446 Ethical Hacking Jobs - Page 6

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 9.0 years

6 - 8 Lacs

hyderabad, chennai, bengaluru

Work from Office

About the Role: We are seeking a highly skilled and passionate Ethical Hacker Trainer to deliver top-quality training in ethical hacking, penetration testing, and cybersecurity practices . As a trainer, you will be responsible for designing and delivering engaging, hands-on learning experiences that equip learners with practical hacking skills, security awareness, and industry-recognized certifications. Key Responsibilities: Training Delivery: Deliver instructor-led training (ILT) and virtual instructor-led training (vILT) sessions on Ethical Hacking , Penetration Testing , and related topics. Teach courses aligned with certifications like CEH (Certified Ethical Hacker) , CompTIA PenTest+ , ...

Posted 2 months ago

AI Match Score
Apply

1.0 - 3.0 years

4 - 7 Lacs

hyderabad, chennai, bengaluru

Work from Office

Job Summary: We are seeking a skilled and proactive Cybersecurity professional to safeguard the organizations digital assets, data, and systems from cyber threats. The role involves monitoring security systems, analyzing vulnerabilities, implementing protective measures, and responding to security incidents. The ideal candidate will possess strong technical expertise, risk awareness, and a deep understanding of cybersecurity frameworks and best practices. Key Responsibilities: Monitor and analyze network traffic, system logs, and security alerts to detect and respond to suspicious activities. Implement and manage security tools and technologies such as firewalls, SIEM, IDS/IPS, EDR, and anti...

Posted 2 months ago

AI Match Score
Apply

0.0 - 1.0 years

2 - 3 Lacs

bengaluru

Work from Office

Capable of handling students virtually and physically in thebatch strength of 200+ and developing their skills job ready for cybersecurityspace. Provide cyber security training at an intermediate level forB.Tech & Engineering Students. Preparing Study materials for training students via avariety of training methods for improving training deliveries. Handling student queries effectively and efficiently. Maintain training related to Data (attendance, feedbackforms evaluation scores and certificate issued). Conduct training sessions on cybersecurity, NetworkingEssentials, malware analysis, and related topics. Stay updated with the latest cybersecurity trends, threats,and best practices. Conduct...

Posted 2 months ago

AI Match Score
Apply

6.0 - 10.0 years

20 - 25 Lacs

mumbai

Work from Office

Requisition Id 1579277 About EY EY is a global leader in assurance, tax, strategy and transactions and consulting services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities. EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guara...

Posted 2 months ago

AI Match Score
Apply

5.0 - 10.0 years

19 - 25 Lacs

mumbai

Work from Office

Requisition Id 1648074 About EY EY is a global leader in assurance, tax, strategy and transactions and consulting services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities. EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guara...

Posted 2 months ago

AI Match Score
Apply

2.0 - 7.0 years

4 - 9 Lacs

maharashtra

Work from Office

Description JD for Azure Security Engineer. Bachelors degree in Computer Science, Information Technology, or related field (or equivalent work experience). Minimum 6 years of industry experience. Proficiency in cloud services and tools Specific to Azure and strong understanding of Azure Cloud Security Services. Proven experience as Azure security Engineer with azure EntraID Identity and Access Management RBAC, ID governance, PIM/PAM, Conditional Access Policies, ID protection, MFA Access Reviews. Work under the guidance of security Architect team and help in Designing security Standards. Collaborate with engineering and architecture teams to identify security risks and recommend mitigating c...

Posted 2 months ago

AI Match Score
Apply

2.0 - 4.0 years

0 - 0 Lacs

gurugram

Work from Office

Role Title: Full-time Penetration Tester / SOC Analyst Nihon Cyber Defence, a leading Japanese Cyber Security company, are looking for a Penetration tester with knowledge in SOC operations to join our growing India SOC team, supporting their emerging worldwide client base. This is a dual-role : primarily focused on internal and external penetration testing projects while also supporting incident detection and response . This is a desk job, no remote work. Willing to work in 24x7 rotational shifts, including nights and weekends. Responsibilities Penetration Testing Responsibilities Plan, execute, and report on network, web application, and infrastructure penetration tests . Perform vulnerabil...

Posted 2 months ago

AI Match Score
Apply

2.0 - 4.0 years

3 - 7 Lacs

hyderabad, chennai, bengaluru

Work from Office

Job Summary We are seeking an experienced and ethical-minded Ethical Hacker (Penetration Tester) to evaluate the security posture of our systems, applications, and networks by identifying vulnerabilities and recommending mitigation steps. You will perform authorized simulated attacks, produce actionable reports, and work closely with engineering and operations teams to strengthen defenses. Key Responsibilities Plan and execute authorized penetration tests against web applications, APIs, mobile apps, networks, cloud environments (AWS/Azure/GCP), and internal infrastructure. Perform vulnerability assessments and manual exploit development where required. Conduct social engineering assessments ...

Posted 2 months ago

AI Match Score
Apply

6.0 - 11.0 years

13 - 23 Lacs

chennai, bengaluru, delhi / ncr

Hybrid

Immediate joiner. "Ethical hacking"-Mandatory "network penetration testing"-Mandatory Kali Linux or Exploitation or Metasploit or "red team" or Threat hunter” (Any 1 or 2)

Posted 2 months ago

AI Match Score
Apply

6.0 - 10.0 years

13 - 17 Lacs

hyderabad, bengaluru, delhi / ncr

Work from Office

Role & responsibilities "Ethical hacking"-Mandatory "network penetration testing"-Mandatory Kali Linux or Exploitation or Metasploit or "red team" or Threat hunter” (Any 1 or 2)

Posted 2 months ago

AI Match Score
Apply

0.0 - 3.0 years

2 - 3 Lacs

kolkata

Work from Office

Conducting Security Audits ((VAPT, WAPT, Mobile App security, ITGC or different IT compliance audit) Audit Report Preparation Hold meetings with clients for audit purposes.

Posted 2 months ago

AI Match Score
Apply

5.0 - 10.0 years

8 - 13 Lacs

pune, chennai, bengaluru

Work from Office

Developers who have experience in fixing/coding to OWASP secure coding practices. Candidate with demonstrated experience in not only fixing security defects, but also in writing code using best practices. We are looking for candidates that can come in, learn our codebases, find where issues are, and fix the issues with little to no supervision.

Posted 2 months ago

AI Match Score
Apply

1.0 - 3.0 years

2 - 4 Lacs

mumbai

Work from Office

Strong understanding of vulnerability management processes — identification, validation, prioritization, and remediation tracking. Hands-on experience with VA tools such as: Qualys, Tenable Nessus, Rapid7 InsightVM, or similar. Knowledge of endpoint and server security controls, including patch management and configuration baselines. Familiarity with network and OS-level vulnerabilities across Windows, Linux, and application environments. Understanding of CVSS scoring, CVE analysis, and threat context mapping. Basic knowledge of firewall, antivirus, SIEM, and EDR/XDR tools (for correlation and validation). Experience in generating and analyzing VA reports and coordinating with technical team...

Posted 2 months ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

kochi, kerala

On-site

Job Description: You are seeking a qualified and passionate Cyber Security & Ethical Hacking Trainer/Faculty to join the training team. You will deliver engaging and practical sessions on various cybersecurity concepts, tools, and techniques including ethical hacking. You will guide students through hands-on lab exercises, project work, and career preparation. Key Responsibilities: - Deliver engaging and practical sessions on cybersecurity concepts, tools, and techniques - Guide students through hands-on lab exercises, project work, and career preparation Qualifications Required: - Proficiency in cybersecurity concepts, tools, and techniques - Experience in ethical hacking - Strong communica...

Posted 2 months ago

AI Match Score
Apply

2.0 - 6.0 years

0 Lacs

maharashtra

On-site

As a Computer Teacher at Youth I.T. Tech Academy, located in Charkop, Kandivali(W), you will play a crucial role in delivering engaging and interactive lessons in computer courses to young learners. Your responsibilities will include designing lesson plans, developing curriculum, assessing student progress, and providing constructive feedback. It will be essential for you to create a positive and inclusive learning environment while staying updated on the latest technological trends. Key Responsibilities: - Designing engaging lesson plans for computer courses - Developing curriculum that meets the needs of young learners - Assessing student progress and providing feedback for improvement - M...

Posted 2 months ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

navi mumbai, maharashtra

On-site

As a Senior Trainer in Cyber Security & Ethical Hacking at MCTA (Marketing Courses Training Academy), your role will involve teaching cyber security topics to students both in a classroom and online setting. You will be responsible for developing and delivering curriculum on cybersecurity fundamentals and advanced topics, conducting hands-on labs and simulations, and ensuring that students are engaged and encouraged in their practical learning. Additionally, you will need to stay updated with the latest trends in cyber security, assist students with doubts, assignments, and career guidance, and collaborate with other instructors and industry professionals to enhance training programs. Key Re...

Posted 2 months ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

As a Senior Consultant in the Cyber Security department based in Gurugram, your role will involve a variety of responsibilities and qualifications: You should be open to travel for this position, and you will be expected to have expertise in various areas of cyber security. Key Responsibilities: - Programming Languages: Proficiency in languages used for storing and processing raw data. - Operating Systems Knowledge: Understanding of OSs such as Windows, macOS, Linux, UNIX, and new OSs. - Penetration Testing: Conducting penetration testing to assess system security and vulnerabilities. - Ethical Hacking and Coding Practices: Utilizing threat modeling and configurations. - Advanced Persistent ...

Posted 2 months ago

AI Match Score
Apply

3.0 - 7.0 years

7 - 11 Lacs

bengaluru

Work from Office

Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 5 plus years of experience Application Security TestingExperience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding PracticesKnowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat ModellingAb...

Posted 2 months ago

AI Match Score
Apply

0.0 - 2.0 years

1 - 3 Lacs

hyderabad, chennai, bengaluru

Work from Office

Role Overview: The Threat Intelligence Analyst is responsible for identifying, analyzing, and communicating current and emerging cyber threats. You will collect intelligence from open and proprietary sources, assess potential risks, and support decision-making related to threat detection, incident response, and risk mitigation. Key Responsibilities: Threat Monitoring & Analysis Monitor global threat landscapes to identify new or evolving cyber threats, tactics, techniques, and procedures (TTPs) Analyze indicators of compromise (IOCs), malware behavior, threat actors, and attack vectors Correlate intelligence with internal security events to identify potential risks Intelligence Collection & ...

Posted 2 months ago

AI Match Score
Apply

4.0 - 7.0 years

0 - 2 Lacs

hyderabad

Hybrid

scription involves simulating malicious attacks to identify and report vulnerabilities in a company's systems, networks, and software before malicious actors can exploit them. Key responsibilities include performing penetration tests, assessing security posture, researching threats, documenting findings, and recommending security upgrades and policies to enhance overall cybersecurity. This role requires strong technical skills in networking, operating systems, and programming, as well as excellent communication and troubleshooting abilities. Key Responsibilities Vulnerability Assessment: Conduct penetration tests and vulnerability scans to find weaknesses in systems, networks, and applicatio...

Posted 2 months ago

AI Match Score
Apply

1.0 - 3.0 years

3 - 4 Lacs

tambaram, chennai

Work from Office

Role Overview: This engineer position is designed to support the internal audit and compliance team in performing cybersecurity audits and assessments. The role provides hands-on exposure to cybersecurity standards such as ISO 27001, NIST and SOC 2 and offers a learning pathway for becoming a certified lead auditor. Key Responsibilities: Assist in planning and conducting cybersecurity audits under supervision. Review and validate IT policies, procedures, and security controls. Collect and document audit evidence (logs, reports, screenshots). Support risk assessments and gap analysis activities. Participate in audit walkthroughs and internal interviews. Track and follow up on audit findings a...

Posted 2 months ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

As a Security Consultant specializing in Microsoft Sentinel & Defender, your role will involve installing and configuring Sentinel SIEM and SOAR solutions for hybrid environments. You will be responsible for configuring data ingestion, storage, and analytics, as well as enhancing the overall security posture to improve detection and response to cyber threats. Your key responsibilities will include: - Installing and configuring Sentinel SIEM and SOAR solutions for hybrid environments - Configuring data ingestion, storage, and analytics - Developing security policies and implementing security measures - Conducting security event correlation and analysis - Strengthening incident response proces...

Posted 2 months ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

chennai, tamil nadu

On-site

Role Overview: As a Vulnerability Management Analyst, your role will involve identifying, assessing, and mitigating security vulnerabilities within the organization. Your background in cybersecurity, risk management, and vulnerability assessment will be essential for this position. Key Responsibilities: - Conduct regular vulnerability assessments using industry-standard tools. - Analyze vulnerabilities based on risk and impact, and prioritize remediation efforts. - Develop and implement strategies to manage and mitigate identified threats. - Collaborate with IT and security teams to ensure secure access solutions. - Monitor and respond to vulnerability-related incidents and issues. - Ensure ...

Posted 2 months ago

AI Match Score
Apply

10.0 - 15.0 years

4 - 8 Lacs

ahmedabad

Work from Office

Collaborate with cross-functional teams to achieve strategic outcomes. Apply subject expertise to support operations, planning, and decision-making. Utilize tools, analytics, or platforms relevant to the job domain. Ensure compliance with policies while improving efficiency and outcomes.

Posted 2 months ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

kozhikode, kerala

On-site

As an Ethical Hacking Faculty at our company based in Calicut, your role will involve training students in cybersecurity and ethical hacking. You should have practical experience in cybersecurity tools and hacking techniques, keeping yourself updated with the latest security trends and threats. Key Responsibilities: - Conduct theory and hands-on training sessions on ethical hacking, penetration testing, network security, and cybersecurity tools. - Develop and maintain training materials, lab exercises, and real-world case studies. - Guide students through live projects, practical assessments, and hacking simulations. - Teach various ethical hacking concepts such as footprinting, scanning, en...

Posted 2 months ago

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies