3 Firewall Safety Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 - 9.0 years

0 Lacs

haryana

On-site

As a Senior Consultant in Cyber Security, your role will involve: - Being open to travel for project requirements. Your key responsibilities will include: - Utilizing various programming languages for storing and processing raw data. - Demonstrating knowledge of Operating Systems such as Windows, macOS, Linux, UNIX, and other emerging OSs. - Conducting Penetration Testing to assess system security and identify vulnerabilities. - Applying Ethical Hacking techniques and understanding coding practices for threat modeling and configurations. - Managing Advanced Persistent Threats by comprehending concepts like social engineering, phishing, and network access control. - Ensuring Firewall Safety a...

Posted 5 days ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

As a Senior Consultant in the Cyber Security department based in Gurugram, your role will involve a variety of responsibilities and qualifications: You should be open to travel for this position, and you will be expected to have expertise in various areas of cyber security. Key Responsibilities: - Programming Languages: Proficiency in languages used for storing and processing raw data. - Operating Systems Knowledge: Understanding of OSs such as Windows, macOS, Linux, UNIX, and new OSs. - Penetration Testing: Conducting penetration testing to assess system security and vulnerabilities. - Ethical Hacking and Coding Practices: Utilizing threat modeling and configurations. - Advanced Persistent ...

Posted 1 week ago

AI Match Score
Apply

5.0 - 9.0 years

0 Lacs

haryana

On-site

As a Senior Consultant in the Cyber Security department located in Gurugram, you will be responsible for various tasks and possess a range of skills and experiences. Your role will involve working on programming languages used for storing and processing raw data, having knowledge of operating systems such as Windows, macOS, Linux, UNIX, and other OSs, conducting penetration testing, understanding ethical hacking and coding practices, mastering advanced persistent threat management, ensuring firewall safety and management, utilizing encryption techniques and capabilities, conducting compliance assessments, and working with frameworks like COBIT and ITIL. You should have at least 5 years of re...

Posted 3 months ago

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies