Jobs
Interviews

150 Ethical Hacking Jobs - Page 4

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 5.0 years

7 - 12 Lacs

Mumbai

Work from Office

Minimum requirement: Min 3-year experience performing security testing on Industrial control system components like PLCs, SCADA, IIOT devices etc. Equivalent science or engineering degree Min. one professional certifications such as Certified Ethical Hacker (CEH), ISA/IEC 62443, OSCP or certified Penetration Tester preferred.

Posted 1 month ago

Apply

2.0 - 5.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Minimum requirement: Min 3-year experience performing security testing on Industrial control system components like PLCs, SCADA, IIOT devices etc. Equivalent science or engineering degree Min. one professional certifications such as Certified Ethical Hacker (CEH), ISA/IEC 62443, OSCP or certified Penetration Tester preferred.

Posted 1 month ago

Apply

1.0 - 5.0 years

5 - 10 Lacs

Chennai

Work from Office

Role & responsibilities Proven experience in conducting penetration tests, vulnerability assessments, and security audits across diverse environments. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP etc. Proficiency in using penetration testing tools and frameworks such as Nessus, Burp Suite, Nmap, and other ethical hacking tools. Understanding of component/system architectures in OT environments. Preferred candidate profile Perks and benefits

Posted 1 month ago

Apply

1.0 - 5.0 years

5 - 10 Lacs

Bengaluru

Work from Office

Role & responsibilities Proven experience in conducting penetration tests, vulnerability assessments, and security audits across diverse environments. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP etc. Proficiency in using penetration testing tools and frameworks such as Nessus, Burp Suite, Nmap, and other ethical hacking tools. Understanding of component/system architectures in OT environments. Preferred candidate profile Perks and benefits

Posted 1 month ago

Apply

2.0 - 5.0 years

5 - 9 Lacs

Navi Mumbai

Work from Office

Exp Level: 2 to 5 years Educational Qualification I. B.E / B. Tech in: a) Cyber Security Computer Science/Computer Science & Engineering b) Information Technology/ Software Engineering/ c) Electronics & Communications Engineering d) Or equivalent degree in relevant discipline II. MCA or BCA or M.Tech / M.Sc/ B.Sc in: a) Computer Science b) Information Technology c) Electronic & Communications Engineering Required Certification Mandatory (Any-one): - Certified SOC Analyst (EC- Council), Computer Hacking Forensic Investigator (EC- Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Key Roles & Responsibilities Proactively search for hidden and undetected cyber threats in banks environment. Establishing threat Hunting framework and continuous enhancement of the framework. Threat Hunting should be performed as per the outlined strategy & quarterly goals. Formulating hypothesis about potential threats based on known vulnerabilities, threat actor behaviors or anomalies in the environment. Leveraging security tools deployed in the bank. Indicators of Compromise (IOCs) or Indicators of Attack (IOAs) driven, hypothesis driven, leveraging frameworks like MITRE ATT&CK, threat intel driven, Analytics Driven threat hunting. Documenting threat hunting scenarios, detailing findings and conclusions, updating threat detection systems, and continuous refining of hunting methodologies. Correlation of multi-vector & multi-path attack vectors Contextual awareness of detected threats

Posted 1 month ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Noida

Work from Office

R1 RCM Inc. is a leading provider of technology-enabled revenue cycle management services which transform and solve challenges across health systems, hospitals and physician practices. Headquartered in Chicago, R1 is a publicly-traded organization with employees throughout the US and international locations. Our mission is to be the one trusted partner to manage revenue, so providers and patients can focus on what matters most. Our priority is to always do what is best for our clients, patients and each other. With our proven and scalable operating model, we complement a healthcare organizations infrastructure, quickly driving sustainable improvements to net patient revenue and cash flows while reducing operating costs and enhancing the patient experience. We are looking for a self-motivated Cybersecurity Analyst to join the R1 Cybersecurity Operations Team. We have a relentless focus on driving results for our customers and enabling them to invest more in patient care; in turn, this allows us to continue to grow our company and your career. The successful candidate must be well-versed in security operations, cyber security tools, intrusion detection, and secured networks. They will serve as an expert and be responsible for providing network and security operations technical analysis, assessment, and recommendations in the areas of real-time security situational awareness, operational network system and applications systems security monitoring. Responsibilities : Monitoring various security tools (e.g., Crowdstrike, Proofpoint, MS Sentinel, Azure VM ) to identify potential incidents, network intrusions, and malware events, etc. to ensure confidentiality, integrity, and availability of R1s architecture and information systems are protected Reviewing and analyzing log files to report any unusual or suspect activities. Utilize incident response use-case workflows to follow established and repeatable processes for triaging and escalating. Generating trouble tickets and performing initial validation and triage to determine whether incidents are security events using open-source intelligence (OSINT) Following established incident response procedures to ensure proper escalation, analysis and resolution of security incidents. Analyzing and correlating incident event data to develop preliminary root cause and corresponding remediation strategy. Providing technical support for new detection capabilities, recommendations to improve upon existing tools/capabilities to protect the R1s network, and assessments for High Value Assets. In this role, the successful candidate will maintain and monitor compliance with enterprise change management policies and procedures. Develop and maintain metrics & reports on the status of the R1 cyber security operations program. Attend and participate in Cyber security projects and the change management process. This includes interacting with business units and technical teams to understand what is coming and how their projects can be more secure from the beginning. As part of the overall Cybersecurity Operations Team, work in tandem with the security operations center (SOC), incident responders (when anomalous activity and host compromise occurs), and technology infrastructure and development team members. Participate in established incident response procedures to ensure proper escalation,analysisand resolution of security events and incidents. Managing and maintaining change detection and auditing tools Researching technology and application processing environments, operation, and associated user workflow to design, build, configure, implement, and document change compliance and audit rules within designated technologies. Reconciling changes detected by the system to authorized changes documented in service desk and change management applications. Analyzing large volumes of security event data from a variety of sources to identify suspicious and malicious activity. Documenting, logging and investigating security incidents. Performing case management throughout the incident lifecycle for moderately complex security incidents Design, build, and documenting security technology standards, processes, and operational workflows Operating and maintaining physical security monitoring systems Review, investigate, track, and monitor viruses and malware propagation and eradication throughout the enterprise. Monitoring compliance with enterprise security, compliance, and change management programs, policies, and processes Researching Threat Intelligence sources on the latest malware, trends, patches in order to keep the Security Program up-to-date. Providing metrics & reports on the status of tools, environments, and assets within the organization. Database and Application security to prevent attacks via Input Validation, Cross-Site Scripting, Buffer Overflowetc Required Qualifications : A minimum of 4 years of professional experience in an IT-related field Intermediate knowledge of security, monitoring, and networking technologies, tools, protocols and standards Knowledge of security policy, programs, process, and metrics CompTIA Security+ certification or equivalent professional experience in security operations Intermediate or advanced security, networking, or audit certification Recent experience with static and/or dynamic code review process Strong drive and passion to deliver distinctive end-products, a quick learner with a strong attention to detail and quality. Excellent interpersonal and communication skills Desired Qualifications: A Bachelors degree in a technical discipline (e.g., Computer Science, Business Analyst, etc.) Certification (or ability to obtain certification) in at least one of the following areasGeneral Security (CISSP), Incident Handling (GCIH), Cloud Security (GCLD, Cloud+, CCSK), and Ethical Hacking (CEH) Experience with advanced cyber security tools, network topologies, intrusion detection, and secured networks In-depth understanding of NIST SP 800-61,SOC 2 AICPA controls and frameworks. Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests. Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visit:R1RCM.com. R1 RCM Inc. (the Company) is committed to the principles of equal employment opportunity. The Companys practices and employment decisions, including those regarding recruitment, hiring, assignment, promotion, compensation, benefits, training, discipline, and termination shall not be based on any persons age, color, national origin, citizenship status, physical or mental disability, medical condition, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status or any other characteristic protected by federal, state or local law. Furthermore, the Company is committed to providing a workplace free from harassment based on any of the foregoing protected categories. Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests. Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visitr1rcm.com Visit us on Facebook

Posted 1 month ago

Apply

3.0 - 7.0 years

16 - 20 Lacs

Gurugram

Work from Office

Position Summary: We are seeking a skilled IT Technician to join our Cyber Security team in India. The successful candidate will be responsible for design and test new Cyber Security portfolio elements, ensuring robust and secure solutions and tools to guarantee the cybersecurity of our installed plant base (brownfield) in accordance with the latest standards and guidelines (NIS2, NERC CIP, etc.) and customers demands. Working with technical experts from other business units, the aim is to ensure that these solutions meet the latest security standards and address potential threats in the IT/OT environment. Especially for our installed systems (brownfield), new cybersecurity technologies need to be assessed, and proof-of-concepts organized/created. As part of a hybrid working model and due to the nature of the role, you will need to travel frequently to Germany. A Snapshot of your Day How Youll Make an Impact (responsibilities of role) Planning, setup, operation and maintenance of an IT/OT test environment for the simulation of production systems. With a special focus on servers, firewalls, routers, switches, etc. and corresponding users and operating software Testing and evaluation of new cybersecurity technologies (HW and SW) for our HVDC/FACTS systems and their implementation in case of positive evaluation Ensuring protection against cyberattacks by implementing the latest technologies Support in the automation and optimization of production processes Collaborate with the Control & Automation team to integrate new technologies Preparation of technical documentation, installation instructions and user manuals Provide technical expertise for bidding activities, present security concepts, and assist in creating customer-centric solutions What You Bring Degree in network/communication technology, computer science or IT security, alternatively a relevant apprenticeship with several years of professional experience Sound knowledge of IT administration, e.g. network security, Windows Server, Active Directory, WSUS, virtualization, firewalls, remote access solutions, etc. Preferably several years of experience in IT/OT cybersecurity in the field of critical infrastructures Desirable, experience in automation technology. Familiarity with national and international IT security standards in an industrial environment (e.g. BDEW, NERC-CIP, IEC 62443) Very good knowledge of English (German will be an added advantage) High level of commitment, ability to work in a team and willingness to solve technical challenges independently, pragmatically and purposefully

Posted 1 month ago

Apply

5.0 - 10.0 years

3 - 7 Lacs

Bengaluru

Work from Office

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Node.js Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Your day will involve ensuring the security of critical assets and systems. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Implement security measures to protect systems and data- Conduct security assessments and audits- Develop security policies and procedures Professional & Technical Skills: - Must To Have Skills: Proficiency in Node.js- Strong understanding of cybersecurity principles- Experience with security tools and technologies- Knowledge of network security protocols- Familiarity with cloud security best practices Additional Information:- The candidate should have a minimum of 5 years of experience in Node.js- This position is based at our Bengaluru office- A 15 years full-time education is required Qualification 15 years full time education

Posted 1 month ago

Apply

4.0 - 9.0 years

12 - 20 Lacs

Gurugram, Jaipur, Bengaluru

Work from Office

Strong understanding of OWASP Threats classification Exp with establishing penetration testing procedures & processes. Exp with standard security tools such as Metasploit, SQLMap, Nmap, OWASP ZAP, Burp Suite etc. Stay current with evolving threats Required Candidate profile Understanding of threat modelling, vulnerability assessment, and penetration testing Exp on application & infrastructure vulnerabilities, automated/manual testing, auditing and remediation techniques

Posted 1 month ago

Apply

6.0 - 11.0 years

8 - 14 Lacs

Hyderabad

Work from Office

Experience 6+ Years Skill SIEM Notice Period Immediate Employment Type Contract Work Mode WFO/Hybrid 6 years of SIEM, or SOC experience Strong communication, written, and verbal skills Experience with writing/creation of formal documentation such as reports, slide decks, and architecture diagrams Customer service/support experience Ability to conduct in-depth forensic analytical studies and investigations Role Preferences Splunk certification Coding or scripting experience Strong knowledge of Unix/Linux Security+, GIAC, SSGB, ITIL, or similar certification Working knowledge of applicable industry controls such as NIST 800-536 or Mitre Attack Framework

Posted 1 month ago

Apply

4.0 - 5.0 years

6 - 7 Lacs

Chennai

Work from Office

Responsible for identifying, assessing, and mitigating security vulnerabilities through automated and manual penetration testing. Develops remediation plans, conducts security audits, and ensures compliance with industry standards. Expertise in vulnerability scanners, ethical hacking, and cybersecurity frameworks is required.

Posted 1 month ago

Apply

5.0 - 10.0 years

20 - 27 Lacs

Hyderabad

Remote

The Cyber Security Analyst 2 is responsible for creating a secure computing environment that protects against unauthorized access modification or destruction. Years of experience : 5+ Location : Kolkata & Hyderabad (Remote) US Shift (5pm to 2pm) What we are looking for 5-8 years of relevant experience in Cyber Security Experience in DevSecOps. Expertise in IT security architecture within private public and hybrid cloud environments. Expertise in Microsoft and Unix Operating systems Demonstrated mastery of applying security fundamentals and networking concepts Experience with automation tools and security tools. Experience with anti-malware file integrity monitoring and data loss prevention tools CISSP GIAC, COMP TIA security certificate or other security certifications Excellent collaboration skills applied successfully within the team as well as with other teams Excellent oral and written communication skills that demonstrate a professional demeanor and the ability to interact with others with discretion and tact. Excellent organizational multi-tasking and time management skills Driven to learn and stay current professionally. Up to 10% travel time required. This position requires On-call, shift work and collaborate with US team.

Posted 1 month ago

Apply

6.0 - 11.0 years

4 - 8 Lacs

Hyderabad

Work from Office

Immediate Openings on Security Consultants with Vulnerability _Contract_Pan India 6+ Years Security Consultants with Vulnerability Pan India Period :Immediate. Type Contract Description 7 + Years Security Consultants with Vulnerability tools exp like Qualys or Tenable (prefer Qualys) and ServiceNow. Experience with Vulnerability tools such as Qualys or Tenable (prefer Qualys) and ServiceNow .

Posted 1 month ago

Apply

3.0 - 5.0 years

9 - 13 Lacs

Noida

Work from Office

Key Responsibilities: Perform in-depth penetration testing, vulnerability assessments, and security reviews of applications, infrastructure, and networks. Identify, exploit, and document security vulnerabilities across systems and provide remediation recommendations. Simulate sophisticated attacks to test the strength of security controls and identify potential areas of compromise. Collaborate with development, infra, and DevOps teams to integrate security into the development lifecycle and Infrastructure-as-Code (IaC) security. Develop comprehensive security test plans, methodologies, and tools to ensure effective assessment of systems. Create detailed reports that outline vulnerabilities, risks, and recommended mitigations. Perform threat modeling and risk assessments to prioritize testing efforts. Monitor network traffic for threats and respond to security incidents. Ensure security best practices in Cloud environments, security controls for cloud workloads, IAM policies, and network security. Monitor and respond to cloud security incidents using SIEM and cloud-native security tools. Integrate and automate security testing and compliance checks into CI/CD pipelines using tools like SAST, DAST, and IAST . Experience Range: 3 - 5 years Educational Qualifications: -B.Tech/B.E in Computers , -B.Tech/B.E in IT Job Responsibilities: Required Skills & Qualifications: Bachelor's degree in Computer Science, Cybersecurity, or related field . 2-3 years of experience in cybersecurity with a focus on Penetration testing or Ethical Hacking , Application Security, Cloud Security, and DevSecOps . Experience with security tools such as Burp Suite, Metasploit, Nessus, Wireshark, SonarQube, AWS WAF, Google WAF, Kali Linux, and other vulnerability scanning tools, etc. Knowledge of SIEM , EDR , NIST, CIS, and OWASP security frameworks. Proficiency in scripting (Python, Bash, PowerShell) for security automation. Industry certifications like CEH, Security+, AWS/GCP Security, or any DevSecOps-related certification (preferred but not mandatory). Excellent written and verbal communication skills to effectively report vulnerabilities and collaborate with stakeholders.Qualifications: Bachelors degree in computer science . Skills Required: DevOps , Linux , PHP , Python

Posted 1 month ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Chennai

Work from Office

The Cyber Security role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security domain.

Posted 1 month ago

Apply

2.0 - 4.0 years

4 - 6 Lacs

Hyderabad

Work from Office

The Cyber Security E2 role involves working with relevant technologies, ensuring smooth operations, and contributing to business objectives. Responsibilities include analysis, development, implementation, and troubleshooting within the Cyber Security E2 domain.

Posted 1 month ago

Apply

12.0 - 17.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Job Summary Experienced Vulnerability Management and penetration testing Governance lead will manage a team to oversee the identification, assessment, and remediation of security vulnerabilities across enterprise systems. This role will focus on establishing a proactive security posture, ensuring compliance with industry standards, and driving governance initiatives to mitigate risks effectively along with strong leadership and project management skills. Vulnerability Assessment: Lead regular vulnerability scans and penetration testing across infrastructure, cloud environments and outside-In. Security Baseline: Lead development and implementation of Security Baseline using CIS Benchmarks by determining the systems, applications, and network devices to be secured (e.g., Windows, Linux, Cloud, Docker, Kubernetes). Risk Analysis & Prioritization: Evaluate identified vulnerabilities based on severity, exploitability, and potential business impact. Remediation Planning: Collaborate with IT, security, engineering and entity teams to ensure timely remediation of high-risk vulnerabilities. Governance & Compliance: Develop and enforce security governance frameworks in line with industry standards (e.g., NIST, CIS, ISO 27001, PCI-DSS). Threat Intelligence Integration Leverage global threat intelligence feeds to stay ahead of emerging security threats and vulnerabilities. Security Policy Development: Define policies and best practices for vulnerability management, reporting, and remediation. Automation & Continuous Monitoring: Implement automated vulnerability scanning tools and ensure ongoing security assessments. Incident Response Support: Provide technical guidance in vulnerability-related security incidents and audits. Reporting & Metrics: Establish key risk indicators and provide executive reports on vulnerability trends and remediation progress. Experience: 12+ years in cybersecurity, vulnerability management, or Penetration testing roles. Technical Expertise: Hands-on experience with vulnerability scanning tools (e.g., Qualys, Tenable, Rapid7, Nessus, OpenVAS), penetration testing and threat intelligence platforms. Penetration Testing & Ethical Hacking Experience with tools like Metasploit, Burp Suite, Nmap, and Wireshark for real-world security assessments. Security Framework Knowledge: Strong understanding of NIST, CIS benchmarks, OWASP Top 10, and CVSS scoring models. Compliance Awareness: Familiarity with regulatory standards affecting security risk management. Leadership & Communication: Ability to coordinate with multiple stakeholders, drive security improvements, and articulate risks effectively. Certifications such as CISSP, CISM, CEH, OSCP or equivalent. Experience in cloud vulnerability management (AWS, Azure, GCP). Knowledge of DevSecOps practices and security automation. Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 1 month ago

Apply

3.0 - 6.0 years

2 - 4 Lacs

Ernakulam

Work from Office

Hiring Trainers: 1. Networking & Cyber Security : BTech/Diploma with 4+ yrs practical/training experience 2. IT Hardware : BTech/Diploma with 4+ yrs experience 3. ELV Systems : Diploma with 4+ yrs in ELV systems (CCTV, ACS, PA, etc.) Health insurance

Posted 1 month ago

Apply

6.0 - 10.0 years

13 - 18 Lacs

Mumbai

Work from Office

Are you a Product Security Analyst expert looking for a challenging opportunity?. Join our Product Security team.. We operate at the heart of the digital transformation of our business. Our team is responsible for Product Security including application security for our global organization.. Partner with the best.. We are looking for a Lead Product Security Analyst, with a focus in Product Security. In this role, you will work in a team and demonstrate working knowledge of systems and products and how they are secured in customers' businesses.. As a Senior Lead Product Security Engineer, you will be responsible for:. Building and executing engineering processes for early detection of design flaws, vulnerabilities, weaknesses, missing security controls, and secure implementation of product features.. Applying existing technologies, approaches, methodologies in new combinations to design new products, systems, or processes. Viewed internally and externally as a specialist in the discipline.. Presenting plans, technical roadmaps, ri Senior Lead Product Security Engineer Are you a Product Security Analyst expert looking for a challenging opportunity?. Join our Product Security team.. We operate at the heart of the digital transformation of our business. Our team is responsible for Product Security including application security for our global organization.. Partner with the best.. We are looking for a Lead Product Security Analyst, with a focus in Product Security. In this role, you will work in a team and demonstrate working knowledge of systems and products and how they are secured in customers' businesses.. As a Senior Lead Product Security Engineer, you will be responsible for:. Building and executing engineering processes for early detection of design flaws, vulnerabilities, weaknesses, missing security controls, and secure implementation of product features.. Applying existing technologies, approaches, methodologies in new combinations to design new products, systems, or processes. Viewed internally and externally as a specialist in the discipline.. Presenting plans, technical roadmaps, risks and recommendations to senior business and technical leaders. Lead programs related to Product Security Incident Response, Product Inventory, etc. Driving awareness, engagement, and improvements of Product Security metrics with business leaders. Demonstrating working knowledge of systems and products and how they are secured in a customer environment.. Implementing tools to automate and scale security processes.. Providing security leadership to the business segment product security teams. Experiencing with cyber security framework (NIST 800-53, ISO 27001, IEC 62443, etc.) implementation and governance. Familiarity with cyber regulations (EU NIS2, CRA, etc). Fuel your passion. To be successful in this role you will:. Have a bachelor’s degree in computer science or “STEM” Majors (Science, Technology, Engineering, and Math).. Have a minimum of 10 years of professional experience in a STEM-related degree preferably with a Product Security / OT Security focus.. Have project management experience, and expertise with Agile development teams.. Have prior work experience with various development tools including threat modelling, vulnerability technologies, application security, and secure coding principles.. Have experience with penetration testing and ethical hacking.. Have experience securing applications within cloud platforms such as AWS, Azure, and alike.. Have experience with a broad set of information security technologies and processes within a SaaS, IaaS, PaaS, or cloud environment.. Working with us. Our people are at the heart of what we do at Baker Hughes. We know we are better when all our people are developed, engaged and able to bring their whole authentic selves to work. We invest in the health and well-being of our workforce, train and reward talent and develop leaders at all levels to bring out the best in each other.. Working for you. Our inventions have revolutionized energy for over a century. But to keep going forward tomorrow, we know we must push the boundaries today. We prioritize rewarding those who embrace change with a package that reflects how much we value their input. Join us, and you can expect:. Contemporary work-life balance policies and wellbeing activities. Comprehensive private medical care options. Safety net of life insurance and disability programs. Tailored financial programs.. Additional elected or voluntary benefits. About Us:. We are an energy technology company that provides solutions to energy and industrial customers worldwide. Built on a century of experience and conducting business in over 120 countries, our innovative technologies and services are taking energy forward – making it safer, cleaner and more efficient for people and the planet.. Join Us:. Are you seeking an opportunity to make a real difference in a company that values innovation and progress? Join us and become part of a team of people who will challenge and inspire you! Let’s come together and take energy forward.. Baker Hughes Company is an Equal Opportunity Employer. Employment decisions are made without regard to race, color, religion, national or ethnic origin, sex, sexual orientation, gender identity or expression, age, disability, protected veteran status or other characteristics protected by law.. R136394. Show more Show less

Posted 1 month ago

Apply

10.0 - 15.0 years

3 - 6 Lacs

Ahmedabad

Work from Office

This is a remote position. Job Title: Freelance OSCP Trainer (Offensive Security Certified Professional) Location: Remote Engagement Type: Freelance Duration: Projuct Base Experience: 10+Years About the Role: We are seeking an experienced and passionate freelance OSCP-certified trainer to deliver hands-on training in penetration testing and ethical hacking . The ideal candidate will have a strong background in offensive security and a knack for simplifying complex concepts for learners of varying skill levels. Key Responsibilities: Deliver structured training based on the PWK (Penetration Testing with Kali Linux) curriculum. Guide students through lab exercises , real-world scenarios , and exam preparation . Provide mentorship and support to learners during and after sessions. Customize training content to suit the audiences technical level. Evaluate learner progress and provide constructive feedback. Required Skills & Qualifications: OSCP Certification (mandatory). Strong command of Kali Linux , Metasploit , Burp Suite , Nmap , Wireshark , and other offensive security tools. Proficiency in Active Directory attacks , privilege escalation , buffer overflows , and post-exploitation techniques . Solid understanding of networking , Linux/Windows systems , and scripting (Python/Bash) . Prior experience in training or mentoring is highly desirable. Excellent communication and presentation skills. " , "Work_Experience6" , "Job_TypeTraining" , "Job_Opening_NameOSCP" , "Number_of_Positions1" , "State":null , "Country":null , "Keep_on_Career_Site":false}]);

Posted 1 month ago

Apply

7.0 - 10.0 years

60 - 84 Lacs

Pune

Work from Office

Responsibilities: * Conduct penetration tests, vulnerability assessments & ethical hacking. * Implement OWASP top 10 principles & network NPT methodologies. * Monitor cybersecurity risks & respond to incidents.

Posted 1 month ago

Apply

1.0 - 6.0 years

3 - 8 Lacs

Ahmedabad

Remote

Who we think will be a great fit. A passion for information security with a hacker mindset! Self-motivation and Proactiveness Communication skills What we need... We want people with preferably two or more, of the following: 1. Web Application Security Testing. Knowledge about BURP Suite, manual and automated SQLi Bypass filters that detect SQLi, XSS, etc. People who don't think Injection means only SQLi but SSTI, SSJI, ORMi [HQLi], LDAPi, Eli, XMLi etc. 2. Network Infrastructure Testing. Ability to write custom scripts and wrappers. Knowledge of tools like Responder, Ettercap, tcpdump, Empire, etc.not just Nmap and Nessus Have good knowledge about PowerShell scripting and AD/DC infrastructure. 3. Mobile App Testing. Root/jailbreak and Certificate pinning bypass without any automated tool Dynamic instrumentation using Frida De-obfuscation of APK/IPA file 4. IoT Testing. MQTT attacks Fuzzing of IoT devices Firmware extraction 5. Cloud Testing. A good understanding of the cloud infrastructure that includes AWS, Azure and Google cloud. Have a good understanding of microservices architecture. 6. Secure Code Review. Ability to visualize and compile applications without any compiler (in your mind). Has the ability to learn a new programming language on-the-go. Preferred candidate profile : Candidates with relevant professional experience will be given preference.

Posted 1 month ago

Apply

5.0 - 10.0 years

5 - 10 Lacs

Hyderabad

Work from Office

Naresh IT KPHB & Ameerpet branches are looking out for Experienced offline Faculties for Cyber Security.Candidate should be good in CyberSecurity,Ethical Hacking,Networking, Cyber Forensics etc.Should have rich experience in giving classroom training

Posted 1 month ago

Apply

5.0 - 8.0 years

20 - 25 Lacs

Bengaluru

Work from Office

Transforming the Future of Enterprise Planning At o9, our mission is to be the Most Value-Creating Platform for enterprises by transforming decision-making through our AI-first approach By integrating siloed planning capabilities and capturing millions even billions in value leakage, we help businesses plan smarter and faster This not only enhances operational efficiency but also reduces waste, leading to better outcomes for both businesses and the planet Global leaders like Google, PepsiCo, Walmart, T-Mobile, AB InBev, and Starbucks trust o9 to optimize their supply chains Be Part of Something Revolutionary At o9 Solutions , our mission is simple yet bold: to become the Most Valuable Platform (MVP) for global enterprises Through our AI-powered platform the o9 Digital Brain we unify siloed planning processes, enabling businesses to recover millions, and often billions, in lost value And that s just the beginning By helping organizations plan better and faster, we re also enabling more sustainable operations creating positive impacts for both business and the planet We re looking for the brightest minds and the most passionate individuals to join our mission As part of our team, you ll work in a supportive, innovative environment where your contributions will have a real-world impact both economically and environmentally Position: Senior SecOps Engineer (Red Teaming) Experience: 5-8 Years Location: [Add location if applicable or mention Remote] What You ll Do As a Senior Security Operations Engineer focused on Red Teaming , you ll play a key role in identifying, exploiting, and mitigating potential security vulnerabilities across our infrastructure, platforms, and applications You ll work with cutting-edge tools and collaborate with teams across the organization to continuously enhance our security posture Key Responsibilities Conduct advanced red teaming, ethical hacking, and penetration testing activities Identify and exploit vulnerabilities across networks, applications, and cloud environments (AWS, Azure, or GCP) Demonstrate a strong understanding and hands-on experience with network and cloud security testing Simulate real-world cyberattacks and provide actionable insights to improve defenses Apply deep knowledge of the MITRE ATT&CK framework to drive testing strategies Investigate and test known CVEs and contribute to proactive perimeter defense strategies Collaborate with teams on security tool evaluations and product testing Contribute to threat modeling, reverse engineering, and vulnerability research Requirements 5-9 years of experience in cybersecurity with a strong focus on red teaming Minimum 4 years of hands-on experience in ethical hacking and penetration testing CEH certification is mandatory; OSCP or GPEN certification is highly preferred Expert knowledge in: Network penetration testing and network security Public cloud security assessments (AWS, Azure, or GCP) Cybersecurity tools, tactics, and technologies used for system compromise MITRE ATT&CK framework (mandatory) Strong experience with CVE exploitation and external perimeter testing Solid understanding of web vulnerabilities including parameter manipulation, session hijacking, and XSS Preferred skills in: Linux, programming, and SQL Reverse engineering and cryptography Security product evaluations and integrations Why o9? Be part of a company that s changing how businesses plan and operate while also making a positive environmental impact Work with passionate people in a collaborative, fast-paced environment Opportunity to grow your skills and career as part of a global team that values innovation and integrity More about us At o9, transparency and open communication are at the core of our culture Collaboration thrives across all levels hierarchy, distance, or function never limit innovation or teamwork Beyond work, we encourage volunteering opportunities, social impact initiatives, and diverse cultural celebrations With a $37 billion valuation and a global presence across Dallas, Amsterdam, Barcelona, Madrid, London, Paris, Tokyo, Seoul, and Munich, o9 is among the fastest-growing technology companies in the world Through our aim10x vision, we are committed to AI-powered management, driving 10x improvements in enterprise decision-making Our Enterprise Knowledge Graph enables businesses to anticipate risks, adapt to market shifts, and gain real-time visibility By automating millions of decisions and reducing manual interventions by up to 90%, we empower enterprises to drive profitable growth, reduce inefficiencies, and create lasting value o9 is an equal-opportunity employer that values diversity and inclusion We welcome applicants from all backgrounds, ensuring a fair and unbiased hiring process Join us as we continue our growth journey!

Posted 1 month ago

Apply

3.0 - 7.0 years

5 - 9 Lacs

Bengaluru

Work from Office

Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 4 plus years of experience Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding Practices: Knowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat Modelling: Ability to conduct threat modelling sessions to identify and mitigate security risks Preferred technical and professional experience Vulnerability Assessment: Experience in conducting vulnerability assessments and penetration testing Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST) tools. Security Tools: Proficiency in using security tools like Burp Suite, Nessus, or Fortify

Posted 1 month ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies