Jobs
Interviews

32 Malware Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 6.0 years

0 Lacs

pune, maharashtra

On-site

You are expected to be a strong candidate with knowledge and experience in Darknet, HUMINT, and Automation (Python). As a self-learner, you should be capable of working independently with minimal assistance, utilizing online resources effectively. Your flexibility to learn new technologies and languages is crucial for this role. - Monitor the online cybercrime underground space and cybercriminal activities in both Clearnet & Darknet. - Identify and evaluate new data sources informing the cybercrime activities. - Write research reports and end customer deliverables. - Engage/deal with threat actors and automate regular tasks to minimize manual efforts. - Utilize advanced open-source intelligence (OSINT) on the surface, deep, and dark web to identify indicators of malicious activity targeting customers and/or related organizations. - Be prepared to work and support customer queries during off-hours if required. Desired Technical Skills: - Proficiency in programming, especially in Python. - Experience in automation. - Strong foundation in computer and networking fundamentals. - Familiarity with DarkNet, Deep Web, and other sources of cybercriminal activity. - Knowledge of various security technologies. - Community presence and notable publications of Papers, exploits, vulnerabilities are advantageous. - Understanding of cyber threats, malware, APTs, exploits, etc. - Active user of forums, IRC, Jabber, Discord, Telegram, etc. - Experience in vulnerability assessment & penetration testing is a plus. - Certifications such as CEH, OSCP, and other cybersecurity are beneficial but not mandatory. Desired Soft Skills: - Eagerness to learn new technologies and skills. - Excellent written and spoken English skills. - Self-starter, quick learner, detail-oriented, comfortable in a fast-paced, deadline-driven environment. - Ability to prepare and present research findings effectively, both written and orally. - Strong analytical skills. Language Proficiency: - Proficiency in English and any other international language such as French, Arabic, Russian, Japanese, Chinese, German, Italian, is a plus. Desired Experience: 2-5 years,

Posted 18 hours ago

Apply

3.0 - 8.0 years

7 - 17 Lacs

pune, chennai, bengaluru

Hybrid

Android Malware Analyst Location PUN, HYD, BANGL & CEN Minimum Qualifications: Bachelor's degree in computer science, a related technical field, or equivalent practical experience. 2–3 years of experience in security assessments, security design reviews, or threat modeling. Experience in malware analysis, reverse engineering, and software development. Preferred Qualifications: Expertise in threat identification, with the ability to accurately pinpoint malicious code and classify all categories of malicious applications. Experience in Android reverse engineering (APK, DEX), malware analysis, and threat modeling. Understanding of ARM-based architecture. Android application development experience in C/C++ and Java. Experience analyzing app behavior using automated tools and sandbox environments to identify known malicious patterns. Strong technical knowledge of security engineering, computer and network security, authentication, security protocols, and applied cryptography. Experience with automation and scripting, preferably in Python. Ability to classify applications based on predefined Standard Operating Procedures (SOPs) and known threat indicators. Responsibilities: Perform initial triage and security analysis of a high volume of Android applications. Perform reverse engineering and analyze malware at scale. Document all analysis findings accurately and concisely for reporting purposes. Advocate for security best practices and secure coding. Conduct research to identify potential attack vectors against Android. Collaborate with team members to enhance Android Security and Privacy's understanding of malware and propose methods for detection and mitigation. Senior Malware Analyst Minimum Qualifications: Bachelor's degree in Computer Science, a related technical field, or equivalent practical experience. 3–5 years of experience in security assessments, security design reviews, or threat modeling. Experience in malware analysis, reverse engineering, and software development. Preferred Qualifications: Proficiency with advanced reversing tools (e.g., IDA Pro, Ghidra). Ability to reverse-engineer heavily obfuscated code and native libraries. Capability to analyze and break custom cryptographic routines used by common malware. Expertise in threat identification, with the ability to accurately pinpoint malicious code and classify all categories of malicious applications. Experience in Android reverse engineering (APK, DEX), malware analysis, and threat modeling. Strong understanding of ARM-based architecture. Android application development experience in C/C++ and Java. Experience analysing app behaviour using automated tools and sandboxing environments to identify known malicious patterns. Foundational and in-depth technical knowledge of security engineering, computer and network security, authentication, security protocols, and applied cryptography. Experience in automation and scripting, preferably in Python. Ability to classify applications based on predefined Standard Operating Procedures (SOPs) and known threat indicators. Responsibilities: Perform second-level reviews of complex threats and conduct security analysis on a high volume of Android applications. Conduct reverse engineering and analyse malware at scale. Document all analysis findings accurately and concisely for reporting and tracking purposes. Advocate for secure development practices and security-first approaches. Conduct research to identify emerging attack vectors targeting Android platforms. Collaborate with team members to enhance Android Security and Privacy’s understanding of malware, and propose methods for detection and mitigation. Mentor and train team members; lead knowledge-sharing sessions to upskill the broader team.

Posted 1 day ago

Apply

3.0 - 5.0 years

7 - 14 Lacs

hyderabad, pune, delhi / ncr

Hybrid

Job Title: Senior Malware Analyst Experience: 3 to 5 years Location:(Pune / Mumbai / Hyderabad / Bangalore / Kolkata / Chennai / Noida) NP: immediate 30 days Max Job Summary Minimum Qualifications Bachelor’s degree in Computer Science, a related technical field, or equivalent practical experience. 3–5 years of experience in security assessments, security design reviews, or threat modeling. Experience in malware analysis, reverse engineering, and software development . Preferred Qualifications Proficiency with advanced reversing tools (e.g., IDA Pro, Ghidra). Ability to reverse-engineer heavily obfuscated code and native libraries. Capability to analyze and break custom cryptographic routines used by common malware. Expertise in threat identification with the ability to accurately pinpoint malicious code and classify all categories of malicious applications. Experience in Android reverse engineering, APK/DEX malware analysis, and threat modeling. Strong understanding of ARM-based architecture. Android application development experience in C/C++ and Java. Experience analyzing app behavior using automated tools and sandboxing environments to identify known malicious patterns. Foundational and in-depth technical knowledge of security engineering, computer and network security, authentication, security protocols, and applied cryptography. Experience in automation and scripting, preferably in Python. Ability to classify applications based on predefined Standard Operating Procedures (SOPs) and known threat indicators. Responsibilities Perform second-level reviews of complex threats and conduct security analysis on a high volume of Android applications. Conduct reverse engineering and analyze malware at scale. Document all analysis findings accurately and concisely for reporting and tracking purposes. Advocate for secure development practices and security-first approaches. Conduct research to identify emerging attack vectors targeting Android platforms. Collaborate with team members to enhance Android Security and Privacy’s understanding of malware and propose methods for detection and mitigation. Mentor and train team members; lead knowledge-sharing sessions to upskill the broader team.

Posted 5 days ago

Apply

4.0 - 8.0 years

0 Lacs

pune, maharashtra

On-site

As a Senior Threat Intelligence Analyst at Fortinet, you will be an integral part of the Cyber Threat Intelligence (CTI) Collections/Analysis team. This team comprises highly skilled analysts, researchers, and specialists dedicated to safeguarding customers and their assets from external threats. Leveraging our proprietary hybrid intelligence platforms and methodologies, you will utilize your exceptional writing and editing skills to generate actionable intelligence for our customer base. Your responsibilities will involve assessing current and emerging threats related to cybercrime and various forms of malicious exploitation. Your role will encompass the following key responsibilities: - Serve as the CTI Product Subject Matter Expert (SME) to address client requests, respond to incidents, and manage escalations effectively. - Collaborate with customers to comprehend their unique threat landscape and provide customized solutions accordingly. - Monitor and analyze cybersecurity events, incidents, and vulnerability reports from multiple sources to stay abreast of potential risks. - Review and interpret data sourced from various outlets such as OSINT, Darknet, and TECHINT. - Work closely with the Internal Research team to identify threats specific to individual customers. - Develop customer-specific analytical reports based on identified findings. - Produce regular Security Trend reports utilizing information from the Internal threat repository. - Monitor, analyze, and report on cybersecurity events, intrusion events, security incidents, and other potential threats while adhering to operational security best practices. We are seeking candidates with the following qualifications and attributes: - Experience in Managed Threat Intelligence services is essential. - Prior experience as an SME supporting Clients" CTI requirements is highly desirable. - Active presence on platforms like Medium for blog writing is a plus. - Strong foundational knowledge in Information Security. - Proficiency in Cyber Threat Intelligence concepts. - Ability to create high-quality Security Analysis reports. - Proficient in understanding and analyzing various threat vectors effectively. - Familiarity with cyber threats, malware, APTs, exploits, etc. - Knowledge of DarkNet, DeepWeb, open-source intelligence, social media, and other sources of cyber-criminal activities. - Strong interpersonal and English communication skills to effectively engage with clients and explain technical details. - Willingness to learn new technologies and skills, adapt to changes, and innovate. - Previous experience in Cyber Crime Research is advantageous. - Certifications such as CEH and other cybersecurity qualifications are beneficial but not mandatory. - Proficiency in programming/scripting languages, particularly Python and Jupyter Notebook, is an added advantage. - Ability to maintain the highest levels of discretion and confidentiality. Language Proficiency: Fluency in English is mandatory, while proficiency in Hindi or any other international language like Arabic, Russian, Japanese, Chinese, German, Italian is an additional asset. Desired Experience: 4-6 years Working Conditions: This position necessitates full-time office work; remote work options are not available. Company Culture: At Fortinet, we promote a culture of innovation, collaboration, and continuous learning. We are dedicated to fostering an inclusive environment where every employee is valued and respected. We encourage individuals from diverse backgrounds and identities to apply. Our Total Rewards package is competitive, supporting your overall well-being and offering flexible work arrangements in a supportive environment. If you are looking for a challenging, fulfilling, and rewarding career journey, we invite you to explore the opportunity of joining us to provide impactful solutions to our 660,000+ customers worldwide.,

Posted 1 week ago

Apply

2.0 - 7.0 years

0 Lacs

pune

Work from Office

Key Responsibilities: Deploy and manage antivirus agents (e.g., Trend Micro) across all managed endpoints. Ensure real-time protection, policy enforcement, and consistent update of virus definitions. Administer full-disk encryption solutions and handle decryption requests. Investigate malware infections, quarantine events, and initiate remediation workflows. Review endpoint health and compliance dashboards and generate periodic reports. Work with EUC teams to enforce USB control, device lockdown, and application whitelisting. Assist L3 with policy rollouts, tuning signatures, and creating exception lists. Perform forensic artifact collection from infected endpoints as per IR protocols. Participate in root cause analysis of repeated infections and provide corrective action inputs. Support asset onboarding and offboarding from endpoint protection platforms. Key Skills & Certifications: 5 to 7 years of experience with Trend Micro Apex One, Symantec, or equivalent EDR/XDR platforms. Good understanding of endpoint hardening, patching, and encryption controls. Familiarity with secure device lifecycle management. Certifications: Trend Micro Certified Professional Apex One Microsoft Defender for Endpoint Certified CompTIA CySA+ optional

Posted 1 week ago

Apply

3.0 - 8.0 years

5 - 11 Lacs

hyderabad, chennai

Work from Office

Role & responsibilities Proficiency with advanced reversing tools (e.g., IDA Pro, Ghidra). • Ability to reverse-engineer heavily obfuscated code and native libraries. • Capability to analyze and break custom cryptographic routines used by common malware. • Expertise in threat identification, with the ability to accurately pinpoint malicious code and classify all categories of malicious applications. • Experience in Android reverse engineering (APK, DEX), malware analysis, and threat modeling. • Strong understanding of ARM-based architecture. • Android application development experience in C/C++ and Java. • Experience analysing app behaviour using automated tools and sandboxing environments to identify known malicious patterns. • Foundational and in-depth technical knowledge of security engineering, computer and network security, authentication, security protocols, and applied cryptography. • Experience in automation and scripting, preferably in Python. • Ability to classify applications based on predefined Standard Operating Procedures (SOPs) and known threat indicators. Preferred candidate profile

Posted 2 weeks ago

Apply

2.0 - 6.0 years

3 - 8 Lacs

hyderabad, pune, chennai

Work from Office

Android Malware Analyst Location PUN, HYD & CEN ________________________________________ Minimum Qualifications: Bachelor's degree in Computer Science, a related technical field, or equivalent practical experience. 23 years of experience in security assessments, security design reviews, or threat modeling. Experience in malware analysis, reverse engineering, and software development. ________________________________________ Preferred Qualifications: Expertise in threat identification, with the ability to accurately pinpoint malicious code and classify all categories of malicious applications. Experience in Android reverse engineering (APK, DEX), malware analysis, and threat modeling. Understanding of ARM-based architecture. Android application development experience in C/C++ and Java. Experience analysing app behaviour using automated tools and sandbox environments to identify known malicious patterns. Strong technical knowledge of security engineering, computer and network security, authentication, security protocols, and applied cryptography. Experience with automation and scripting, preferably in Python. Ability to classify applications based on predefined Standard Operating Procedures (SOPs) and known threat indicators. ________________________________________ Responsibilities: Perform initial triage and security analysis of a high volume of Android applications. Perform reverse engineering and analyse malware at scale. Document all analysis findings accurately and concisely for reporting purposes. Advocate for security best practices and secure coding. Conduct research to identify potential attack vectors against Android. Collaborate with team members to enhance Android Security and Privacy's understanding of malware and propose methods for detection and mitigation.

Posted 3 weeks ago

Apply

2.0 - 3.0 years

3 - 6 Lacs

hyderabad, pune, chennai

Work from Office

Android Malware Analyst Location PUN, HYD & CEN ________________________________________ Minimum Qualifications: Bachelor's degree in Computer Science, a related technical field, or equivalent practical experience. 2–3 years of experience in security assessments, security design reviews, or threat modeling. Experience in malware analysis, reverse engineering, and software development. ________________________________________ Preferred Qualifications: Expertise in threat identification, with the ability to accurately pinpoint malicious code and classify all categories of malicious applications. Experience in Android reverse engineering (APK, DEX), malware analysis, and threat modeling. Understanding of ARM-based architecture. Android application development experience in C/C++ and Java. Experience analysing app behaviour using automated tools and sandbox environments to identify known malicious patterns. Strong technical knowledge of security engineering, computer and network security, authentication, security protocols, and applied cryptography. Experience with automation and scripting, preferably in Python. Ability to classify applications based on predefined Standard Operating Procedures (SOPs) and known threat indicators. ________________________________________ Responsibilities: Perform initial triage and security analysis of a high volume of Android applications. Perform reverse engineering and analyse malware at scale. Document all analysis findings accurately and concisely for reporting purposes. Advocate for security best practices and secure coding. Conduct research to identify potential attack vectors against Android. Collaborate with team members to enhance Android Security and Privacy's understanding of malware and propose methods for detection and mitigation.

Posted 3 weeks ago

Apply

4.0 - 9.0 years

16 - 20 Lacs

mumbai, mumbai suburban, mumbai (all areas)

Work from Office

Monitor,analyze security events,alerts across various platforms. Investigate potential security incidents,escalate as appropriate,following defined incident response processes. Correlate events from multiple sources to identify patterns or anomalies Required Candidate profile Lead,participate in threat hunting activities to proactively identify potential threats vulnerabilities Serve as the administrator for SOC tools including SIEM, EDR, SOAR,threat intelligence platforms Perks and benefits To be disclosed post interview

Posted 4 weeks ago

Apply

8.0 - 12.0 years

0 Lacs

karnataka

On-site

As a Security Engineer at Google, you will play a crucial role in ensuring the safety and security of Google's users and developers. With a Bachelor's degree or equivalent practical experience, along with 8 years of experience in security research, malware, reverse engineering, vulnerability exploitation, or hacking, you will be well-equipped to lead security engineering teams. In this role, you will be responsible for protecting network boundaries, hardening computer systems and network devices against attacks, and providing security services to safeguard sensitive data such as passwords and customer information. Your duties will include actively monitoring systems for intrusions, collaborating with software engineers to address security flaws, and proactively identifying vulnerabilities. As a recognized expert in multiple security domains, you will utilize your leadership skills to guide a team in addressing Google-wide security challenges. By identifying and addressing fundamental security issues within Google's infrastructure, you will drive significant security enhancements across the organization. Within the Android Anti-Malware team, you will focus on analyzing and mitigating Android malware threats. By studying emerging malware families and categories, you will develop strategies to detect and mitigate potential harm to Android users. Android, Google's open-source mobile operating system, powers over 3 billion devices worldwide, with a mission to make computing accessible to everyone. You will collaborate with OEMs and developers to create innovative computing devices, ensuring that users worldwide have access to the best computing experiences. Key Responsibilities: - Lead a team of security engineers specializing in malware analysis. - Conduct reverse engineering to analyze and detect malware on a large scale. - Promote security best practices within the Google Play and Android ecosystem. - Conduct research to identify potential attack vectors targeting Android. - Collaborate with team members to enhance knowledge of Android malware and develop strategies for detection and mitigation.,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

As a Team Lead of the SOC Analyst Team in the Cybersecurity/Security Operations department, your primary responsibility will be to guide and support a group of security analysts in their day-to-day tasks. You will oversee daily SOC operations, ensuring that the team adheres to processes, SLAs, and quality standards. Facilitating team meetings, knowledge-sharing sessions, and performance evaluations will also be part of your role. Additionally, you will schedule and coordinate shifts to maintain 24/7 coverage and proper workload distribution. Your expertise will be crucial in overseeing the detection, triage, investigation, and response to cybersecurity incidents. Working closely with threat intelligence, IT, and engineering teams, you will collaborate to remediate threats effectively. After incidents, you will conduct root cause analysis and recommend preventive measures to enhance security posture. To excel in this role, you must have a strong understanding of security frameworks like MITRE ATT&CK and NIST. Hands-on experience with tools such as CrowdStrike, Splunk, WIZ, VirusTotal, Jira, Confluence, AWS, Azure, and GCP is essential. Proficiency in incident detection, investigation, and response is required, along with familiarity in handling various alert types including IDS/IPS alerts, EDR detections, malware and forensic investigations, phishing attempts, and cloud-related security incidents. Your communication, leadership, decision-making, analytical, and problem-solving skills will be vital in managing pressure during security incidents and multitasking in a dynamic environment. The ideal candidate should have a minimum of 5-7 years of experience in a SOC environment, with at least 1-2 years of team leadership or supervisory experience. This position requires working in rotational shifts to ensure 24/7 coverage of security operations. While certifications such as CompTIA Security+ or Google Cybersecurity Professional Training are valuable, hands-on experience and leadership abilities take precedence in this role.,

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

You should have a Bachelor's degree in Computer Science, a related technical field, or equivalent practical experience. Additionally, a minimum of 5 years of experience with security assessments, security design reviews, or threat modeling is required. Previous experience in Malware, Reverse Engineering, and Software Development is also essential. Preferred qualifications include expertise in Android reverse engineering (DEX, ARM), malware analysis, threat modeling, incident/emergency response, OS hardening, vulnerability management, pen testing, or cryptographic concepts. Experience in Android application development using C++, Java, or Kotlin is highly valued. A solid technical foundation in security engineering, computer and network security, authentication, security protocols, and applied cryptography is preferred. As a Security Engineer, you will be part of the team responsible for maintaining a secure operating environment for Google's users and developers. Your responsibilities will include working with network equipment, monitoring systems for attacks and intrusions, and collaborating with software engineers to identify and address security vulnerabilities. The Platforms and Devices team focuses on Google's computing software platforms (desktop, mobile, applications) and first-party devices and services. This team works on developing new technologies to enhance user experiences and interactions with computing devices. Key responsibilities of this role include performing reverse engineering to detect malware at scale, promoting security best practices within the Google Play and Android ecosystem, researching potential attack vectors against Android, and collaborating with team members to enhance Android Security and Privacy's understanding of malware detection and mitigation techniques. Proficiency in Python, SQL, and Code Analysis is also desired.,

Posted 1 month ago

Apply

0.0 - 4.0 years

0 Lacs

mysore, karnataka

On-site

As a Cybersecurity Intern at our company, you will have the opportunity to showcase your passion for cybersecurity by creating impactful content that educates and informs. Your role will involve contributing to content creation and conducting hands-on lab demonstrations. Your responsibilities will include leveraging your strong foundational knowledge of key cybersecurity concepts such as phishing, malware, firewalls, and network security. Additionally, you will be expected to demonstrate excellent communication skills in English, both verbal and written. A crucial aspect of your role will be the ability to record and edit activity-based screen captures, hands-on demonstrations, and simulations. You should be familiar with tools like OBS Studio or similar screen recording software to effectively carry out these tasks. Moreover, your proficiency in Microsoft PowerPoint or Google Slides will be essential for designing structured and engaging training content. You will also need to utilize Microsoft Excel or Google Sheets for managing schedules, tracking resources, and organizing feedback effectively. This internship opportunity is open to final-year students or recent graduates in B.E / B.Tech / BCA / MCA from any stream. The duration of the internship is 3 months, and we welcome freshers who are enthusiastic about cybersecurity to apply for this position. Join our team and make a meaningful contribution to the cybersecurity domain through your creativity and technical skills.,

Posted 1 month ago

Apply

0.0 - 4.0 years

0 - 0 Lacs

chennai, tamil nadu

On-site

As a Laptop Technician Fresher at Raminfotech, you will be responsible for providing professional laptop service engineering with excellent interpersonal skills. Your primary duties will include resolving problems such as hard drive crashes, obsolete hardware, infected files, spyware, malware, viruses, and other compromised issues. Additionally, you will be required to install/repair company products such as AC, Internet Cable, pest control, etc. This position offers a salary range of Rs. 13500 to Rs. 15000 based on your skills and interview performance. The working hours are from 10 am to 8 pm, Monday to Saturday. The educational requirement for this role is below 10th pass, and it is a full-time position based in the office. We are specifically looking for male candidates aged between 19 to 28 years. No predefined skills are necessary for this position as we are seeking freshers who are willing to learn and grow in the role. The interview location is in Vadapalani, and the job locations include Adyar, Vadapalani, Madipakkam, Tambaram, Porur, and Velachery. This is a full-time, permanent position with benefits such as a flexible schedule, performance bonus, and yearly bonus. If you are a motivated individual with a passion for technology and problem-solving, we encourage you to apply for this exciting opportunity to kickstart your career as a Laptop Technician at Raminfotech.,

Posted 1 month ago

Apply

2.0 - 6.0 years

0 Lacs

hyderabad, telangana

On-site

Qualcomm India Private Limited is seeking a dedicated individual to join the Information Technology Group as part of the Cyber Security Engineering team. As a member of this team, you will play a crucial role in supporting 24x7 operations, which may involve working night and weekend shifts on a rotational basis to meet the organization's business requirements. Your primary responsibilities will include monitoring and triaging security events received by the SOC/CDC from various sources such as social engineering attacks, malware, DDoS, data exfiltration, ransomware, among others. You will be expected to follow standard operating procedures to triage events for the first 20 minutes, engaging Tier2 for further assistance as needed. Utilizing Orchestration tool workflows and knowledge base, you will analyze security event and incident data, update the Ticketing system promptly, and communicate with stakeholders to provide recommendations on mitigation and prevention techniques. In this role, you will work closely with Tier3 teams, escalate security events in a timely manner, stay updated on new Use Cases and process changes, and actively participate in brown bag sessions. The ideal candidate should possess a good understanding of current and emerging security threats and technologies, along with strong proficiency in security event investigations and excellent written and verbal communication skills in English. Prior experience in 24x7 SOC or CDC operations is preferred, along with a Bachelor's or Master's degree in Computer Sciences or Cyber Security. Qualifications for this position include 3-5 years of experience working with a SIEM tool, a solid background in security incident response and system operations, and certifications such as CEH, Security+, OSCP, or other industry-relevant cyber-security certifications. Knowledge of ITIL V3.0 is considered a plus. Minimum qualifications consist of a Bachelor's degree in Engineering, Information Systems, Computer Science, or a related field along with 2+ years of cybersecurity-relevant work experience. Alternatively, a High school diploma or equivalent with 4+ years of relevant work experience is also acceptable. If you are an individual with a disability requiring accommodations during the application/hiring process, please contact Qualcomm at disability-accommodations@qualcomm.com. Qualcomm is dedicated to providing a supportive and accessible process for all individuals. As an equal opportunity employer, Qualcomm expects all employees to adhere to applicable policies and procedures, including those related to the protection of confidential information. Staffing and recruiting agencies are advised not to submit profiles, applications, or resumes through Qualcomm's Careers Site, as unsolicited submissions will not be considered. For more information about this exciting opportunity, please reach out to Qualcomm Careers.,

Posted 1 month ago

Apply

6.0 - 10.0 years

0 Lacs

noida, uttar pradesh

On-site

NTT DATA Services is looking for individuals who are exceptional, innovative, and passionate about cybersecurity technologies. As part of our team, you will provide operational support for various technologies such as CrowdStrike, Zscaler, Checkpoint Harmony, and others within scope. Your responsibilities will include communicating plans and updates on tasks and projects, as well as identifying and escalating issues and risks. Additionally, you will schedule and lead working group meetings, prepare meeting agendas and minutes, and ensure timely closure of action items. You will also be responsible for offering ad-hoc operational support, ensuring the integration of functions align with business goals, and identifying problem causality, business impact, and root causes. As a senior member of the team, you may advise or mentor junior team members, coordinate with cross-functional Operations and Technology (O&T) counterparts to enhance risk oversight, and address non-compliant items through collaboration with Business Managers and staff from various sectors. To qualify for this role, you should have at least 6 years of relevant experience, preferably in a bank or financial institution setting. Strong expertise in Cyber Security and antivirus/malware technologies, specifically CrowdStrike, Trellix, and Zscaler, is required. Excellent written and verbal communication skills are essential, along with knowledge of Scripting and Programming Languages. You should also demonstrate the ability to interpret and apply information security policies, standards, and procedures, as well as possess influencing and relationship management skills. Ideally, you will hold a Bachelor's degree or equivalent experience, with a Master's degree being preferred. If you are ready to be part of a dynamic and forward-thinking organization, apply now and join us in tackling security challenges across multiple businesses. #LI-MIWS,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Technical Support Specialist at Palo Cortex XDR, you will be responsible for providing technical support to customers and partners. Your role will include offering technical services such as writing scripts, troubleshooting, and sharing best practices with customers. You will manage support cases efficiently to ensure that issues are properly recorded, tracked, resolved, and followed up on in a timely manner. Additionally, your responsibilities will involve fault isolation and root cause analysis for technical issues, as well as publishing Technical Support Bulletins and other technical documentation in the Knowledge Base. You will review technical documentation for training materials, technical marketing collateral, manuals, troubleshooting guides, and more. In critical situations, you may need to travel to customer sites to expedite issue resolution. You will also be required to provide on-call support 24x7 on an as-needed basis. Collaborating with the Engineering team, you will have the opportunity to influence the operability of the product and contribute to regular weekend on-call rotation. To excel in this role, you should possess at least 3 years of related experience. Strong expertise in providing configurations, troubleshooting, and best practices to customers is essential. Proficiency in supporting EndPoint software products, along with experience in Windows OS, Linux OS, macOS, and Android OS-based applications is required. Familiarity with MS environment tools like SCCM, GPO, AD, MSSQL, and IIS is crucial. Furthermore, experience with EndPoint security software, SIEM, vulnerability management tools, firewalls, and understanding of malware, exploits, and operating system behavior will be beneficial. Proficiency in batch scripting and Python is a plus. You should have the ability to independently troubleshoot, reproduce issues, and identify feasible workarounds in varied and complex environments. A knowledge of Cloud infrastructure, VDI technologies (VMWare Horizon, Citrix XenApp, and XenDesktop), and a BS/MS degree or equivalent experience will be valuable assets in this role. Effective communication skills to engage with stakeholders internally and externally on complex technical issues are essential for success in this position.,

Posted 1 month ago

Apply

6.0 - 11.0 years

15 - 30 Lacs

Bengaluru

Work from Office

Role Summary: We are looking for an experienced Microsoft Security Solutions Architect to lead the design, implementation, and support of Microsoft security ecosystem across identity, endpoint, threat protection, and compliance. This role requires deep hands-on knowledge of Microsoft Intune, Defender suite, Entra ID , and Microsoft Sentinel , with a strong emphasis on real-world threat mitigation , including malware attack handling and DNS firewall configuration . Key Responsibilities: Solution Design & Implementation Architect and implement Microsoft Intune for device compliance, app management, conditional access, and policy deployment across Windows, macOS, iOS, and Android environments. Deploy and optimize Microsoft Defender for Endpoint, Identity, Office 365 , and Defender for Cloud Apps in alignment with organizational security frameworks. Configure Microsoft Entra ID (Azure AD) features including Conditional Access, SSO, MFA, PIM, RBAC, and Identity Protection policies. Drive the adoption of Zero Trust Architecture , aligning endpoint protection and identity governance with customer risk management objectives. Implement and manage DNS Firewall solutions to block malicious domains and enhance threat visibility and control. Lead the detection, response, and mitigation of malware attacks , leveraging Microsoft security tools and incident response strategies. Client Engagement & Advisory Conduct client security assessments and define Microsoft-centric security roadmaps and architectural recommendations. Deliver technical workshops, POCs, and pilot deployments for Intune, Defender, and Entra ID solutions. Act as a trusted advisor on Microsoft Security best practices , data protection (e.g., GDPR, ISO 27001 ), governance, and regulatory compliance. Operations & Support Guide operational teams in incident detection, investigation, and remediation , especially related to malware, phishing, and endpoint threats. Maintain and update technical documentation including architectures, policies, configurations , and incident response procedures . Support scripting and automation for policy deployment, compliance monitoring, and operational efficiency using PowerShell and other tools. Required Skills & Experience: 6+ years of hands-on experience with Microsoft security solutions and enterprise IT environments. Deep expertise in: Microsoft Intune / Endpoint Manager Microsoft Defender Suite (Defender for Endpoint, Identity, Office 365, Cloud Apps) Microsoft Entra ID / Azure AD , including Identity Governance, Conditional Access, and PIM Endpoint threat protection and malware remediation DNS Firewall technologies (e.g., Microsoft Defender for DNS, third-party DNS protection tools) Strong proficiency in PowerShell scripting , automation of compliance policies, and endpoint configurations. Familiarity with Microsoft Sentinel , Zero Trust frameworks , and modern workplace security models. Solid experience with incident response , endpoint telemetry, and real-world malware analysis and resolution. Excellent verbal and written communication skills; able to engage both technical and non-technical stakeholders. Preferred Certifications: SC-200 : Microsoft Security Operations Analyst SC-300 : Microsoft Identity and Access Administrator SC-400 : Microsoft Information Protection Administrator MD-102 : Microsoft Endpoint Administrator Knowledge of integrations with third-party MDM, SIEM, DNS security , and IAM platforms is a plus.

Posted 1 month ago

Apply

5.0 - 8.0 years

4 - 6 Lacs

Kolkata

Work from Office

Design,implement,maintain & troubleshoot AD domain,Exchange & Messaging,Administer & support MS Exchange Server,Manage & support MS Exchange Online within MS 365,mail flow rules & antispam/malware policies, Also monitor Azure health,performance.

Posted 1 month ago

Apply

5.0 - 9.0 years

0 Lacs

delhi

On-site

The role of a Splunk Security Solution Architect is to serve as a subject matter expert for Splunk Security products and provide expertise on the broader security landscape. Your primary responsibility will be to support Splunk account teams, including sales and pre-sales resources, in developing tailored security solutions for customers. As the "eyes and ears" for the field, you will offer expert guidance and recommendations to help customers enhance the security and resiliency of their organizations. Your key responsibilities will include establishing and maintaining strong relationships with clients and partners, collaborating closely with account teams to align with sales strategies, and conducting demonstrations of Splunk's security products and services to customers. Additionally, you will be required to respond to functional and technical aspects of RFIs/RFPs, provide hands-on leadership in resolving technical issues, and demonstrate a strong ability to collaborate effectively. To excel in this role, you should possess a Splunk Certified Administrator certification or have sufficient knowledge to administer Splunk Enterprise and solutions. You must have at least 5 years of experience as a successful pre-sales engineer, systems integrator, or similar role within the cybersecurity domain. Familiarity with cyber threats, incident response practices, SIEM, automation tools, endpoint technology, threat intelligence, and enterprise hardware and software technologies is essential. Experience with operating systems, networking technology, enterprise software, cloud platforms, scripting languages, and industry certifications such as SANS GIAC, CISSP, CISM, etc., will be advantageous. Furthermore, you should demonstrate strong interpersonal skills, effective communication abilities across different audience types, and a self-motivated attitude with an insatiable curiosity for technological possibilities. A positive and fun-loving demeanor, along with a desire to work with a dynamic team, is key for success in this role. Please note that we are committed to providing guidance on technology, supporting your soft skills development, and educating you on processes. Your passion for technology, motivation, and enthusiasm for working in a collaborative team environment will be highly valued in this position.,

Posted 1 month ago

Apply

0.0 - 4.0 years

0 Lacs

ahmedabad, gujarat

On-site

You are invited to join our Information Security team as a 1st Line Security Engineer in the role of Network Associate. This entry-level position offers an excellent opportunity for individuals who are enthusiastic about commencing their career in cybersecurity. As a Network Associate, your primary responsibility will be to serve as the initial point of contact for security alerts and incidents. You will be tasked with monitoring our systems, identifying potential threats, and promptly escalating issues to senior engineers when necessary. To support your professional development in a dynamic and rapidly evolving security environment, we are committed to providing comprehensive training and mentorship. Your main duties will involve monitoring security tools and dashboards, such as SIEM, endpoint protection, and firewalls, to detect any suspicious activities. You will be responsible for conducting initial triage and analysis of security alerts, documenting incidents accurately, and maintaining organized records in the ticketing system. Additionally, you will assist in vulnerability scanning, follow-ups on patch management, participate in user awareness campaigns and phishing simulations, and contribute to compliance audits and documentation efforts. It is crucial to stay informed about the latest cyber threats and attack vectors to effectively fulfill your role. To qualify for this position, you should hold a Bachelor's degree in information security, Computer Science, or a related field, or possess equivalent experience. A basic understanding of networking principles (TCP/IP, firewalls, DNS) and operating systems (Windows/Linux) is essential. Familiarity with common cybersecurity tools and concepts, such as antivirus, phishing, malware, ransomware, and SIEM, is advantageous. Strong communication skills, problem-solving abilities, and a willingness to work in shifts or participate in on-call rotations, if necessary, are key attributes we are looking for in potential candidates. While not mandatory, having certifications like CompTIA Security+, CEH, or equivalents would be beneficial. Hands-on experience with tools like Splunk, CrowdStrike, Microsoft Defender, Wireshark, or previous involvement in cybersecurity-related internships or academic projects focused on incident response are considered as preferred qualifications for this role. Join us in this exciting opportunity to kickstart your cybersecurity career and make a meaningful impact in the field of Information Security.,

Posted 1 month ago

Apply

3.0 - 7.0 years

0 Lacs

pune, maharashtra

On-site

As an Intelligence Analyst at Fortinet, you will be part of the Cyber Threat Intelligence (CTI) Collections/Analysis team, a dedicated group of skilled analysts, collectors, and specialists committed to safeguarding customers and their assets from external threats. Leveraging our advanced hybrid intelligence platforms and methodologies, your primary role will involve utilizing your writing and editing abilities to contribute to the generation of actionable intelligence for our client base. This includes assessing existing and emerging threats related to cybercrime and various forms of malicious exploitation. Your responsibilities will include monitoring and analyzing cybersecurity events, incidents, and vulnerability reports sourced from multiple outlets. You will be involved in reviewing and interpreting data from various sources such as OSINT, Darknet, and TECHINT. Collaborating closely with the Internal Research team, you will help identify threats specific to individual customers and create tailored analytical reports based on your findings. Additionally, you will be responsible for producing regular Security Trend reports using information from the internal threat repository and collaborating with customer points of contact to understand their threat landscape and customize service delivery accordingly. Furthermore, you will play a crucial role in monitoring, analyzing, and reporting on cybersecurity events, intrusion events, security incidents, and other indicators of potential threats. Adhering to operational security best practices is essential to safeguard sources and methods effectively. To excel in this role, you should possess strong fundamentals in Information Security, a solid understanding of Cyber Threat Intelligence, and the ability to produce high-quality Security Analysis reports. Your skill set should include the capacity to comprehend and analyze various threat vectors proficiently, along with knowledge of cyber threats, malware, APTs, exploits, etc. Familiarity with the DarkNet, DeepWeb, as well as open-source, social media, and other platforms of cyber-criminal activity is highly beneficial. Strong communication skills in English, along with the ability to engage effectively with diverse clients and articulate technical details clearly and concisely, are essential. A willingness to learn new technologies and skills, adapt to evolving circumstances, and innovate as needed is paramount. Previous experience in a Security Operations Center (SOC) environment or Cyber Crime Research will be advantageous, although not mandatory. Possession of certifications such as CEH, OSCP, or other cybersecurity credentials is a plus, while programming/scripting knowledge would be considered an additional asset. Maintaining the utmost discretion and confidentiality is crucial in this role. Proficiency in languages such as English, Hindi, and any other international languages like Arabic, Russian, Japanese, Chinese, German, or Italian would be advantageous.,

Posted 2 months ago

Apply

6.0 - 11.0 years

10 - 20 Lacs

Bengaluru

Work from Office

Role & responsibilities Investigate high complexity cyber security incidents (2nd Level) with minimal direction, determine the root cause and establish defense measures as part of the global Cyber Defense Center team. Analyze operational logs and event console activities to identify security related events; Develop targeted defense response measures for implementation Create Management communication for Major Incidents and drive and facilitate Communication bridges/briefs to upper management as necessary Improve and maintain cyber defense related processes and procedures . Provide strong technical expertise in using and customizing of cyber defense tools like SIEM, AEP, DLP or UEBA solutions for CIRT actions Participate in the "on-call" duty of the global incident response team, and provide the fallback insurance for IT and SOC Participate in international IT security projects Represent Bayer in external technical user groups. Prepare and design system security reports by framing data, insights, and trends to support the proposal of proactive cyber defense capabilities.

Posted 2 months ago

Apply

5.0 - 8.0 years

15 - 20 Lacs

Bengaluru

Hybrid

Key Skills: Vulnerability, DLP, Crowdstrike, Malware, Cyber Security, Threats, Cyber Threat, SIEM, Siemens Ops center Roles and Responsibilities: Operational Maturity: Create clear documentation for processes, metrics, and outcomes, ensuring adherence to Service Level Agreements (SLAs) and compliance requirements. Promote continuous improvement in threat hunting and DLP management. DLP Leadership: Offer technical leadership in developing and enhancing the DLP program at Fortive. Establish metrics to measure the program's success. Security Tool Operations: Manage and oversee relevant security tools, ensuring comprehensive coverage and effectiveness across the enterprise while continuously enhancing detection and prevention mechanisms. Cloud and DevOps Security: Drive security capabilities by embedding security into DevOps workflows, leveraging cloud-native tools, and advancing automation for detection and response. Continuous Improvement: Stay current and share best practices in both threat hunting and data loss prevention. Leverage artificial intelligence to reduce manual work. DLP Programme: Collaborate with other security teams, legal, IT, and key stakeholders to document and drive a DLP program to protect Fortive data. Change Management: Adhere to change management processes in managing security platforms. Ensure proper lifecycle management of threat hunting artifacts. Collaboration: Work with cross-functional teams in both proactive and reactive security scenarios. Collect and analyze feedback to continuously refine tools, platforms, and support processes. Skills Required: 5+ years of experience in cybersecurity, with a focus on DLP and threat detection. Hands-on experience with CrowdStrike Platform; NG SIEM an advantage. Strong knowledge of IT security principles and compliance standards. Familiarity with at least one DLP solution. Demonstrated ability to balance strategic vision with hands-on implementation. Exceptional communication and problem-solving skills. A driven and self-starting individual who can work independently and take initiative. Experience working across multiple countries and time zones is an advantage. Education: Bachelor's degree in Cyber Security, Information Technology or related field.

Posted 2 months ago

Apply

3.0 - 5.0 years

1 - 5 Lacs

Hyderabad, Chennai, Bengaluru

Work from Office

LTI Mindtree hiring Malware Analyst role. Roles and Responsibilities: Static and dynamic malware analysis(aware of file structure like, PE, PDF, OLE, windows short cut files etc...) someone who has hands on writing signatures for malware samples(at-least initial vector malware). Aware of trending malware family campaign and analysis for threat write ups for that follow up family. (example malware family - Emotet/Qakbot/AgentTesla etc..) Email security and Endpoint Security (EOP) Investigating the Phishing campaign and spam emails which users have received and reported. Threat Intelligence analysis/ Threat hunting Analyzing PE files (Dynamic and static analysis) and providing detection for malicious PE files.(RE/Malware Analysis) Analyzing non-PE file s (like OLE / PDF / HTML / HTA / VBS|VBE /JS/ WSF/JAR/LNK) andproviding detection for malicious files. Malware Analysis and Reversing. Reverse Engineering skills: familiar with debuggers, disassemblers, network protocols, file formats, sandboxes, hardware/firmware internals, software communication mechanisms, Classification, clustering and labelling of Malware. Knowledge of Advanced Techniques of Malware Analysis. Knowledge of Malware kill chain and MITRE ATT&CK techniques and tactics. Knowledge of AV evasion techniques and Pen testing tools like - Veil (equal rank), PowerShell Empire, Meterpreter, Unicorn, Cactus Torch, and Any other similar tools Additionally, Experience with advanced persistent threats, human adversary compromises and incident response. Excellent cross-group and interpersonal skills, with the ability to articulate business need for detection improvements. Excellent analytical skills and ability to identify patterns and trends. Strong research skills, data knowledge, and ability to analyze and present complex data in a meaningful way. Strong understanding of Cyber Security, modern security problems and threat landscape, Operating Systems (internals), computer networking concepts. Required Skills: Olly DBG, IDA PRO, Static and dynamic malware analysis, PE and non-PE file analysis Job Location: Pan India Experience: 3 to 5 years If you are ready to embark on a new chapter in your career, kindly share your resume at Muthu.Pandi@ltimindtree.com Please share below details: Contact Number: Preferred time to connect: Total Experience : Relevant Experience : Current Location: Preferred Location: Notice Period: Current CTC: Expected CTC: Reason for job change: Regards, Muthu Pandi HR LTIMindtree

Posted 2 months ago

Apply
Page 1 of 2
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies