using real-world examples and case studies to reinforce key concepts. - Evaluate the effectiveness of training programs and make improvements based on feedback. - Stay updated with the latest trends, threats, and best practices in the cybersecurity field to ensure training content is current. - Provide guidance and mentoring to participants, answering questions and offering solutions to cybersecurity challenges. - Develop training materials such as presentations, manuals, and lab exercises. - Administer exams or certifications to assess participants" understanding of the material. - Customize training solutions based on client or organizational needs. - Assist in creating documentation and resources for post-training reference. Qualifications: - Proven experience as a Cybersecurity professional with hands-on experience. - In-depth knowledge of cybersecurity principles, threat vectors, firewalls, encryption, vulnerability assessments, and incident response. - Relevant cybersecurity certifications such as CISSP, CEH, CISM, CompTIA Security+, or similar. - Prior experience in teaching or training, with the ability to explain complex technical concepts in an accessible manner. - Strong communication and presentation skills, with the ability to engage and motivate participants. - Ability to design and develop comprehensive training curricula. - Familiarity with various cybersecurity tools and technologies such as SIEM, penetration testing tools, firewalls, and antivirus software. - Experience with online learning platforms and delivering virtual training is a plus. - Strong problem-solving abilities and the capability to adapt to new challenges. Preferred Qualifications: - Bachelor's degree in Cybersecurity, Information Technology, or a related field. - Experience in corporate or enterprise-level cybersecurity training. - Knowledge of regulatory frameworks (e.g., GDPR, HIPAA, NIST) and compliance standards. - Experience with security certifications like CompTIA Network+, Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). This is a full-time, permanent position with a day shift schedule at an in-person work location.,
Posted 1 month ago
1.0 - 5.0 years
0 Lacs
haryana
On-site
As an ethical hacker at Greenlight Planet, your primary responsibility will be to identify security vulnerabilities in various vendor smartphones and provide recommendations on security measures. You will need to stay up-to-date with information dissemination channels, conduct testing on available jailbreaks, and create detection solutions to enhance the security of Android devices. Your tasks will include performing reconnaissance and testing hacking solutions from sources like the Darkweb and forums, collaborating with the Risk team on customer visits and field audits, standardizing phone model testing procedures, conducting periodic security reviews, and assisting in creating Mobile Device Management (MDM) policies. You will also work on Tampering Detection solutions for Android devices and recommend firmware upgrades to enhance security measures. To excel in this role, you should possess a strong understanding of Android mobile phone internals, including hardware, firmware, OS, and MDM-level security. Expertise in phone security bypass testing, hands-on experience with motherboard tampering, ISP PinOut, and Chip-Off methods of flashing, as well as practical experience with various testing tools like Chimera and Pandora are essential. Previous experience with Samsung, Nokia, Tecno, Infinix, Itel, VIVO, and ZTE smartphones is preferred, along with excellent problem-solving skills. This is a full-time position located in Gurugram/Mumbai, with benefits including cell phone reimbursement, flexible schedule, health insurance, internet reimbursement, provident fund, and work from home options. If you meet the required experience criteria and are capable of contributing to the global off-grid challenge with innovative security solutions, we encourage you to apply. Application Questions: - What's your expected CTC - What's your notice period - What's your current CTC ,
Posted 1 month ago
2.0 - 6.0 years
0 Lacs
kochi, kerala
On-site
As an Academic Advisor for Cybersecurity Training & Certification at Technovalley Software India Pvt. Ltd., located in Kochi, India, you will play a crucial role in guiding aspiring students, IT professionals, and corporate partners towards achieving internationally recognized certifications and unlocking global career opportunities. Your main responsibilities will include providing professional career guidance and counselling to individuals interested in pursuing Cybersecurity career paths such as Ethical Hacking, Cybersecurity Analyst, Computer Hacking Forensic Investigator, Offensive Security Certified Cybersecurity, Penetration Testing, SOC Analyst, Threat Intelligence, and Incident Response. You will be tasked with understanding the career aspirations and goals of each individual and recommending appropriate certification and training programs to align with their career trajectory. Additionally, you will educate prospective learners on global certification standards from renowned organizations like EC-Council, OffSec, CompTIA, PECB, and Microsoft. You will also offer insights into industry demand for Cybersecurity professionals, expected salary growth, and career scope in various Cybersecurity fields. Your role will involve coordinating the admission process, following up with leads, ensuring high admission conversion rates, and promoting scholarship opportunities for eligible candidates. Furthermore, you will be responsible for building relationships with students, acting as a student success partner, and collaborating with the placement cell to ensure certified students receive career assistance and placement opportunities. The desired qualifications for this role include a Bachelor's degree in Computer Science, Cybersecurity, IT, or related fields, along with a minimum of 2-3 years of experience in academic counselling, career guidance, or technical training consultation, preferably in Cybersecurity, IT Training, or EdTech industries. To excel in this role, you should possess a strong understanding of Cybersecurity certifications, excellent communication and negotiation skills, and the ability to work towards achieving aggressive targets. Your passion for helping individuals build careers in Cybersecurity, along with your familiarity with global job markets and career trends in Cybersecurity and IT Security domains, will be key assets in this position. Joining Technovalley will offer you the opportunity to work with India's leading Cybersecurity Training Company, engage with global professionals and industry leaders, and contribute to shaping the next generation of Cybersecurity professionals in India and beyond. This role also comes with a competitive salary, performance-based incentives, and the chance to drive career transformation in the cybersecurity space.,
Posted 1 month ago
3.0 - 5.0 years
5 - 9 Lacs
Bengaluru
Work from Office
The ideal candidate will have a strong background in IT Services & Consulting and excellent analytical skills. Roles and Responsibility Collaborate with cross-functional teams to identify and prioritize project requirements. Develop and maintain complex data models and reports using various tools and technologies. Analyze large datasets to extract insights and trends, and provide recommendations to stakeholders. Design and implement process improvements to increase efficiency and productivity. Develop and maintain technical documentation for projects and processes. Provide training and support to junior team members on new tools and technologies. Job Requirements Strong understanding of IT Services & Consulting industry trends and technologies. Excellent analytical and problem-solving skills with attention to detail. Ability to work collaboratively in a team environment and communicate effectively with stakeholders. Strong technical skills including data modeling, reporting, and visualization. Experience with process improvement methodologies and tools. Strong technical documentation and communication skills. Mandatory Skills: IDAM Security Consulting. Experience: 3-5 Years.
Posted 1 month ago
9.0 - 14.0 years
30 - 45 Lacs
Hyderabad, Bengaluru
Hybrid
Role & responsibilities Overall - At least 8+ years of experience in performing security engineering and assessments of complex systems with AI / ML / Data Science capabilities and services 3+ years of experience auditing existing AI or machine learning systems for security risks and compliance. Development and implementation of AI content filtering mechanisms. Deployment and operation of tools and processes to analyze security threats and vulnerabilities in AI or machine learning systems. Identification and protection of sensitive data within AI solutions. Design and implementation of strategies to protect AI systems from cyber-attacks. Design and implementation of adversarial test plans. Strong analytical and problem-solving skills Excellent communication skills, both written and verbal, with the ability to convey complex information in a clear and concise manner. A commitment to staying current with the latest developments in cybersecurity through ongoing training and professional development. Ability to work both independently and as part of a team in a fast-paced, dynamic environment. Flexible to provide coverage in US morning hours on a need-basis, and as required Preferred candidate profile Bachelor's or master's degree in computer science, mathematics, information systems, engineering, or cybersecurity. Industry certifications such as CISSP, SANS and/or other relevant certifications Experience designing, developing, and deploying secure AI systems. Training in secure coding standards and best practices for AI-related projects. Knowledge of ethical hacking techniques. Ability to develop security protocols and policies. Excellent communication, problem-solving, and analytical skills. Ability to work independently and as part of a team.
Posted 1 month ago
4.0 - 8.0 years
0 Lacs
chennai, tamil nadu
On-site
As a Security Analyst at Dedalus, a prominent healthcare technology company, you will have the opportunity to contribute to the team in Chennai, India, and play a crucial role in enhancing healthcare services for a healthier planet. Your primary responsibility will involve Security Vulnerability Analysis and Penetration Testing, where you will assess, exploit, and report security vulnerabilities in software applications and infrastructure, providing recommendations for appropriate solutions. Working alongside a highly skilled team, your work will have a significant impact on the healthcare sector. Your duties will include: - Conducting Security Vulnerability Analysis, Threat Modelling, and Risk Assessment - Performing static code reviews using automated SAST tools and analyzing false positives - Executing dynamic testing (DAST) with tools like Burp-suite, Invicti, or Nessus - Conducting manual Penetration Testing and utilizing Ethical Hacking techniques to identify vulnerabilities - Compiling assessment and validation reports on identified vulnerabilities, risks, impact, recommended solutions, and Proof of Concepts (POCs) - Explaining threats and presenting assessment reports to the Developer and Architect community To excel in this role, you must meet the following essential requirements: - Minimum of four years of experience in security vulnerability analysis and Penetration Testing (VAPT) on cloud services, web products, or enterprise applications - Proficiency in using Appsec tools, including industry-standard tools like Burp-suite, Invicti, Fortify, and open-source tools such as Kali, Nmap, Wireshark, Metasploit, ZAP, and Echo Mirage - Technical knowledge of Software Development Life Cycle (SDLC) and implementation essentials for various application types (Desktop, Web, API, Mobile, and Cloud) - Ability to review Java or .NET code with a focus on security vulnerabilities and familiarity with OWASP, GDPR, and ISO Security standards - Certification in VAPT or Ethical Hacking in Mobile, Web, or Cloud security is mandatory - Exposure to DevAppSec automation and scripting is preferred - Knowledge of AI tools and securing Docker containers like Kubernetes is advantageous - Understanding of real-world threats and data protection regulations is desirable Join Dedalus and be part of a diverse and inclusive workplace where innovation and collaboration drive better healthcare outcomes for millions of patients worldwide. Dedalus is dedicated to fostering a work environment that encourages learning, innovation, and meaningful contributions to healthcare. If you are passionate about making a difference in the healthcare sector, join us on this journey to transform and improve healthcare options globally. Application Closing Date: 18th August 2025 Dedalus is committed to promoting diversity and inclusion in the workplace, ensuring respect, inclusion, and success for all employees and communities. Our dedication to diversity and inclusion is reflected in our work culture, emphasizing the importance of an inclusive and diverse workforce to drive innovation and create better healthcare solutions globally.,
Posted 1 month ago
2.0 - 6.0 years
5 - 12 Lacs
Noida, Gurugram
Hybrid
>> Job Description Experience: 3+ years with at-least 2-3 years in client facing advisory consulting role and managing a medium sized team Preferred Certifications: CEH, ECSA, OSCP, CISSP, CCSK, OCSE, CCSP, AWS Security Desired skill set: 1. Strong understanding of IT security standards and frameworks (OWASP, NIST, CIS) 2. Strong understanding of security risks in networks and application platforms 3. Strong understanding of network security, infrastructure security and application security 4. Strong understanding of OSI, TCP/IP model and network basics 5. Demonstrate technical penetration testing skills on IT infrastructure, web applications, mobile platforms and Red teaming 6. Strong technical skills: Information security, network security, Windows security, UNIX/Linux security, web and mobile application security, Cloud platforms 7. Broad knowledge of security technologies for applications, databases, networks, servers, and desktops 8. Solid technical skills in both information security architecture and penetration testing and ability to assess testing tools and deploy the right ones. 9. Scripting and programming experience is beneficial 10. Ability to perform manual penetration testing 11. Experience in Application Security Testing (Web, Mobile & ERP [SAP]), or related functions Vulnerability Assessment, Penetration testing 12. Perform penetration testing of various thick client software, web applications, and communications infrastructure to assist in hardening the cybersecurity posture against malicious actors 13. Conduct security research on the latest emerging advanced persistent threats (APTs), malware, and other security developments to assist in enterprise security efforts. Apply this security research into assessments. 14. Perform technical writing to communicate the preparation, testing, and recommendation phases for various security tests. Work with stakeholders to remediate system vulnerabilities. 15. Train team members and colleagues on the latest cybersecurity tactics, techniques, and procedures (TTPs) to grow the skill of the firm 16. Understanding of various security technologies including end point security, perimeter security, advanced threat protection, malware defense and security management 17. Expertise in the phases of penetration testing. Familiarity with Kali Linux distribution and the associated penetration testing tools suite. Experience in penetration testing simulations like Hack the Box or Capture the Flag exercises considered a plus. 18. Good Understanding of OWASP top 10 and mitigation techniques 19. Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, Security Misconfiguration, CSRF, authentication/ authorization issues 20. Database testing: MySQL, Oracle, NoSQL 21. Understanding of cyber security management, cyber analytics, security intelligence platforms and threat intelligence frameworks 22. Writing business proposals and response to client RFP/ RFIs 23. Identifying business opportunities and lead delivery and program management for large cyber security programs 24. Delivery team and client relationship management 25. Experience on both commercial, open source tools and frameworks but not limited: Burpsuite, Metasploit, Core-Impact, Kali-Linux, AppScan, WebInspect, SSLScan, Soap UI Pro, SonarQube, Qualys, Nikto, Nessus, nmap, sqlmap, OWASP ZAP .
Posted 1 month ago
1.0 years
3 Lacs
IN
Remote
About the job: Position Overview: We are seeking a highly skilled and motivated ASM Specialist to join our Offensive Security Operations team. This role involves simulating real-world cyberattacks, identifying vulnerabilities, and actively managing the attack surface of enterprise environments. You will work closely with red teamers, threat intelligence analysts, and security stakeholders to detect, map, and reduce digital exposure across the organization's infrastructure. Key responsibilities: 1. Lead and execute Attack Surface Management (ASM) operations to identify external-facing vulnerabilities. 2. Simulate real-world attack scenarios within defined rules of engagement. 3. Maintain comprehensive visibility of internet-facing assets, including shadow IT. 4. Analyze and prioritize vulnerabilities based on risk and threat intelligence. 5. Collaborate with blue/red teams to improve security posture and reduce exposure. 6. Utilize frameworks such as MITRE ATT&CK for planning and simulation. 7. Communicate technical findings effectively to both technical and non-technical audiences. 8. Keep updated with latest threat actor tactics, techniques, and procedures (TTPs). Who can apply: Only those candidates can apply who: have minimum 1 years of experience are Computer Science Engineering students Salary: ₹ 3,00,000 /year Experience: 1 year(s) Deadline: 2025-08-17 23:59:59 Skills required: Ethical Hacking, Network Security, Network Management, Web Application Security, Cybersecurity, Security tools, Web Application Testing and Network Monitoring Other Requirements: 1. Experience in cybersecurity, red teaming, vulnerability management, or reverse engineering. 2. Holds certifications like OSCP, CRTO, GCIA, or equivalent. 3. Proven expertise in Red Team operations and ASM platforms/tools. 4. Strong knowledge of adversary simulation and threat intelligence. 5. Familiar with TTPs, DDoS, malware operations, and network scanning. 6. Understands how malicious code exploits vulnerabilities. 7. Exposure to cloud, DevOps, and enterprise environments. 8. Scripting/automation skills in Python, PowerShell are a plus. 9. Hands-on with tools like Shodan, Censys, and other recon platforms. 10. Excellent written and verbal communication skills. 11. Can explain technical findings to leadership and non-tech teams. 12. Strong prioritization, problem-solving, and time management. 13. Able to work in high-pressure, fast-paced settings. 14. Experience managing large-scale ASM programs. 15. Skilled at converting raw threat intelligence into insights. 16. Deep understanding of attack chains and defense evasion. 17. Experience working with globally distributed cybersecurity teams. 18. Passion for continuous learning and upskilling. 19. Bachelor’s or higher in Computer Science, InfoSec, IT, or related field. About Company: Beyond Cloud, a leading cybersecurity consultancy, empowers businesses to navigate the digital landscape confidently in cybersecurity, information security, and risk management. We provide innovative solutions to protect their valuable assets and manage cyber threats effectively. Our team of experts specializes in Penetration testing, Red Teaming, cybersecurity risk management, security operations, and cyber resilience. We are one of the top cybersecurity firms in India, offering a wide range of cybersecurity services. Trust Beyond Cloud for your cyber protection and safeguarding your business against emerging cyber threats.
Posted 2 months ago
2.0 - 7.0 years
0 - 1 Lacs
Visakhapatnam
Work from Office
FACULTY for Computer Science Engineering GITAM School of Technology , GITAM (Deemed to be University) The Department of Computer Science Engineering at GITAM invites bright and young faculty for Visakhapatnam Campus. GITAM is looking for applicants with a passion for teaching and demonstrated excellence in research. We are looking for candidates with specializations like Theoretical Computer Science ( Algorithms, Complexity, Graph Theory, Formal Methods) Systems and Architectures ( Networks, Operating Systems, Architectures, Distributed Systems including Cloud Computing and Blockchain) Cyber Security and Cyber Physical Systems ( IoT, Sensor networks, Edge computing) Data Structure & Database Expected to teach Undergraduate & Postgraduate courses, conduct independent research and provide services to the university. GITAM is looking to expand its Computer Science Engineering Faculty to global standards in the field of teaching and research. The faculty is expected to publish in Scopus indexed/Web of Science journals. Location : Visakhapatnam Essentials Deliver engaging lectures and hands-on laboratory sessions across undergraduate and graduate courses, with a specialization in Theoretical Computer Science ( Algorithms, Complexity, Graph Theory, Formal Methods) Systems and Architectures ( Networks, Operating Systems, Architectures, Distributed Systems including Cloud Computing and Blockchain) Cyber Security and Cyber Physical Systems ( IoT, Sensor networks, Edge computing) Data Structure & Database Develop and deliver effective and engaging undergraduate and/or graduate courses in the sciences, ensuring alignment with the curriculum objectives and fostering a conducive learning environment. Employ innovative teaching methodologies, incorporating technology and interactive methods to enhance student understanding and critical thinking. Provide academic advisement and mentorship to students, assisting them in their academic and professional development. Conduct original research in the candidate's field of expertise, leading to scholarly publications in reputable journals, conference presentations, and contributions to the scientific community. Secure external research funding through grant applications and collaborative projects, contributing to the advancement of knowledge and the institution's research profile. Supervise and mentor graduate students in research projects, fostering their growth as emerging scholars. Participate in departmental and institutional committees, contributing to academic governance and decision-making processes. Engage in outreach activities that promote the sciences and the institution's visibility in the local and global community. Collaborate with colleagues on interdisciplinary projects, fostering a culture of cross-disciplinary research and teaching. Stay current with advancements and trends in the sciences by attending conferences, workshops, and professional development opportunities. Continuously enhance teaching strategies and research methodologies to promote academic excellence and innovation. Foster relationships with industry partners, community organizations, and government agencies to facilitate collaboration, research opportunities and knowledge dissemination. Contribute to public lectures, seminars, and workshops to promote scientific literacy and engagement beyond the academic community. Qualification: Ph.D Computer Science Engineering A good academic record, with a Ph.D. degree in the relevant field and First class or equivalent at Bachelor’s and Master’s level in the relevant branch. Experience of teaching and / or research in an academic/research position equivalent to that of Assistant Professor in a University, College or Accredited Research Institution/industry with publications in the peer-reviewed or UGC-listed journals
Posted 2 months ago
0.0 - 1.0 years
3 - 3 Lacs
Vijayawada, Hyderabad
Work from Office
Job Title: Technical Trainer Openings : 3 Positions Type : Full-time offer with a 3-months internship period Stipend during Internship : 15,000/month CTC post-internship : 3.6 LPA Office Location : Hyderabad (Travel required for training programs in colleges) Experience : 01 years Immediate Joining Required Job Overview: We are looking for dynamic and passionate fresher trainers who are eager to make an impact through teaching. If you have excellent communication skills, prior experience in workshops, tutoring, or student mentoring, and a strong foundation in any one technology (e.g., Python, Java, Web Dev, AI/ML, Cloud, Data Science, etc.), we invite you to join our vibrant training team. This role also offers exciting opportunities to upskill and teach new technologies with full support. Key Responsibilities: Conduct training sessions, workshops, and mentoring programs for students or professionals. Deliver engaging and interactive classes both online and offline. Collaborate with senior trainers and curriculum developers to enhance content delivery. Continuously learn new technologies as per industry demand and be ready to teach them. Track student performance and provide feedback for improvement. Support in developing training materials, assignments, quizzes, and project-based learning. Maintain a positive and motivating learning environment. Required Skills & Attributes: Excellent communication and soft skills (verbal and written). A passion for teaching and mentoring students. Prior experience in conducting sessions/workshops/tutoring (college-level, internships, volunteering, etc.). Strong knowledge in at least one of the following: Programming & DSA (Python, Java, C/C++) Web Development (HTML, CSS, JS, React, etc.) Data Science / AI / ML Cloud Computing / AWS / DevOps Cybersecurity / Ethical Hacking Quick learner with a growth mindset. Open to learning new technologies and tools as required. Ability to simplify complex topics for beginner learners. Preferred Qualifications: Master’s/ bachelor's degree in engineering, Computer Science, IT, or a related field. Exposure to public speaking, volunteering as a teaching assistant, or leading student communities is a plus. Certifications (if any) are a bonus but not mandatory. What We Offer: Structured training and mentorship to grow as a professional trainer. Opportunity to work on live projects, bootcamps, and industrial workshops. Continuous learning environment with access to latest tools and content. A collaborative and supportive work culture. Rapid career growth for top performers. If you're passionate about teaching, eager to learn, and want to make a real impact—apply now! - radha.c@fixityedx.com
Posted 2 months ago
3.0 - 5.0 years
0 Lacs
Lucknow
Work from Office
Key responsibilities Design and deliver instructor-led training on Cyber Security & Networking concepts. Create, update, and maintain training content, lab exercises, and case studies aligned with current industry standards. Provide practical exposure through real-world simulations, labs, and tools (e.g., Wireshark, Kali Linux, Metasploit, Cisco Packet Tracer, etc.). Conduct pre and post-assessments, doubt-clearing sessions, and track learner progress. Tailor sessions based on audiencefreshers, professionals, or corporate employees. Stay updated with the latest trends, threats, and tools in the cybersecurity domain. Deliver sessions on weekends or weekdays as per availability Requirements:- Strong knowledge of: Cyber Security Fundamentals (CIA triad, types of attacks, threat vectors) Network Security (firewalls, IDS/IPS, VPNs) Ethical Hacking & Penetration Testing Risk Assessment, Compliance & Governance Networking Protocols (TCP/IP, DNS, DHCP, etc.) Hands-on with tools like Nmap, Burp Suite, Wireshark, Nessus, Metasploit, Snort. Familiarity with certifications like CEH, CISSP, CompTIA Security+, CCNA is a plus. Excellent communication, presentation, and interpersonal skills. Prior training experience is mandatory.
Posted 2 months ago
1.0 - 8.0 years
3 - 10 Lacs
Pune
Work from Office
Static/dynamic testing of mobile applications, Vulnerability Assessment, Penetration Testing, Cyber Security Assessment & Consulting. Secure Code Review, Web Application Security Testing, Firewall Rule Audit, Secure Configuration Review, Wireless Penetration Testing.
Posted 2 months ago
11.0 - 15.0 years
35 - 40 Lacs
Pune
Work from Office
JD:- Application Security Lead Education Criteria (Must): B.Sc (IT/CS) / B.Tech in any Engineering background, BCA, MCA & M.Sc. Information Technology, or related field. CEH, CISSP, CISA, CISM, CRISC (If any security related certification) 11-15 years of experience in Application Security, Network Security, and IT Risk & Compliance, with hands-on expertise in security assessments, process audits, and application reviews. Experience in BFSI is preferred. Lead and manage the AppSec team consisting of L1 and L2 resources. Serve as the primary point of contact between the Client and the team for all project-related activities. Monitor daily operations, ensure resource optimization, and address any issues that arise during the engagement. Application & Security Review - Oversee the review of application security including web, mobile, API, and other banking applications. Perform comprehensive reviews of Network Architecture, Source Code, VAPT reports, and configuration audits. Review deliverables from L1 and L2 resources, ensuring completeness and quality. Compliance and Risk Management Reporting Stakeholder Management Skill-Vulnerability Assessment, Manual Penetration Testing using OWASP checklists, Penetration Testing, OWASP Top 10, OWASP ZAP, Ethical Hacking, Static/dynamic testing of mobile applications, Vulnerability Mitigation.
Posted 2 months ago
5.0 - 10.0 years
7 - 12 Lacs
Kolkata, Mumbai, New Delhi
Work from Office
Skill Set : VAPT, OS Hardening, Ethical Hacking, SIEM, DLP, IAM, IRM Experience : 5+ Years Location : India/US Develop and implement strategic plans to achieve organizational goals and objectives. Lead and mentor teams, fostering collaboration, accountability, and high performance. Analyze business operations, identify areas for improvement, and recommend solutions. Oversee budgeting, financial analysis, and resource allocation to optimize operational efficiency. Monitor key performance indicators (KPIs) to ensure alignment with company goals. Build and maintain relationships with key stakeholders, partners, and clients. Ensure compliance with industry standards, regulations, and company policies. Drive innovation and process improvements to maintain competitive advantage.
Posted 2 months ago
2.0 - 7.0 years
9 - 13 Lacs
Mumbai
Work from Office
As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, there's no limit to what you can accomplish here. * Responsible for security researcher to provide insight and understanding of new and existing information security threats * Responsible to participate in recommending improvements to SOC security process, procedures, policies, security incident management and vulnerability management processes * You will be involved in evaluating, recommending, implementing, and solving problems related to security solutions and evaluating IT security of the new IT Infrastructure systems * Keep yourself up-to-date with emerging security threats including applicable regulatory security requirements * Work in a 24x7 Security Operation Centre (SOC) environment Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise * Minimum 2+ years’ experience in SIEM. * Proven expertise in handling the daily monitoring of Information Security events on the QRadar / ArcSight / Splunk console platform * Proficient in monitoring security events from various SOC channels (SIEM, Tickets, Email and Phone), based on the security event severity to handle the service support teams, tier2 information security specialists * Expertise in threat modelling and Use case development and ability to review policies of security monitoring tools based on security concepts and logical approach. Preferred technical and professional experience * Preferred OEM Certified SOAR specialist + CEH * Ambitious individual who can work under their own direction towards agreed targets/goals and with creative approach to work * Intuitive individual with an ability to manage change and proven time management * Proven interpersonal skills while contributing to team effort by accomplishing related results as needed * Up-to-date technical knowledge by attending educational workshops, reviewing publications
Posted 2 months ago
3.0 - 7.0 years
7 - 11 Lacs
Bengaluru
Work from Office
Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 4 plus years of experience Application Security TestingExperience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding PracticesKnowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat ModellingAbility to conduct threat modelling sessions to identify and mitigate security risks Preferred technical and professional experience Vulnerability AssessmentExperience in conducting vulnerability assessments and penetration testing Application Security TestingExperience with static and dynamic application security testing (SAST/DAST) tools. Security ToolsProficiency in using security tools like Burp Suite, Nessus, or Fortify
Posted 2 months ago
3.0 - 8.0 years
3 - 12 Lacs
Pune
Work from Office
Responsibilities: Deliver structured training sessions (online or in-person) based on the provided 4-month CEH-aligned syllabus Teach tools such as Nmap, Burp Suite, Metasploit, Wireshark, SQLMap, John the Ripper, Aircrack-ng, etc.
Posted 2 months ago
3.0 - 6.0 years
4 - 7 Lacs
Kochi
Work from Office
Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Main Responsibilities Tier 1 SOC analysts are incident responders, remediating serious attacks escalated, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity and suspicious activities, escalate to managed service support teams, tier 2 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when new threats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Other responsibilities and additional duties as assigned by the security management team or service delivery manager Requirements: Min 1 Years Experience as SOC Analyst (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows. Excellent written and verbal communication skills Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting
Posted 2 months ago
3.0 - 6.0 years
4 - 6 Lacs
Kochi
Work from Office
Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network security practices. Excellent customer service while solving problems should be a top priority for you. Main Responsibilities Tier 2 SOC analysts are incident responders, remediating serious attacks escalated from Tier 1, assessing the scope of the attack, and affected systems, and collecting data for further analysis. Work proactively to seek out weaknesses and stealthy attackers, review vulnerability assessments (CVEs) on monitored assets. Focus more on doing deep dives into datasets to understand what's happening during and after attacks. Monitor security events from the various SOC entry channels (SIEM, Tickets, Email and Phone), based on the security event severity and suspicious activities, escalate to managed service support teams, tier 3 information security specialists, and/or customer as appropriate to perform further investigation and resolution. Works as a Team lead for the SOC Analysts helping them to ensure that corporate data and technology platform components are safeguarded from known threats. Analyse the Events & incidents and identify the root cause. Assist in keeping the SIEM platform up to date and contribute to security strategies as an when new threats emerge. Staying up to date with emerging security threats including applicable regulatory security requirements. Bring enhancements to SOC security process, procedures, and policies. Document and maintain customer build documents, security procedures and processes. Document incidents to contribute to incident response and disaster recovery plans. Review critical incident reports and scheduled weekly & monthly reports and make sure they are technically and grammatically accurate. Keep updated with new threats, vulnerabilities, create/contribute to use cases, threat hunting etc. Other responsibilities and additional duties as assigned by the security management team or service delivery manager Requirements: Min 3 Years Experience as SOC Analyst (Experience in SIEM Tool ELK & Wazuh preferable) Process and Procedure adherence General network knowledge and TCP/IP Troubleshooting Ability to trace down an endpoint on the network, based on ticket information Familiarity with system log information and what it means Understanding of common network services (web, mail, DNS, authentication) Knowledge of host-based firewalls, Anti-Malware, HIDS Understanding of common network device functions (firewall, IPS/IDS, NAC) General Desktop OS and Server OS knowledge TCP/IP, Internet Routing, UNIX / LINUX & Windows. Excellent written and verbal communication skills Skills: Excellent event or log analytical skills Proven experience as IT Security Monitoring or similar role Exceptional organizing and time-management skills Very good communication abilities ELK, Wazuh, Splunk, ArcSight SIEM management skills Reporting
Posted 2 months ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
73564 Jobs | Dublin
Wipro
27625 Jobs | Bengaluru
Accenture in India
22690 Jobs | Dublin 2
EY
20638 Jobs | London
Uplers
15021 Jobs | Ahmedabad
Bajaj Finserv
14304 Jobs |
IBM
14148 Jobs | Armonk
Accenture services Pvt Ltd
13138 Jobs |
Capgemini
12942 Jobs | Paris,France
Amazon.com
12683 Jobs |