360 Ethical Hacking Jobs - Page 9

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 10.0 years

6 - 12 Lacs

Chennai

Remote

Job Description CyberSecOn is looking for a talented and dedicated Cyber Security Analyst who can work remotely. A Cyber Security Analyst is responsible for maintaining the security and integrity of data. The security analyst must possess knowledge of every aspect of information security to protect company assets from evolving threat vectors.The main responsibilities will include: Monitor and investigate security events and alerts from various sources, such as logs, network traffic, threat intelligence, and user reports. Conduct proactive and reactive threat hunting campaigns to uncover hidden or emerging threats on the cloud environment. Perform root cause analysis and incident response to ...

Posted 3 months ago

AI Match Score
Apply

4.0 - 8.0 years

7 - 17 Lacs

Noida, Delhi

Work from Office

Conduct comprehensive penetration testing of networks, web applications, mobile applications, and other systems to identify security vulnerabilities. Perform vulnerability assessments and provide detailed recommendations for remediation. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP, MITRE ATT&CK etc. Strong knowledge of common security vulnerabilities, attack vectors, threat modelling and exploitation techniques. Proficiency in using penetration testing tools and frameworks such as Nessus, Burp Suite, Nmap, and other ethical hacking tools. Strong understanding of network protocols, network and application security architectures, and common vulnerabil...

Posted 3 months ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

As a Senior Consultant in the Cyber Security department located in Gurugram, you will be responsible for various tasks and possess a range of skills and experiences. Your role will involve working on programming languages used for storing and processing raw data, having knowledge of operating systems such as Windows, macOS, Linux, UNIX, and other OSs, conducting penetration testing, understanding ethical hacking and coding practices, mastering advanced persistent threat management, ensuring firewall safety and management, utilizing encryption techniques and capabilities, conducting compliance assessments, and working with frameworks like COBIT and ITIL. You should have at least 5 years of re...

Posted 3 months ago

AI Match Score
Apply

0.0 - 5.0 years

2 - 6 Lacs

Noida

Work from Office

Roles and Responsibilities can take corporate and classroom regular training batches of students and professionals Desired Candidate Profile CEHv12, NPT, WAPT, Linux, Cyber Security, Ethical Hacking Perks and Benefits 2 Lac to 6 Lacs

Posted 3 months ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

haryana

On-site

As a Security Testing professional, you will be responsible for conducting application security assessments with 3-6 years of experience. This includes tasks such as Architecture and Design review, Code Review utilizing tools like CheckMarx, Penetration testing (Ethical Hacking), and Vendor Risk Assessment. You must possess a strong working knowledge of key security technologies such as Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST). Your role will involve running and analyzing security Penetration testing to identify security vulnerabilities and recommend appropriate countermeasures for security enhancements. It is essential to have a solid unders...

Posted 3 months ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

chandigarh

On-site

As a Cybersecurity Trainer at Clinilaunch Research Institute in Bangalore, you will be responsible for delivering engaging and comprehensive training across various cybersecurity courses. With 3-5 years of experience, you will guide students through foundational and advanced cybersecurity topics, hands-on labs, and exam preparation for industry-recognized certifications. Your key responsibilities will include conducting training on Ethical Hacking, Network Security, Penetration Testing, Cybersecurity Risk Management, and Security Operations. Collaborating with the curriculum development team, you will enhance training content and methodologies. Assessing student progress and providing constr...

Posted 3 months ago

AI Match Score
Apply

3.0 - 8.0 years

9 - 14 Lacs

Bengaluru

Work from Office

Educational Requirements Bachelor of Engineering Service Line Infosys Quality Engineering Responsibilities As part of the Infosys delivery team, your primary role would be to ensure effective Design, Development, Validation and Support activities, to assure that our clients are satisfied with the high levels of service in the technology domain. You will gather the requirements and specifications to understand the client requirements in a detailed manner and translate the same into system requirements. You will play a key role in the overall estimation of work requirements to provide the right information on project estimations to Technology Leads and Project Managers. You would be a key cont...

Posted 3 months ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

ludhiana, punjab

On-site

You will be responsible for delivering high-quality cybersecurity training sessions to individuals at various skill levels. Your role will involve preparing and presenting training materials, conducting hands-on labs, and providing ongoing support to ensure the success of our cybersecurity training programs. Key Responsibilities: - Develop, design, and deliver engaging cybersecurity training programs on various topics including network security, threat analysis, ethical hacking, risk management, data protection, and compliance. - Conduct theoretical and hands-on sessions using real-world examples and case studies to reinforce key concepts. - Evaluate the effectiveness of training programs an...

Posted 3 months ago

AI Match Score
Apply

1.0 - 5.0 years

0 Lacs

haryana

On-site

As an ethical hacker at Greenlight Planet, your primary responsibility will be to identify security vulnerabilities in various vendor smartphones and provide recommendations on security measures. You will need to stay up-to-date with information dissemination channels, conduct testing on available jailbreaks, and create detection solutions to enhance the security of Android devices. Your tasks will include performing reconnaissance and testing hacking solutions from sources like the Darkweb and forums, collaborating with the Risk team on customer visits and field audits, standardizing phone model testing procedures, conducting periodic security reviews, and assisting in creating Mobile Devic...

Posted 3 months ago

AI Match Score
Apply

2.0 - 6.0 years

0 Lacs

kochi, kerala

On-site

As an Academic Advisor for Cybersecurity Training & Certification at Technovalley Software India Pvt. Ltd., located in Kochi, India, you will play a crucial role in guiding aspiring students, IT professionals, and corporate partners towards achieving internationally recognized certifications and unlocking global career opportunities. Your main responsibilities will include providing professional career guidance and counselling to individuals interested in pursuing Cybersecurity career paths such as Ethical Hacking, Cybersecurity Analyst, Computer Hacking Forensic Investigator, Offensive Security Certified Cybersecurity, Penetration Testing, SOC Analyst, Threat Intelligence, and Incident Resp...

Posted 3 months ago

AI Match Score
Apply

3.0 - 5.0 years

5 - 9 Lacs

Bengaluru

Work from Office

The ideal candidate will have a strong background in IT Services & Consulting and excellent analytical skills. Roles and Responsibility Collaborate with cross-functional teams to identify and prioritize project requirements. Develop and maintain complex data models and reports using various tools and technologies. Analyze large datasets to extract insights and trends, and provide recommendations to stakeholders. Design and implement process improvements to increase efficiency and productivity. Develop and maintain technical documentation for projects and processes. Provide training and support to junior team members on new tools and technologies. Job Requirements Strong understanding of IT S...

Posted 3 months ago

AI Match Score
Apply

9.0 - 14.0 years

30 - 45 Lacs

Hyderabad, Bengaluru

Hybrid

Role & responsibilities Overall - At least 8+ years of experience in performing security engineering and assessments of complex systems with AI / ML / Data Science capabilities and services 3+ years of experience auditing existing AI or machine learning systems for security risks and compliance. Development and implementation of AI content filtering mechanisms. Deployment and operation of tools and processes to analyze security threats and vulnerabilities in AI or machine learning systems. Identification and protection of sensitive data within AI solutions. Design and implementation of strategies to protect AI systems from cyber-attacks. Design and implementation of adversarial test plans. S...

Posted 3 months ago

AI Match Score
Apply

4.0 - 8.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Security Analyst at Dedalus, a prominent healthcare technology company, you will have the opportunity to contribute to the team in Chennai, India, and play a crucial role in enhancing healthcare services for a healthier planet. Your primary responsibility will involve Security Vulnerability Analysis and Penetration Testing, where you will assess, exploit, and report security vulnerabilities in software applications and infrastructure, providing recommendations for appropriate solutions. Working alongside a highly skilled team, your work will have a significant impact on the healthcare sector. Your duties will include: - Conducting Security Vulnerability Analysis, Threat Modelling, and R...

Posted 3 months ago

AI Match Score
Apply

2.0 - 6.0 years

5 - 12 Lacs

Noida, Gurugram

Hybrid

>> Job Description Experience: 3+ years with at-least 2-3 years in client facing advisory consulting role and managing a medium sized team Preferred Certifications: CEH, ECSA, OSCP, CISSP, CCSK, OCSE, CCSP, AWS Security Desired skill set: 1. Strong understanding of IT security standards and frameworks (OWASP, NIST, CIS) 2. Strong understanding of security risks in networks and application platforms 3. Strong understanding of network security, infrastructure security and application security 4. Strong understanding of OSI, TCP/IP model and network basics 5. Demonstrate technical penetration testing skills on IT infrastructure, web applications, mobile platforms and Red teaming 6. Strong techn...

Posted 3 months ago

AI Match Score
Apply

1.0 years

3 Lacs

IN

Remote

About the job: Position Overview: We are seeking a highly skilled and motivated ASM Specialist to join our Offensive Security Operations team. This role involves simulating real-world cyberattacks, identifying vulnerabilities, and actively managing the attack surface of enterprise environments. You will work closely with red teamers, threat intelligence analysts, and security stakeholders to detect, map, and reduce digital exposure across the organization's infrastructure. Key responsibilities: 1. Lead and execute Attack Surface Management (ASM) operations to identify external-facing vulnerabilities. 2. Simulate real-world attack scenarios within defined rules of engagement. 3. Maintain comp...

Posted 3 months ago

AI Match Score
Apply

2.0 - 7.0 years

0 - 1 Lacs

Visakhapatnam

Work from Office

FACULTY for Computer Science Engineering GITAM School of Technology , GITAM (Deemed to be University) The Department of Computer Science Engineering at GITAM invites bright and young faculty for Visakhapatnam Campus. GITAM is looking for applicants with a passion for teaching and demonstrated excellence in research. We are looking for candidates with specializations like Theoretical Computer Science ( Algorithms, Complexity, Graph Theory, Formal Methods) Systems and Architectures ( Networks, Operating Systems, Architectures, Distributed Systems including Cloud Computing and Blockchain) Cyber Security and Cyber Physical Systems ( IoT, Sensor networks, Edge computing) Data Structure & Database...

Posted 3 months ago

AI Match Score
Apply

0.0 - 1.0 years

3 - 3 Lacs

Vijayawada, Hyderabad

Work from Office

Job Title: Technical Trainer Openings : 3 Positions Type : Full-time offer with a 3-months internship period Stipend during Internship : 15,000/month CTC post-internship : 3.6 LPA Office Location : Hyderabad (Travel required for training programs in colleges) Experience : 01 years Immediate Joining Required Job Overview: We are looking for dynamic and passionate fresher trainers who are eager to make an impact through teaching. If you have excellent communication skills, prior experience in workshops, tutoring, or student mentoring, and a strong foundation in any one technology (e.g., Python, Java, Web Dev, AI/ML, Cloud, Data Science, etc.), we invite you to join our vibrant training team. T...

Posted 3 months ago

AI Match Score
Apply

3.0 - 5.0 years

0 Lacs

Lucknow

Work from Office

Key responsibilities Design and deliver instructor-led training on Cyber Security & Networking concepts. Create, update, and maintain training content, lab exercises, and case studies aligned with current industry standards. Provide practical exposure through real-world simulations, labs, and tools (e.g., Wireshark, Kali Linux, Metasploit, Cisco Packet Tracer, etc.). Conduct pre and post-assessments, doubt-clearing sessions, and track learner progress. Tailor sessions based on audiencefreshers, professionals, or corporate employees. Stay updated with the latest trends, threats, and tools in the cybersecurity domain. Deliver sessions on weekends or weekdays as per availability Requirements:- ...

Posted 3 months ago

AI Match Score
Apply

1.0 - 8.0 years

3 - 10 Lacs

Pune

Work from Office

Static/dynamic testing of mobile applications, Vulnerability Assessment, Penetration Testing, Cyber Security Assessment & Consulting. Secure Code Review, Web Application Security Testing, Firewall Rule Audit, Secure Configuration Review, Wireless Penetration Testing.

Posted 3 months ago

AI Match Score
Apply

11.0 - 15.0 years

35 - 40 Lacs

Pune

Work from Office

JD:- Application Security Lead Education Criteria (Must): B.Sc (IT/CS) / B.Tech in any Engineering background, BCA, MCA & M.Sc. Information Technology, or related field. CEH, CISSP, CISA, CISM, CRISC (If any security related certification) 11-15 years of experience in Application Security, Network Security, and IT Risk & Compliance, with hands-on expertise in security assessments, process audits, and application reviews. Experience in BFSI is preferred. Lead and manage the AppSec team consisting of L1 and L2 resources. Serve as the primary point of contact between the Client and the team for all project-related activities. Monitor daily operations, ensure resource optimization, and address a...

Posted 3 months ago

AI Match Score
Apply

5.0 - 10.0 years

7 - 12 Lacs

Kolkata, Mumbai, New Delhi

Work from Office

Skill Set : VAPT, OS Hardening, Ethical Hacking, SIEM, DLP, IAM, IRM Experience : 5+ Years Location : India/US Develop and implement strategic plans to achieve organizational goals and objectives. Lead and mentor teams, fostering collaboration, accountability, and high performance. Analyze business operations, identify areas for improvement, and recommend solutions. Oversee budgeting, financial analysis, and resource allocation to optimize operational efficiency. Monitor key performance indicators (KPIs) to ensure alignment with company goals. Build and maintain relationships with key stakeholders, partners, and clients. Ensure compliance with industry standards, regulations, and company pol...

Posted 3 months ago

AI Match Score
Apply

2.0 - 7.0 years

9 - 13 Lacs

Mumbai

Work from Office

As SIEM Analyst, you will be responsible for handling the daily monitoring of Information security events on the SIEM tools. Come join our team of IBM experts, who are leaders with vision, distinguished engineers and IT architects who have worked with thousands of clients to transform enterprise IT, migrate to cloud, apply automation and ensure business continuity. We help client run their IT better, accelerate innovation and deliver unmatched performance with the power automation. If you thrive in a dynamic, reciprocal workplace, IBM provides an environment to explore new opportunities every single day. And if you relish the freedom to bring creative, thoughtful solutions to the table, ther...

Posted 3 months ago

AI Match Score
Apply

3.0 - 7.0 years

7 - 11 Lacs

Bengaluru

Work from Office

Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 4 plus years of experience Application Security TestingExperience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding PracticesKnowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat ModellingAbi...

Posted 3 months ago

AI Match Score
Apply

3.0 - 8.0 years

3 - 12 Lacs

Pune

Work from Office

Responsibilities: Deliver structured training sessions (online or in-person) based on the provided 4-month CEH-aligned syllabus Teach tools such as Nmap, Burp Suite, Metasploit, Wireshark, SQLMap, John the Ripper, Aircrack-ng, etc.

Posted 3 months ago

AI Match Score
Apply

3.0 - 6.0 years

4 - 7 Lacs

Kochi

Work from Office

Job brief The Security Operation Centre (SOC) Information Security Analyst are the first level responsible for ensuring the protection of digital assets from unauthorized access, identify security incidents and report to customers for both online and on-premises. The position monitors and responds to security events from managed customer security systems as part of a team on a rotating 24 x 7 x 365 basis. They are alert and aggressive to filter out suspicious activity and mitigate risks before any incident occur. Your background should include exposure to security technologies including firewalls, IPS/IDS, logging, monitoring and vulnerability management. You should understand network securi...

Posted 3 months ago

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies