Jobs
Interviews

234 Ethical Hacking Jobs - Page 6

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

0.0 - 1.0 years

2 - 3 Lacs

Gadchiroli

Work from Office

[{"Salary":null , "Posting_Title":"Trainer - Cyber Security" , "Is_Locked":false , "City":"Gadchiroli" , "Industry":"NGO / Social Services","Job_Description":" Handling students virtually and training and developing skills to be job ready for cybersecurity space. Provide cyber training at an intermediate level for software Engineering/Software development personnel. Preparing Study materials for training students via a variety of training methods for improving training deliveries. Handling student queries effectively and efficiently. Maintain training related to MIS (attendance, feedback forms evaluation scores and certificate issued). Conduct training sessions on cybersecurity fundamentals, ethical hacking, network security, malware analysis, and related topics. Stay updated with the latest cybersecurity trends, threats, and best practices. Conduct workshops and awareness sessions on cybersecurity Requirements Bachelor/Master degree in Cyber Security, Information Technology Computer Science, or a related field. Strong understanding of cybersecurity principles, network security, ethical hacking, firewalls, and intrusion detection systems. Hands-on experience with security tools, penetration testing, and vulnerability assessments. Good communication, presentation, and training skills. Prior experience in training, mentoring, or teaching is an added advantage.

Posted 2 months ago

Apply

1.0 - 5.0 years

5 - 14 Lacs

Mumbai Suburban

Work from Office

Job Summary: We are looking for enthusiastic Cyber Security Engineers with atleast 1 year of experience to join our dynamic team. The ideal candidate should have strong networking skills, extensive experience in Vulnerability Assessment and Penetration Testing (VAPT), and a solid understanding of network architecture, protocols, and security tools and the passion to learn, perfom and grow in the organisation. The role involves conducting in-depth security assessments on network devices and web applications, including the application of fuzzing techniques. Key Responsibilities: Vulnerability Assessment and Penetration Testing (VAPT): Lead and conduct comprehensive VAPT on network devices and web applications to identify and address security vulnerabilities. Network Security Expertise: Apply deep knowledge of network protocols, firewalls, IDS/IPS, and VPNs to ensure robust security across the network. Custom Security Tool Development: Develop and maintain custom security tools and scripts using Python, Bash, or PowerShell to enhance security assessments and automate processes. Network Tools Proficiency: Utilize tools such as Wireshark, Nmap, Nessus, Burp Suite, and others for network analysis and security testing. Security Assessments: Perform thorough security assessments on network devices, ensuring alignment with industry standards and best practices. Protocol Fuzzing Understanding: Apply protocol fuzzing techniques to uncover vulnerabilities in network devices and recommend effective remediation strategies. Communication: Clearly articulate complex security issues to both technical and non-technical stakeholders, ensuring a comprehensive understanding of risks and solutions. Continuous Improvement: Stay updated with the latest cybersecurity trends, threats, and technologies to enhance the organization's security posture. Qualifications: Experience: 1-2 years of relevant experience in cybersecurity, with a focus on networking, VAPT, and security assessments. Technical Skills: Strong networking skills and understanding of network architecture. Proficiency in network protocols, firewalls, IDS/IPS, and VPNs. Advanced programming skills in Python, Bash, or C/C++. Expertise in using network security tools (e.g., Wireshark, Nmap, Nessus, Burp Suite). Certifications: CEH, OSCP, or CRTP certifications are highly desirable. Communication: Excellent verbal and written communication skills, capable of conveying security concepts to diverse audiences. Problem-Solving: Strong analytical and problem-solving abilities, with keen attention to detail. Preferred Skills: Experience in security assessments on network devices. Understanding of web application fuzzing techniques. Ability to work independently and as part of a team. Education: Masters /Bachelors degree in Computer Science, Information Technology, Cyber Security, Electronics, Telecommunication or a related field (or equivalent experience).

Posted 2 months ago

Apply

4.0 - 9.0 years

19 - 32 Lacs

Nashik

Work from Office

exp in Penetration Testing of embedded systems or research related cybersecurity roles. -knowledge in automotive bus and interface systems like CAN, LIN,JTAG, I2C, SPI. Exp in several hacking tools, idially directy usable in embedded automotive

Posted 2 months ago

Apply

4.0 - 9.0 years

19 - 32 Lacs

Nagpur

Work from Office

exp in Penetration Testing of embedded systems or research related cybersecurity roles. -knowledge in automotive bus and interface systems like CAN, LIN,JTAG, I2C, SPI. Exp in several hacking tools, idially directy usable in embedded automotive

Posted 2 months ago

Apply

7.0 - 12.0 years

22 - 35 Lacs

Nashik

Work from Office

Creation of test cases, execution of penetration- fuzz testing together with team on automotive ECU’s & embedded controllers. -Identify weaknesses and vulnerabilities. -Presenting/Reporting of findings of Penetration Tests to authority Required Candidate profile Engineering Graduate. Must have thorough knowledge of Automobile Industry. Ceber Security certification is added advantage. knowledge of Python, CAN, Security Algorithm., decoding security algorithm

Posted 2 months ago

Apply

7.0 - 12.0 years

22 - 35 Lacs

Nagpur

Work from Office

Creation of test cases, execution of penetration- fuzz testing together with team on automotive ECU’s & embedded controllers. -Identify weaknesses and vulnerabilities. -Presenting/Reporting of findings of Penetration Tests to authority Required Candidate profile Engineering Graduate. Must have thorough knowledge of Automobile Industry. Ceber Security certification is added advantage. knowledge of Python, CAN, Security Algorithm., decoding security algorithm

Posted 2 months ago

Apply

7.0 - 12.0 years

22 - 35 Lacs

Sindhudurg

Work from Office

Creation of test cases, execution of penetration- fuzz testing together with team on automotive ECU’s & embedded controllers. -Identify weaknesses and vulnerabilities. -Presenting/Reporting of findings of Penetration Tests to authority Required Candidate profile Engineering Graduate. Must have thorough knowledge of Automobile Industry. Ceber Security certification is added advantage. knowledge of Python, CAN, Security Algorithm., decoding security algorithm

Posted 2 months ago

Apply

7.0 - 12.0 years

22 - 35 Lacs

Pune

Work from Office

Creation of test cases, execution of penetration- fuzz testing together with team on automotive ECU’s & embedded controllers. -Identify weaknesses and vulnerabilities. -Presenting/Reporting of findings of Penetration Tests to authority Required Candidate profile Engineering Graduate. Must have thorough knowledge of Automobile Industry. Ceber Security certification is added advantage. knowledge of Python, CAN, Security Algorithm., decoding security algorithm

Posted 2 months ago

Apply

4.0 - 9.0 years

19 - 32 Lacs

Pune

Work from Office

exp in Penetration Testing of embedded systems or research related cybersecurity roles. -knowledge in automotive bus and interface systems like CAN, LIN,JTAG, I2C, SPI. Exp in several hacking tools, idially directy usable in embedded automotive

Posted 2 months ago

Apply

5.0 - 10.0 years

2 - 7 Lacs

Pune

Work from Office

: Job Title- I&A On-boarding Information Security Analyst, Associate Location- Pune, India Role Description: As I&A On-boarding Information Security Analyst you will be part of Access Lifecycle On-boarding global family which includes access management for application end user recertification On-boarding, user access for request & approval, user provision On-boarding and Functional Taxonomy SoD On-boarding & maintenance as well as IDAHO (Access concept) SME as central DB services. Deutsche Bank is looking for bright and open-minded individuals to support Business Identity & Access Services within Access Lifecycle Solution On-boarding team for application end user request & approval as well as end user access provision central service On-boarding. A key success factor of the Access Lifecycle Solution On-boarding team is the quick understanding of complex application set ups for Identity & Access Management and support Information Security Officer (ISO) and IT Application Owner (ITAO) along end-to-end central solution On-boarding process across DB. You will gain insights into the complete Identity & Access Management lifecycle as you will learn about the roles and entitlements and their set up, segregation of duties, application authentication and authorization process. What well offer you . 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities As I&A On-boarding Information Security Analyst you will be responsible to perform On-boarding assessments if an IT asset is applicable for end user application access for request & approval and business requirement gathering (based on existing KOP ID Admin procedures) to identify, how future user provisioning (ID Admin via automated connector or manual, centrally or decentral managed) will be set up between central request & approval platform and to be on-boarded application in adhering to Information Security (IS) internal and regulatory requirements. Efficiently engage, manage, and influence the main stakeholders, along with application On-boarding process including Information Security Officer, IT Application Owner, Engineering and Operations teams Provide process improvement inputs to various stakeholders involved. Proactively seek ways to improve upon existing practices and processes. Display insight and ability in identifying issues and develop successful solutions. Report and escalate potential risks to the management to help avoid / minimize the impact. Work with multiple, distributed teams (across different locations) Support develops key operational procedures where necessary and ensure adherence to all such defined policies. Comfortable with associated disciplines of Security Policy and Governance in banking domain Very good presentation and communication skills allowing to communicate with our stakeholders. A structured and methodological way of working with the objective to deliver high quality results. Supports tough people decisions to ensure people performance is aligned with organization imperatives and needs. Addresses individual performance issues, where necessary, to drive for high performance. Pro-active and flexible working approach, Team spirit Your skills and experience Minimum 5 years working experience in Identity & Access Management, Governance, Risk and Control related topics. Team management experience Basic knowledge and/or willingness to work with industry best practices and frameworks like ISO27001, NIST, CSA CCM, COBIT, ITIL Good business analyses knowledge of system design, development, implementation, and user support principles and practices Knowledge of IT Service Management or IT Governance or IT Delivery Management or IT Project Management or IT Delivery background or IT Security Knowledge on Database Systems, application interactions and server operating systems Excellent Excel knowledge Competencies: Self-motivated and flexibility to work autonomously in virtual and multicultural teams. Good communication skills (both written and verbal), fluent in English (written/verbal) Good analytical skills and problem-solving abilities Pro-active and flexible working approach A structured and methodological way of working with the objective to deliver high quality results. Flexible mindset with an eye for detail and continuous improvement Good understanding in business related information Being flexible, open minded, able to share information, transfer knowledge and expertise to stakeholders and other team members. How well support you . . . .

Posted 2 months ago

Apply

3.0 - 7.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 5 plus years of experience Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding Practices: Knowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat Modeling: Ability to conduct threat modeling sessions to identify and mitigate security risks Preferred technical and professional experience Vulnerability Assessment: Experience in conducting vulnerability assessments and penetration testing Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST) tools. Security Tools: Proficiency in using security tools like Burp Suite, Nessus, or Fortify

Posted 2 months ago

Apply

4.0 - 7.0 years

10 - 11 Lacs

Mumbai, Nagpur, Thane

Work from Office

EMERSON INNOVATION CENTER is looking for Product Security Engineer to join our dynamic team and embark on a rewarding career journey Analyzing customer needs to determine appropriate solutions for complex technical issues Creating technical diagrams, flowcharts, formulas, and other written documentation to support projects Providing guidance to junior engineers on projects within their areas of expertise Conducting research on new technologies and products in order to recommend improvements to current processes Developing designs for new products or systems based on customer specifications Researching existing technologies to determine how they could be applied in new ways to solve problems Reviewing existing products or concepts to ensure compliance with industry standards, regulations, and company policies Preparing proposals for new projects, identifying potential problems, and proposing solutions Estimating costs and scheduling requirements for projects and evaluating results

Posted 2 months ago

Apply

10.0 - 20.0 years

25 - 40 Lacs

Bengaluru

Work from Office

Job Title: Senior Cyber Defense Operations Analyst Location: Bengaluru, India Experience: 8+ years Job Type: Full-time Department: Cybersecurity / Information Security / SOC Job Summary: We are seeking a highly skilled and experienced Senior Cyber Defense Operations Analyst to join our cybersecurity team in Bengaluru. The ideal candidate will lead and coordinate cyber defense activities, manage incident response efforts, monitor threats, and provide strategic guidance to strengthen our cyber defense posture. This is a hands-on technical and leadership role within a fast-paced, mission-critical environment. Key Responsibilities: Lead day-to-day operations of Cyber Defense including threat detection, response, and mitigation. Manage and mentor a team of SOC analysts and incident responders. Monitor SIEM and other security tools for indications of compromise, suspicious behavior, and known threats. Coordinate and manage high-severity incidents and support root cause analysis and post-incident reviews. Develop and implement advanced threat detection use cases and response playbooks. Work closely with IT, Infrastructure, and AppSec teams to address vulnerabilities and security gaps. Participate in threat hunting and proactive intelligence-driven defense activities. Collaborate with global security teams to align local and enterprise-wide defense strategies. Ensure compliance with internal security policies, industry standards, and regulatory frameworks (e.g., ISO 27001, NIST, GDPR). Regularly review and improve security operations processes and toolsets. Provide executive-level reporting on threat landscape, incident metrics, and defense posture. Required Qualifications: 8+ years of experience in cybersecurity with a strong focus on Security Operations or Cyber Defense. Proven experience with SIEM (e.g., Splunk, QRadar, LogRhythm), EDR (e.g., CrowdStrike, SentinelOne), and SOAR platforms. Strong understanding of MITRE ATT&CK, cyber kill chain, and threat intelligence frameworks. Expertise in incident response, digital forensics, malware analysis, and threat hunting. Familiarity with cloud security (AWS, Azure, or GCP), including monitoring and defending cloud-native environments. Experience with scripting (Python, PowerShell, etc.) for automation and analysis. Strong understanding of TCP/IP, network protocols, and security architectures. Certifications such as CISSP, GCIA, GCIH, CEH, or similar are highly desirable. Preferred Qualifications: Experience working in a global or large-scale enterprise security environment. Knowledge of DevSecOps and integration of security into CI/CD pipelines. Understanding of data privacy regulations relevant to cybersecurity (e.g., GDPR, HIPAA). Leadership experience in managing small-to-mid sized security teams. Benefits: Competitive salary and performance-based bonuses Health and wellness benefits Flexible work hours and hybrid work options Learning and development support (certifications, courses) Opportunity to work with cutting-edge cybersecurity technologies Please share your updated profiles to naseeruddin.khaja@infosharesystems.com

Posted 2 months ago

Apply

3.0 - 8.0 years

1 - 2 Lacs

Greater Noida

Work from Office

Key Responsibilities Performing (Web, mobile, Cloud-based AWS, Azure, etc.), thick-clients business solutions and infrastructure pentest as assigned by the customer Work on full assessment & revalidation cases within customer defined timelines. Handling report creation based on pentest outcome as per customer template Develop new test cases, scenario & able to perform API pentesting. Develops, tests and validates solutions to remediate exploitable conditions on devices such as web servers, mail servers, routers, firewalls and intrusion detection systems | Provide results report and help team to evaluates, codes and implements software fixes (patches) to address system vulnerabilities such as malicious code (e.g., viruses), system exploitation using SQL injection, cross-site scripting, buffer overflows, parameter tampering, hidden field manipulation, cookie poisoning and web services manipulation | Conducts security assessments of systems and applications using penetration tests, ethical hacking tools and risk assessment/mediation methodologies to evaluate vulnerabilities. Perform source code review & configurations reviews against CIS benchmarks and security standard. Participating in end user calls with customer for requirement gathering, explanation of findings, technical discussions. About you Education, qualifications, and certifications Degree / Diploma Holders with good knowledge in pentest domain. Excellent verbal & written communication skills in English language Mandatory skill set Proficiency in Pentest tool such as using Burp suite and Kali Linux. Proficiency in Python and Java, Javascript, and other coding languages. Good experience in performing security penetration testing and vulnerability assessment. Experience in testing diverse infra components including various enterprise platforms such as private clouds, Openshift infra, dockers/container infra etc. Experience in Source code reviews, red team exercises, security architecture configuration reviews, and technical security compliance reviews Knowledge on Web-based applications and services (SOAP/REST) Well versed in writing reports, test cases etc. OSWP/ OSCE certification (preferred), SANS or Certified Penetration Tester, Certified Expert Penetration Tester or GIAC Certified Penetration Tester. Secondary skill set Knowledge on Azure & scripting language. Nice to have knowledge on other hacker tools;Appscan, Fortify, Wireshark, nmap, netcat, ZAP, FireBug, Nessus, John the Ripper. Experience Minimum of 3+ years related work experience in customer facing organizations within Pentest domain.

Posted 2 months ago

Apply

2.0 - 5.0 years

7 - 12 Lacs

Pune

Work from Office

Minimum requirement: Min 3-year experience performing security testing on Industrial control system components like PLCs, SCADA, IIOT devices etc. Equivalent science or engineering degree Min. one professional certifications such as Certified Ethical Hacker (CEH), ISA/IEC 62443, OSCP or certified Penetration Tester preferred.

Posted 2 months ago

Apply

2.0 - 5.0 years

7 - 12 Lacs

Mumbai

Work from Office

Minimum requirement: Min 3-year experience performing security testing on Industrial control system components like PLCs, SCADA, IIOT devices etc. Equivalent science or engineering degree Min. one professional certifications such as Certified Ethical Hacker (CEH), ISA/IEC 62443, OSCP or certified Penetration Tester preferred.

Posted 2 months ago

Apply

2.0 - 5.0 years

7 - 12 Lacs

Bengaluru

Work from Office

Minimum requirement: Min 3-year experience performing security testing on Industrial control system components like PLCs, SCADA, IIOT devices etc. Equivalent science or engineering degree Min. one professional certifications such as Certified Ethical Hacker (CEH), ISA/IEC 62443, OSCP or certified Penetration Tester preferred.

Posted 2 months ago

Apply

1.0 - 5.0 years

5 - 10 Lacs

Chennai

Work from Office

Role & responsibilities Proven experience in conducting penetration tests, vulnerability assessments, and security audits across diverse environments. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP etc. Proficiency in using penetration testing tools and frameworks such as Nessus, Burp Suite, Nmap, and other ethical hacking tools. Understanding of component/system architectures in OT environments. Preferred candidate profile Perks and benefits

Posted 2 months ago

Apply

1.0 - 5.0 years

5 - 10 Lacs

Bengaluru

Work from Office

Role & responsibilities Proven experience in conducting penetration tests, vulnerability assessments, and security audits across diverse environments. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP etc. Proficiency in using penetration testing tools and frameworks such as Nessus, Burp Suite, Nmap, and other ethical hacking tools. Understanding of component/system architectures in OT environments. Preferred candidate profile Perks and benefits

Posted 2 months ago

Apply

2.0 - 5.0 years

5 - 9 Lacs

Navi Mumbai

Work from Office

Exp Level: 2 to 5 years Educational Qualification I. B.E / B. Tech in: a) Cyber Security Computer Science/Computer Science & Engineering b) Information Technology/ Software Engineering/ c) Electronics & Communications Engineering d) Or equivalent degree in relevant discipline II. MCA or BCA or M.Tech / M.Sc/ B.Sc in: a) Computer Science b) Information Technology c) Electronic & Communications Engineering Required Certification Mandatory (Any-one): - Certified SOC Analyst (EC- Council), Computer Hacking Forensic Investigator (EC- Council), Certified Ethical Hacker (EC-Council), CompTIA Security+, CompTIA CySA+ (Cybersecurity Analyst), GIAC Certified Incident Handler (GCIH) or equivalent. Product Certifications (Preferred): - Product Certifications on SOC Security Tools such as SIEM/Vulnerability Management/ DAM/UBA/ SOAR/NBA etc. Key Roles & Responsibilities Proactively search for hidden and undetected cyber threats in banks environment. Establishing threat Hunting framework and continuous enhancement of the framework. Threat Hunting should be performed as per the outlined strategy & quarterly goals. Formulating hypothesis about potential threats based on known vulnerabilities, threat actor behaviors or anomalies in the environment. Leveraging security tools deployed in the bank. Indicators of Compromise (IOCs) or Indicators of Attack (IOAs) driven, hypothesis driven, leveraging frameworks like MITRE ATT&CK, threat intel driven, Analytics Driven threat hunting. Documenting threat hunting scenarios, detailing findings and conclusions, updating threat detection systems, and continuous refining of hunting methodologies. Correlation of multi-vector & multi-path attack vectors Contextual awareness of detected threats

Posted 2 months ago

Apply

4.0 - 9.0 years

6 - 11 Lacs

Noida

Work from Office

R1 RCM Inc. is a leading provider of technology-enabled revenue cycle management services which transform and solve challenges across health systems, hospitals and physician practices. Headquartered in Chicago, R1 is a publicly-traded organization with employees throughout the US and international locations. Our mission is to be the one trusted partner to manage revenue, so providers and patients can focus on what matters most. Our priority is to always do what is best for our clients, patients and each other. With our proven and scalable operating model, we complement a healthcare organizations infrastructure, quickly driving sustainable improvements to net patient revenue and cash flows while reducing operating costs and enhancing the patient experience. We are looking for a self-motivated Cybersecurity Analyst to join the R1 Cybersecurity Operations Team. We have a relentless focus on driving results for our customers and enabling them to invest more in patient care; in turn, this allows us to continue to grow our company and your career. The successful candidate must be well-versed in security operations, cyber security tools, intrusion detection, and secured networks. They will serve as an expert and be responsible for providing network and security operations technical analysis, assessment, and recommendations in the areas of real-time security situational awareness, operational network system and applications systems security monitoring. Responsibilities : Monitoring various security tools (e.g., Crowdstrike, Proofpoint, MS Sentinel, Azure VM ) to identify potential incidents, network intrusions, and malware events, etc. to ensure confidentiality, integrity, and availability of R1s architecture and information systems are protected Reviewing and analyzing log files to report any unusual or suspect activities. Utilize incident response use-case workflows to follow established and repeatable processes for triaging and escalating. Generating trouble tickets and performing initial validation and triage to determine whether incidents are security events using open-source intelligence (OSINT) Following established incident response procedures to ensure proper escalation, analysis and resolution of security incidents. Analyzing and correlating incident event data to develop preliminary root cause and corresponding remediation strategy. Providing technical support for new detection capabilities, recommendations to improve upon existing tools/capabilities to protect the R1s network, and assessments for High Value Assets. In this role, the successful candidate will maintain and monitor compliance with enterprise change management policies and procedures. Develop and maintain metrics & reports on the status of the R1 cyber security operations program. Attend and participate in Cyber security projects and the change management process. This includes interacting with business units and technical teams to understand what is coming and how their projects can be more secure from the beginning. As part of the overall Cybersecurity Operations Team, work in tandem with the security operations center (SOC), incident responders (when anomalous activity and host compromise occurs), and technology infrastructure and development team members. Participate in established incident response procedures to ensure proper escalation,analysisand resolution of security events and incidents. Managing and maintaining change detection and auditing tools Researching technology and application processing environments, operation, and associated user workflow to design, build, configure, implement, and document change compliance and audit rules within designated technologies. Reconciling changes detected by the system to authorized changes documented in service desk and change management applications. Analyzing large volumes of security event data from a variety of sources to identify suspicious and malicious activity. Documenting, logging and investigating security incidents. Performing case management throughout the incident lifecycle for moderately complex security incidents Design, build, and documenting security technology standards, processes, and operational workflows Operating and maintaining physical security monitoring systems Review, investigate, track, and monitor viruses and malware propagation and eradication throughout the enterprise. Monitoring compliance with enterprise security, compliance, and change management programs, policies, and processes Researching Threat Intelligence sources on the latest malware, trends, patches in order to keep the Security Program up-to-date. Providing metrics & reports on the status of tools, environments, and assets within the organization. Database and Application security to prevent attacks via Input Validation, Cross-Site Scripting, Buffer Overflowetc Required Qualifications : A minimum of 4 years of professional experience in an IT-related field Intermediate knowledge of security, monitoring, and networking technologies, tools, protocols and standards Knowledge of security policy, programs, process, and metrics CompTIA Security+ certification or equivalent professional experience in security operations Intermediate or advanced security, networking, or audit certification Recent experience with static and/or dynamic code review process Strong drive and passion to deliver distinctive end-products, a quick learner with a strong attention to detail and quality. Excellent interpersonal and communication skills Desired Qualifications: A Bachelors degree in a technical discipline (e.g., Computer Science, Business Analyst, etc.) Certification (or ability to obtain certification) in at least one of the following areasGeneral Security (CISSP), Incident Handling (GCIH), Cloud Security (GCLD, Cloud+, CCSK), and Ethical Hacking (CEH) Experience with advanced cyber security tools, network topologies, intrusion detection, and secured networks In-depth understanding of NIST SP 800-61,SOC 2 AICPA controls and frameworks. Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests. Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visit:R1RCM.com. R1 RCM Inc. (the Company) is committed to the principles of equal employment opportunity. The Companys practices and employment decisions, including those regarding recruitment, hiring, assignment, promotion, compensation, benefits, training, discipline, and termination shall not be based on any persons age, color, national origin, citizenship status, physical or mental disability, medical condition, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status or any other characteristic protected by federal, state or local law. Furthermore, the Company is committed to providing a workplace free from harassment based on any of the foregoing protected categories. Working in an evolving healthcare setting, we use our shared expertise to deliver innovative solutions. Our fast-growing team has opportunities to learn and grow through rewarding interactions, collaboration and the freedom to explore professional interests. Our associates are given valuable opportunities to contribute, to innovate and create meaningful work that makes an impact in the communities we serve around the world. We also offer a culture of excellence that drives customer success and improves patient care. We believe in giving back to the community and offer a competitive benefits package. To learn more, visitr1rcm.com Visit us on Facebook

Posted 2 months ago

Apply

3.0 - 7.0 years

16 - 20 Lacs

Gurugram

Work from Office

Position Summary: We are seeking a skilled IT Technician to join our Cyber Security team in India. The successful candidate will be responsible for design and test new Cyber Security portfolio elements, ensuring robust and secure solutions and tools to guarantee the cybersecurity of our installed plant base (brownfield) in accordance with the latest standards and guidelines (NIS2, NERC CIP, etc.) and customers demands. Working with technical experts from other business units, the aim is to ensure that these solutions meet the latest security standards and address potential threats in the IT/OT environment. Especially for our installed systems (brownfield), new cybersecurity technologies need to be assessed, and proof-of-concepts organized/created. As part of a hybrid working model and due to the nature of the role, you will need to travel frequently to Germany. A Snapshot of your Day How Youll Make an Impact (responsibilities of role) Planning, setup, operation and maintenance of an IT/OT test environment for the simulation of production systems. With a special focus on servers, firewalls, routers, switches, etc. and corresponding users and operating software Testing and evaluation of new cybersecurity technologies (HW and SW) for our HVDC/FACTS systems and their implementation in case of positive evaluation Ensuring protection against cyberattacks by implementing the latest technologies Support in the automation and optimization of production processes Collaborate with the Control & Automation team to integrate new technologies Preparation of technical documentation, installation instructions and user manuals Provide technical expertise for bidding activities, present security concepts, and assist in creating customer-centric solutions What You Bring Degree in network/communication technology, computer science or IT security, alternatively a relevant apprenticeship with several years of professional experience Sound knowledge of IT administration, e.g. network security, Windows Server, Active Directory, WSUS, virtualization, firewalls, remote access solutions, etc. Preferably several years of experience in IT/OT cybersecurity in the field of critical infrastructures Desirable, experience in automation technology. Familiarity with national and international IT security standards in an industrial environment (e.g. BDEW, NERC-CIP, IEC 62443) Very good knowledge of English (German will be an added advantage) High level of commitment, ability to work in a team and willingness to solve technical challenges independently, pragmatically and purposefully

Posted 2 months ago

Apply

5.0 - 10.0 years

3 - 7 Lacs

Bengaluru

Work from Office

Project Role : Security Engineer Project Role Description : Apply security skills to design, build and protect enterprise systems, applications, data, assets, and people. Provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Must have skills : Node.js Good to have skills : NAMinimum 5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Engineer, you will apply security skills to design, build, and protect enterprise systems, applications, data, assets, and people. You will provide services to safeguard information, infrastructures, applications, and business processes against cyber threats. Your day will involve ensuring the security of critical assets and systems. Roles & Responsibilities:- Expected to be an SME- Collaborate and manage the team to perform- Responsible for team decisions- Engage with multiple teams and contribute on key decisions- Provide solutions to problems for their immediate team and across multiple teams- Implement security measures to protect systems and data- Conduct security assessments and audits- Develop security policies and procedures Professional & Technical Skills: - Must To Have Skills: Proficiency in Node.js- Strong understanding of cybersecurity principles- Experience with security tools and technologies- Knowledge of network security protocols- Familiarity with cloud security best practices Additional Information:- The candidate should have a minimum of 5 years of experience in Node.js- This position is based at our Bengaluru office- A 15 years full-time education is required Qualification 15 years full time education

Posted 2 months ago

Apply

4.0 - 9.0 years

12 - 20 Lacs

Gurugram, Jaipur, Bengaluru

Work from Office

Strong understanding of OWASP Threats classification Exp with establishing penetration testing procedures & processes. Exp with standard security tools such as Metasploit, SQLMap, Nmap, OWASP ZAP, Burp Suite etc. Stay current with evolving threats Required Candidate profile Understanding of threat modelling, vulnerability assessment, and penetration testing Exp on application & infrastructure vulnerabilities, automated/manual testing, auditing and remediation techniques

Posted 2 months ago

Apply

6.0 - 11.0 years

8 - 14 Lacs

Hyderabad

Work from Office

Experience 6+ Years Skill SIEM Notice Period Immediate Employment Type Contract Work Mode WFO/Hybrid 6 years of SIEM, or SOC experience Strong communication, written, and verbal skills Experience with writing/creation of formal documentation such as reports, slide decks, and architecture diagrams Customer service/support experience Ability to conduct in-depth forensic analytical studies and investigations Role Preferences Splunk certification Coding or scripting experience Strong knowledge of Unix/Linux Security+, GIAC, SSGB, ITIL, or similar certification Working knowledge of applicable industry controls such as NIST 800-536 or Mitre Attack Framework

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies