Home
Jobs
Companies
Resume

14 Maltego Jobs

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

5.0 years

0 Lacs

Hyderābād

On-site

We are seeking a highly capable Azure Engineer with a strong software development background and deep expertise in Cloud Back-End (BE) baseline architecture . This role is ideal for someone who can design, build, and manage scalable, secure, and high-performing back-end services in Microsoft Azure. The ideal candidate will have hands-on experience with cloud-native application development, microservices architecture, and infrastructure automation. Key Responsibilities: Design and develop back-end cloud services using Azure-native technologies (App Services, Functions, API Management, Service Bus, Event Grid, etc.). Implement scalable and secure cloud architectures aligned with Azure well-architected framework. Build APIs and microservices leveraging .NET or Node.js or Python, or similar technologies. Ensure cloud back-end performance, reliability, and monitoring using Azure Monitor, App Insights, and Log Analytics. Collaborate with DevOps, security, and front-end teams to ensure seamless integration and CI/CD automation. Define and enforce coding standards, version control, and deployment strategies. Implement and maintain cloud governance, cost optimization, and security best practices. Provide support and troubleshooting for production issues in Azure environments. Required Skills& Experience: 5+ years of professional experience in software development and cloud engineering. Strong development skills in .NET Core or C# or Python or Node.js or Java. Deep expertise in Azure services relevant to back-end architecture (Functions, Key Vault, API Management, Cosmos DB, Azure SQL, etc.) Strong understanding of microservices architecture, containerization (Docker), and Kubernetes(AKS). Hands-on experience with Azure DevOps, GitHub Actions, or similar CI/CD tools. Solid grasp of Azure identity and access management, including RBAC and Managed Identities. Experience with unit testing, integration testing, and automated deployments. About Loginsoft: For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science& AI, etc. Expertise in Integrations with Threat Intelligence and Security Products: Built more than 200+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar& Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc. In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions. Job Overview Hyderabad, India 5+ Years Exp Full-Time Position

Posted 2 days ago

Apply

5.0 years

0 Lacs

Hyderābād

On-site

We are looking for a highly skilled DevOps Engineer with hands-on experience managing and deploying Azure Policies in multi-tenant environments. The ideal candidate will have a deep understanding of Azure governance, compliance, and infrastructure automation to help enforce organizational standards and ensure secure, compliant Azure deployments. Key Responsibilities: Design, deploy, and manage Azure Policies, Initiatives, and Blueprints across multiple Azure tenants . Collaborate with Cloud Security, Networking, and Application teams to enforce security, cost, and operational policies. Automate policy compliance monitoring and remediation using Azure Policy, Azure Monitor, and Log Analytics. Integrate policy deployment with CI/CD pipelines using tools like Azure DevOps, GitHub Actions, or Jenkins. Provide governance recommendations and ensure alignment with Azure Well-Architected Framework. Troubleshoot policy conflicts, evaluate policy impact, and support ongoing improvements to the cloud governance model. Maintain documentation and change management for policy lifecycle. Required Skills& Experience: 5+ years of experience in a DevOps Engineering Strong hands-on experience with Azure Tenant environments Hands on Azure Policy, Management Groups, Subscriptions. Solid understanding of Azure governance, security best practices, and policy compliance. Familiarity with CI/CD pipelines and tools (Azure DevOps, GitHub Actions, etc.). Experience working in enterprise Azure environments with multiple tenants/subscriptions. About Loginsoft: For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science& AI, etc. Expertise in Integrations with Threat Intelligence and Security Products: Built more than 200+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar& Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc. In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions. Job Overview Hyderabad, India 5+ Years Exp Full-Time Position

Posted 2 days ago

Apply

20.0 years

0 Lacs

Hyderābād

On-site

We are seeking a highly skilled and motivated Cloud Security Engineer with a strong background in security research, operations, and assurance, along with cloud architecture expertise. The role involves implementing security controls, conducting in-depth assessments of cloud services, and identifying secure configurations and misconfigurations across enterprise cloud environments. You will work closely with development, DevOps, and security teams to ensure that cloud infrastructure meets industry and organizational security standards. Key Responsibilities: Implement cloud-native and third-party security controls across AWS, Azure, and/or GCP environments. Conduct detailed security assessments of cloud services (IaaS, PaaS, SaaS) to ensure compliance with internal policies and industry frameworks. Identify and remediate secure misconfigurations and vulnerabilities using automated scanning and manual inspection techniques. Collaborate with cloud architects and security engineers to design and recommend secure infrastructure patterns. Stay updated with evolving cloud threats and vulnerabilities, and contribute to threat modeling and risk assessments. Develop scripts and tools to automate security monitoring and compliance validation. Document findings, remediation guidance, and contribute to security standards development. Required Skill Set: Technical Expertise: Strong knowledge of cloud platforms: AWS, Azure, or GCP Hands-on experience with CSPM (Cloud Security Posture Management) tools and cloud-native security services Deep understanding of IAM, encryption, network security, and data protection within cloud environments Experience with CI/CD security integration and DevSecOps practices Familiarity with security standards such as CIS Benchmarks, NIST, ISO 27001 Security Domains: Security Research: Ability to evaluate and analyze security trends, tools, and techniques Security Operations: Incident detection, log analysis, SIEM tools, and response processes Security Assurance: Risk assessments, compliance audits, and policy enforcement Cloud Architecture: Knowledge of secure cloud design patterns and service integrations Tools & Languages: Tools: Prisma Cloud, Wiz, AWS Security Hub, Azure Defender, GCP Security Command Center Scripting: Python Soft Skills: Strong analytical and problem-solving abilities Excellent verbal and written communication skills Team player with cross-functional collaboration experience Ability to manage priorities in a fast-paced environment About Loginsoft: For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science& AI, etc. Expertise in Integrations with Threat Intelligence and Security Products: Built more than 200+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar& Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc. In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions. Job Overview Hyderabad, India 10+ Years Exp Full-Time Position

Posted 2 days ago

Apply

0 years

4 - 6 Lacs

India

On-site

We are seeking an experienced OSINT (Open-Source Intelligence) Analyst to join our team. The ideal candidate should have prior experience in collecting, analyzing, and interpreting open-source intelligence data to support security, investigative, and research operations Key Responsibilities Conduct open-source intelligence gathering across various platforms, including social media, forums, and the dark web. Monitor and analyze social media platforms for intelligence gathering and threat detection. Utilize OSINT tools and techniques to support investigations and risk assessments. Work closely with cybersecurity, law enforcement, and intelligence teams to provide actionable intelligence. Develop and maintain detailed reports and intelligence briefings. Analyze and interpret large-scale data sets to identify threats, trends, and insights. Continuously evaluate and improve OSINT methodologies to enhance effectiveness. Skills & Qualifications Proficiency in OSINT tools such as Maltego, Shodan, Recon-ng, and SpiderFoot. Experience with data collection and analysis from public, private, and dark web sources. Strong analytical and critical-thinking skills to assess credibility and accuracy of information. Knowledge of social media monitoring and digital forensics methodologies. Excellent report writing and presentation skills to communicate findings effectively. Nice-to-Have Skills Experience with machine learning and Al-driven Job Type: Full-time Pay: ₹450,000.00 - ₹650,000.00 per year Schedule: Day shift Monday to Friday Weekend availability Ability to commute/relocate: Gurgaon H.O, Gurugram, Haryana: Reliably commute or planning to relocate before starting work (Preferred) Application Question(s): 1. Which of the following OSINT tools have you used? 2. How many years of experience do you have in open-source intelligence (OSINT)? Work Location: In person Application Deadline: 20/06/2025

Posted 5 days ago

Apply

0.0 years

0 Lacs

Gurgaon H.O, Gurugram, Haryana

On-site

Indeed logo

We are seeking an experienced OSINT (Open-Source Intelligence) Analyst to join our team. The ideal candidate should have prior experience in collecting, analyzing, and interpreting open-source intelligence data to support security, investigative, and research operations Key Responsibilities Conduct open-source intelligence gathering across various platforms, including social media, forums, and the dark web. Monitor and analyze social media platforms for intelligence gathering and threat detection. Utilize OSINT tools and techniques to support investigations and risk assessments. Work closely with cybersecurity, law enforcement, and intelligence teams to provide actionable intelligence. Develop and maintain detailed reports and intelligence briefings. Analyze and interpret large-scale data sets to identify threats, trends, and insights. Continuously evaluate and improve OSINT methodologies to enhance effectiveness. Skills & Qualifications Proficiency in OSINT tools such as Maltego, Shodan, Recon-ng, and SpiderFoot. Experience with data collection and analysis from public, private, and dark web sources. Strong analytical and critical-thinking skills to assess credibility and accuracy of information. Knowledge of social media monitoring and digital forensics methodologies. Excellent report writing and presentation skills to communicate findings effectively. Nice-to-Have Skills Experience with machine learning and Al-driven Job Type: Full-time Pay: ₹450,000.00 - ₹650,000.00 per year Schedule: Day shift Monday to Friday Weekend availability Ability to commute/relocate: Gurgaon H.O, Gurugram, Haryana: Reliably commute or planning to relocate before starting work (Preferred) Application Question(s): 1. Which of the following OSINT tools have you used? 2. How many years of experience do you have in open-source intelligence (OSINT)? Work Location: In person Application Deadline: 20/06/2025

Posted 6 days ago

Apply

3.0 - 7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Job Description We are seeking a skilled and experienced Cybersecurity Specialist to join our dynamic team. The ideal candidate will have 3-7 years of experience in cybersecurity roles and a strong technical background in information security. If you're passionate about protecting data, identifying vulnerabilities, and implementing robust security measures. Key Responsibilities Develop, implement, and maintain cybersecurity policies, firewalls, intrusion detection/prevention systems (IDS/IPS), endpoint security solutions, and data encryption. Conduct regular security assessments, risk analyses, and vulnerability assessments to identify potential weaknesses and mitigate risks. Experience in Web/Mobile/Network Penetration Testing and/or Vulnerability Assessment. Experience with web application vulnerability scanner (BurpSuite, AppScan, Acunetix, Web Inspect, etc). Deep knowledge of common software vulnerabilities, such as OWASP Top 10 and CWE/SANS Top 25. Deep knowledge of HTTP protocol and the ability to construct/manipulate HTTP requests. Ability to suggest/recommend remediation to fix vulnerability. Manual Penetration Testing skills and techniques are required besides automated tools and frameworks. Knowledge on Tools: Nmap, Kali Linux, Metasploit, Maltego, Burp Suite, Nessus, nexpose, Wireshark, sqlmap etc. Proficiency in Conducting API (REST, SOAP, XML, JSON) Security testing activities to identify and mitigate security : 3-7 years of experience in cyber security or a related field. Bachelor's degree in Computer Science, Information Security, Cyber Operations, or a related field (or equivalent experience). Strong understanding of networking concepts, security principles, and cyber threats. Proven experience with vulnerability scanning and penetration testing tools. Knowledge of regulatory requirements and compliance frameworks (e.g., PCI DSS, NIST, CIS Controls). Experience in Information security controls, and doing IT audits, ISO certifications is preferred. (ref:hirist.tech) Show more Show less

Posted 6 days ago

Apply

4.0 - 6.0 years

0 Lacs

Chennai

On-site

Full time | Work From Office This Position is Currently Open Department / Category: CYBER SECURITY Listed on Jun 04, 2025 Work Location: CHENNAI HYDERABAD Job Descritpion of Cyber Threat Intelligence Analyst 4 to 6 Years Relevant Experience Roles & Responsibilities Effectively communicate cyber threat intelligence and analysis in both written reports and executive briefings tailored for senior-level stakeholders. Analyze threat actor tactics, techniques, and procedures (TTPs) using established frameworks such as the Cyber Kill Chain, Diamond Model, and MITRE ATT&CK. Develop deep subject-matter expertise and identify complex threat actor patterns to provide actionable intelligence on current and emerging threats. Create analytical threat models relevant to the financial services sector and other high-risk industries. Identify intelligence gaps and generate requests for information (RFIs) to support ongoing threat analysis. Work closely with internal stakeholders and external entities (ISACs, law enforcement, intelligence agencies, etc.) to enhance threat visibility and response. Conduct threat hunting and retroactive hunting using known Indicators of Compromise (IOCs). Deliver high-quality finished intelligence reports to business units, including strategic and tactical insights. Participate in the development of alerting rules and assist in improving security monitoring capabilities. Support senior leadership by aligning threat intelligence with organizational risk and critical asset priorities. Conduct internal briefings across various business and security teams. Required Skills & Experience 4 to 6 years of relevant cyber threat intelligence experience. Strong experience in analyzing cyber threat data and generating relevant recommendations. In-depth understanding of: MITRE ATT&CK, Cyber Kill Chain, Diamond Model methodologies. Threat Intelligence Platforms (TIPs) such as Anomali, Recorded Future, ThreatConnect, etc. SIEM platforms like Splunk, and tools such as Maltego, XSOAR, OSINT aggregators. Strong knowledge of: Networking concepts and enterprise infrastructure. STIX/TAXII standards. Intrusion Detection/Prevention Systems (IDS/IPS) and load balancing technologies. Experience with: Cloud environments (e.g., AWS, Azure). Malware analysis and network-based forensic tools. Both qualitative and quantitative intelligence analysis from diverse sources. Preferred Qualifications SANS GCTI certification (or equivalent). Familiarity with threat actors targeting the US financial sector (Nation-State, Cybercrime, Hacktivists, etc.). Knowledge of security priorities and TTPs associated with sector-specific threats. Required Skills for Cyber Threat Intelligence Analyst Job GCTI Threat Intelligence Threat Intel Platform Our Hiring Process Screening (HR Round) Technical Round 1 Technical Round 2 Final HR Round

Posted 1 week ago

Apply

1.0 - 3.0 years

54 - 72 Lacs

Gurugram

Work from Office

Naukri logo

Gather & analyze OSINT from social media, forums, dark web Use tools like Maltego, Shodan, Recon-ng Support investigations & risk assessments Collaborate with security & law enforcement teams Prepare intelligence reports & improve methods

Posted 2 weeks ago

Apply

3.0 years

6 - 9 Lacs

Hyderābād

On-site

Job Purpose: Provides hands-on technical and security support across enterprise environments, including performing manual security testing, assisting with vulnerability identification and remediation, and supporting threat response activities. Contributes to cloud security posture monitoring, participates in responsible disclosure and bug bounty processes, and supports ongoing compliance initiatives. Aids in the investigation and response to security incidents, monitors threat intelligence sources, and helps implement security controls across systems, applications, and Office365 environments. Also assists with maintaining documentation and gathering evidence for audits related to SOC 2 Type 2, PCI-DSS, and ISO 27001 frameworks. Supports sales and client teams by contributing to responses for security audits, risk assessments, and customer security questionnaires. Job Responsibilities: Essential Functions: This position operates under limited supervision with a high degree of independence in day-to-day security tasks. The Security Engineer supports enterprise security operations, infrastructure protection, and compliance efforts. Key responsibilities include: Perform manual security testing and assist with 2nd and 3rd level investigation and resolution of security-related support tickets. Participate in vulnerability management processes, including scanning, tracking, reporting, and remediation assistance. Monitor and support cloud security posture across environments (e.g., AWS, Azure), contributing to secure configuration and alerting. Support Office365 security administration and monitoring efforts Assist in monitoring threat intelligence feeds and help correlate findings with internal environments to identify potential risks. Respond to and support the triage and resolution of security incidents in coordination with internal teams and vendors to minimize business impact. Contribute to the intake and triage process for responsible disclosure reports and bug bounty submissions. Provide security support for customer audits and sales enablement activities by helping to complete security questionnaires and assessments. Assist with maintaining and collecting evidence for compliance frameworks such as SOC 2 Type 2, PCI-DSS, and ISO 27001. Help train and support internal teams in secure configurations and processes. Work with internal infrastructure, development, and compliance teams to implement and maintain security standards and controls. Research, test, and provide input on new security tools, products, and practices. Maintain accurate records of work performed, including documentation and ticketing of changes and issues. Non-Essential Functions: May be required to participate in an on-call rotation outside of normal business hours to support security incident response or high-priority investigations. May assist with ad-hoc security-related tasks or projects outside of core responsibilities Requirements: Required Education and Experience: Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent technical experience Minimum 3+ years of experience in information security, cybersecurity, or in a security engineering role Hands-on experience with manual security testing and vulnerability management practices Working knowledge of private and public cloud environments and cloud security posture management (e.g., AWS, Azure, or GCP) Familiarity with security compliance frameworks (SOC 2 Type 2, PCI-DSS, ISO 27001) Experience with MS Azure security and Office365 security tools (e.g., Microsoft Defender, Purview, Security & Compliance Center) Understanding of incident response processes and tools Exposure to responsible disclosure or bug bounty program workflows Ability to document technical findings and produce support materials for audit and remediation purposes Minimum 2+ years of experience with Penetration Testing tools such as Nmap, Burp Suite, OWASP ZAP, Nikito, SQLmap, Postman, MetaSploit, Mimikatz, Bloodhound, Maltego and others Preferred Education and Experience: Bachelor’s degree or equivalent experience. Related certifications Expected Competencies: Strong verbal and written communication skills Must be able to prioritize and take initiative Demonstrate excellent service skills Strong English communication skills, both written and verbal Work Schedule: Monday through Friday from 12 PM to 9 PM IST. This will provide healthy overlap between India team and US team and supporting both to ensure adequate collaboration. This role will be working in Hybrid Mode and will require at least 2 days’ work from office at Hyderabad or Gurugram Travel: This position may require up to 10% travel. Travel may be outside the local area and overnight EEO Statement Cendyn provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Cendyn complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Cendyn expressly prohibits any form of workplace harassment based on race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, genetic information, disability, or veteran status. Improper interference with the ability of Cendyn’s employees to perform their job duties may result in discipline up to and including discharge. Other Duties Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice.

Posted 2 weeks ago

Apply

2.0 - 3.0 years

0 - 0 Lacs

Gurgaon

On-site

Conduct Web Application and API Security Testing using both Manual and Automated Penetration Testing Methodologies Conduct Vulnerability Assessments of Network Devices, DB and servers using various open source and commercial tools Map out a network, discover ports and services running on the different exposed network and security devices Conduct penetration test and launch exploits using Nessus, Metaspoilt, Core Impact, Backtrack penetration testing distribution tools sets Prepare a detailed VAPT findings manually Strong experience with performing VAPT as per OWASP Top 10, SANS Top 25, and NIST, and SANS Security Guidelines. Hands on knowledge on Tools: Nmap, Kali Linux, Metasploit, Maltego, Burp, Nessus, nexpose, wireshark, sqlmap, MobSF, burpsuite etc. Conduct android and IOS mobile application VAPT Ability to suggest remediation to vulnerabilities observed in Application and configuration. Minimum 2-3 years of work experience in the information security domain only Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹65,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Did you worked in the domains like API Testing, IOS, Android Testing, Web Application Testing, Network Penetration Testing, Mobile Application Testing? Experience: minimum: 1 year (Required) Language: English (Required) Location: Gurugram, Haryana (Required) Work Location: In person

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Purpose Provides hands-on technical and security support across enterprise environments, including performing manual security testing, assisting with vulnerability identification and remediation, and supporting threat response activities. Contributes to cloud security posture monitoring, participates in responsible disclosure and bug bounty processes, and supports ongoing compliance initiatives. Aids in the investigation and response to security incidents, monitors threat intelligence sources, and helps implement security controls across systems, applications, and Office365 environments. Also assists with maintaining documentation and gathering evidence for audits related to SOC 2 Type 2, PCI-DSS, and ISO 27001 frameworks. Supports sales and client teams by contributing to responses for security audits, risk assessments, and customer security questionnaires. Job Responsibilities Essential Functions: Responsibilities This position operates under limited supervision with a high degree of independence in day-to-day security tasks. The Security Engineer supports enterprise security operations, infrastructure protection, and compliance efforts. Key responsibilities include: Perform manual security testing and assist with 2nd and 3rd level investigation and resolution of security-related support tickets. Participate in vulnerability management processes, including scanning, tracking, reporting, and remediation assistance. Monitor and support cloud security posture across environments (e.g., AWS, Azure), contributing to secure configuration and alerting. Support Office365 security administration and monitoring efforts Assist in monitoring threat intelligence feeds and help correlate findings with internal environments to identify potential risks. Respond to and support the triage and resolution of security incidents in coordination with internal teams and vendors to minimize business impact. Contribute to the intake and triage process for responsible disclosure reports and bug bounty submissions. Provide security support for customer audits and sales enablement activities by helping to complete security questionnaires and assessments. Assist with maintaining and collecting evidence for compliance frameworks such as SOC 2 Type 2, PCI-DSS, and ISO 27001. Help train and support internal teams in secure configurations and processes. Work with internal infrastructure, development, and compliance teams to implement and maintain security standards and controls. Research, test, and provide input on new security tools, products, and practices. Maintain accurate records of work performed, including documentation and ticketing of changes and issues. Non-Essential Functions May be required to participate in an on-call rotation outside of normal business hours to support security incident response or high-priority investigations. May assist with ad-hoc security-related tasks or projects outside of core responsibilities Requirements Required Education and Experience: Bachelor’s degree in Cybersecurity, Computer Science, Information Technology, or equivalent technical experience Minimum 3+ years of experience in information security, cybersecurity, or in a security engineering role Hands-on experience with manual security testing and vulnerability management practices Working knowledge of private and public cloud environments and cloud security posture management (e.g., AWS, Azure, or GCP) Familiarity with security compliance frameworks (SOC 2 Type 2, PCI-DSS, ISO 27001) Experience with MS Azure security and Office365 security tools (e.g., Microsoft Defender, Purview, Security & Compliance Center) Understanding of incident response processes and tools Exposure to responsible disclosure or bug bounty program workflows Ability to document technical findings and produce support materials for audit and remediation purposes Minimum 2+ years of experience with Penetration Testing tools such as Nmap, Burp Suite, OWASP ZAP, Nikito, SQLmap, Postman, MetaSploit, Mimikatz, Bloodhound, Maltego and others Preferred Education And Experience Bachelor’s degree or equivalent experience. Related certifications Expected Competencies Strong verbal and written communication skills Must be able to prioritize and take initiative Demonstrate excellent service skills Strong English communication skills, both written and verbal Work Schedule Monday through Friday from 12 PM to 9 PM IST. This will provide healthy overlap between India team and US team and supporting both to ensure adequate collaboration. This role will be working in Hybrid Mode and will require at least 2 days’ work from office at Hyderabad or Gurugram Travel This position may require up to 10% travel. Travel may be outside the local area and overnight EEO Statement Cendyn provides equal employment opportunities (EEO) to all employees and applicants for employment without regard to race, color, religion, sex, national origin, age, disability or genetics. In addition to federal law requirements, Cendyn complies with applicable state and local laws governing non-discrimination in employment in every location in which the company has facilities. This policy applies to all terms and conditions of employment, including recruiting, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation, and training. Cendyn expressly prohibits any form of workplace harassment based on race, color, religion, gender, sexual orientation, gender identity or expression, national origin, age, genetic information, disability, or veteran status. Improper interference with the ability of Cendyn’s employees to perform their job duties may result in discipline up to and including discharge. Other Duties Please note this job description is not designed to cover or contain a comprehensive listing of activities, duties or responsibilities that are required of the employee for this job. Duties, responsibilities, and activities may change at any time with or without notice. Show more Show less

Posted 2 weeks ago

Apply

0.0 - 1.0 years

0 Lacs

Gurugram, Haryana

On-site

Indeed logo

Conduct Web Application and API Security Testing using both Manual and Automated Penetration Testing Methodologies Conduct Vulnerability Assessments of Network Devices, DB and servers using various open source and commercial tools Map out a network, discover ports and services running on the different exposed network and security devices Conduct penetration test and launch exploits using Nessus, Metaspoilt, Core Impact, Backtrack penetration testing distribution tools sets Prepare a detailed VAPT findings manually Strong experience with performing VAPT as per OWASP Top 10, SANS Top 25, and NIST, and SANS Security Guidelines. Hands on knowledge on Tools: Nmap, Kali Linux, Metasploit, Maltego, Burp, Nessus, nexpose, wireshark, sqlmap, MobSF, burpsuite etc. Conduct android and IOS mobile application VAPT Ability to suggest remediation to vulnerabilities observed in Application and configuration. Minimum 2-3 years of work experience in the information security domain only Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹65,000.00 per month Benefits: Internet reimbursement Supplemental Pay: Performance bonus Application Question(s): Did you worked in the domains like API Testing, IOS, Android Testing, Web Application Testing, Network Penetration Testing, Mobile Application Testing? Experience: minimum: 1 year (Required) Language: English (Required) Location: Gurugram, Haryana (Required) Work Location: In person

Posted 2 weeks ago

Apply

0 years

0 Lacs

Navi Mumbai, Maharashtra, India

On-site

Linkedin logo

Job Title: Vulnerability Assessment and Penetration Testing Internship for Technical services - (Performance based conversion to full-time Role) Job Location: Mumbai (On-site) Duration: 6 Months Note: Looking only for Immediate joiners (5 Days) Qualifications: BE/B. Tech with specialization in cyber security, MCA, M. Tech / Master’s in Information security, or Forensics Analysis Knowledge. Mandatory Certifications: CEH-EC-council / EJPT / PNPT / EWPT / CRTP Role and Responsibility: • Conduct Network/ System Vulnerability Assessments, Penetration Testing using tools to evaluate attack vectors, identify system vulnerabilities, and provide appropriate remediation plans for mitigation of the identified vulnerabilities. • Conduct Application vulnerability assessments, Penetration Testing for web applications, identify and report vulnerabilities, provide recommendations, and track closure of identified vulnerabilities. • Perform Configuration compliance assessments for Endpoints / Assets /network devices and help maintain the security settings at compliant level with Specific Security Standards. • Perform regular monitoring of patch compliance of the assets in the network, Analyze Patch Advisories and provide remediation steps for the stakeholders. • Performing comprehensive review and threat adversary modeling for web applications. • Conduct Vulnerability Assessments, Penetration Testing, Device Hardening, Application Security Assessments, Log Review, Review of Documents, Network Monitoring and Reporting • Conduct and compile findings on new vulnerabilities, new tools for departmental use. • Create project deliverables / reports and assist the client with remediations and discussions. • Abide by the project timelines and maintain project discipline. Technical Skills Required: • Hands-on Experience in performing Network Security Assessment and vulnerability Assessment. • Good understanding of OSI layers and fundamental Operating system concepts, security settings for various flavors of Windows and Linux platforms. • Sound knowledge about Application vulnerability assessments and relevant knowledge of OWASP top 10 vulnerabilities and SANS. • Hands on knowledge on Tools: Nmap, Kali Linux, Metasploit, Armitage, Maltego, Burp Suite, Paros Proxy Nessus, nexpose, Wireshark, sqlmap etc. • Manual Penetration Testing skills and techniques are required besides automated tools and frameworks. • Familiar working with Publicly available exploits codes. • Sound knowledge about infrastructure vulnerability scans, identifying security vulnerabilities, weaknesses, threats, and assessing related risks that exists within an IT Infrastructure or business processes. • Good understanding of firewalls, Switches, and Router’s configuration settings and policies, relevant experience in performing rule base reviews and configuration reviews for network devices. Show more Show less

Posted 3 weeks ago

Apply

0 years

0 Lacs

Kochi, Kerala, India

On-site

Linkedin logo

Role Summary We are hiring a Level 2 Threat Intelligence Analyst who will play a key role in identifying, profiling, and analyzing cyber threats—especially those originating from dark web sources and adversarial actors. The ideal candidate will have hands-on experience in threat actor profiling, APT tracking, and ransomware ecosystem analysis. This role demands both tactical research capabilities and strategic intelligence production, contributing to our core threat intelligence offerings. Key Responsibilities • Dark Web & Deep Web Monitoring: Track cybercrime forums, marketplaces, and hidden networks to detect emerging threats, tools, or chatter related to target industries or geographies. • APT and Ransomware Tracking: Identify and monitor activities of APT groups, ransomware gangs, and affiliates. Create behavioral and attribution profiles for known and emerging threat actors. • Threat Actor Profiling: Compile and maintain structured profiles that include motivations, TTPs (tactics, techniques, and procedures), affiliations, historical campaigns, and IOCs (indicators of compromise). • Threat Attribution and Reporting: Produce detailed intelligence reports with technical and strategic insights for internal and external stakeholders. Assist in attribution efforts by correlating adversarial behaviors and campaign footprints. • Collaboration & Knowledge Sharing: Work with internal research, detection, and incident response teams to inform defensive strategies. Present findings in team meetings and client-facing briefings when required. • Platform Enhancement: Contribute feedback to improve the automation and enrichment features of FalconFeeds.io by identifying intelligence gaps and usability challenges. Required Qualifications • Minimum 4 years of experience in threat intelligence, cyber investigations, or related domains. • In-depth understanding of dark web ecosystems, encrypted communication channels, and adversary tradecraft. • Hands-on experience with MITRE ATT&CK, threat intel platforms, and OSINT tools like Maltego, Spiderfoot, or Recon-ng. • Familiarity with ransomware leak sites, IABs (Initial Access Brokers), and underground marketplaces. • Strong analytical and critical thinking skills, with the ability to work independently on multiple concurrent tasks. • Excellent documentation and report writing skills—both technical and executive-level reporting. • Comfortable working in fast-paced, high-alert environments with shifting threat priorities. Preferred (but not mandatory) • Experience working in a SOC, CERT, or CTI team within a government, financial, or enterprise security environment. • Proficiency in reading and understanding multiple languages (e.g., Russian, Farsi, Mandarin, Arabic) used in dark web forums. • Background in malware analysis, reverse engineering, or network forensics is a plus. What We Offer • A chance to work with a fast-growing global threat intelligence platform. • Access to proprietary tools and high-value threat data feeds. • A collaborative work environment with exposure to world-class cybersecurity teams. • Opportunities to contribute to research reports that gain media, government, and industry attention. • Competitive compensation, learning incentives, and career growth. Show more Show less

Posted 4 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies