Jobs
Interviews

495 Metasploit Jobs - Page 19

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 years

0 Lacs

New Delhi, Delhi, India

On-site

Job Title : Ethical Hacking Trainer (Full-Time/Part-Time) Location : Greater Kailash 2, South Delhi Company : DizitalAdda – A Leading Digital & Professional Education Institute About Us : DizitalAdda is a premier digital marketing and professional skills training institute located in the heart of South Delhi. With an established presence in digital education, we are now expanding into the Cyber Security and Ethical Hacking domain. We are currently seeking a skilled and passionate Ethical Hacking Trainer to join our team and deliver hands-on, industry-relevant training to aspiring cybersecurity professionals. Roles & Responsibilities : Deliver engaging, practical, and real-world-based training in Ethical Hacking. Teach topics like: Vulnerability Assessment Penetration Testing Network & Web Application Security Social Engineering Wi-Fi Hacking Cryptography Tools like Kali Linux, Wireshark, Nmap, SQLMap, Metasploit, etc. Create training content, assignments, and live labs for learners. Prepare students for certifications like CEH, OSCP, or CompTIA Security+. Maintain course quality and student satisfaction. Conduct doubt sessions and assessments regularly. Required Skills : Strong knowledge of Ethical Hacking, Cybersecurity, and Penetration Testing. Hands-on experience with real-world attack & defense scenarios. Good communication and presentation skills. Familiarity with Linux OS, Networking basics, and scripting (Python preferred). Previous training experience (offline/online) preferred. Qualifications : Bachelor's in Computer Science/IT/Cyber Security or equivalent. Certifications like CEH / OSCP / Security+ (preferred but not mandatory). 1–3 years of experience in cybersecurity training or real-world cybersecurity projects. Employment Type : Full-Time / Part-Time / Weekend Batch Trainer (Flexible Options Available) Salary : ₹20,000 – ₹50,000 per month (Based on experience & expertise) Why Join Us ? Prime Location: South Delhi (Greater Kailash 2) Modern classrooms & lab setup Freedom to design practical sessions Exposure to corporate clients and real projects Growth opportunities in a fast-growing education brand How to Apply: Send your resume and any certification proof to: 📩 hr@dizitaladda.com 📞 +91-9555393551 🌐 www.dizitaladda.com Show more Show less

Posted 2 months ago

Apply

7.0 years

0 Lacs

Thiruvananthapuram, Kerala, India

On-site

Job Description Principal Security Software Engineer Are you interested in building large-scale distributed software for the cloud? Oracle’s Service Cloud team is building Software-as-a-Service technologies that operate at high scale in a broadly distributed multi-tenant cloud environment. Our customers run their businesses on our cloud, and our mission is to provide them with best in class compute, storage, networking, database, security, and an ever expanding set of foundational cloud-based services. We’re looking for hands-on engineers with expertise and passion in identifying and resolving difficult security problems in distributed systems, virtualized infrastructure, and highly available services. If this is you, at Oracle you can design and build innovative new systems from the ground up. These are exciting times in our space - we are growing fast, still at an early stage, and working on ambitious new initiatives. An engineer at any level can have significant technical and business impact. As a Principal Security Software Engineer you will review the software design and development for all components of Oracle’s Service Cloud team. Develops and execute programs and processes to reduce information security risk and strengthen Oracle’s security posture. You should value simplicity and scale, work comfortably in a collaborative, agile environment, and be excited to learn. Things you'll do: Penetration testing Hardening of network, software and firmware Security tool development (e.g. scanning tools) Security metrics definition and delivery Consult across different software development teams Attack vector modeling Champion secure coding practices Minimum Qualifications: Bachelor’s or Master’s degree in Computer Science or related field 7+ years of experience in software engineering or related field Experience working in a large cloud or Internet software company preferred Strong application/product/software security background Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, verbal and written communication skills Ability to succeed through collaboration and working through internal and external organizations and individuals Prior DevOps or continuous delivery and deployment experience preferred Strong security testing experience with Fortify, Burp, Zap or Webinspect. Thorough understanding of latest security principles, techniques, and protocols. Security certifications is a plus. Skills Required: Application architecture and design reviews; Penetration Testing and Vulnerability assessments; Web Services and API security assessments; Product Security Assessments and Threat Modeling; Dynamic Vulnerability Scanning using automated application scanners; Execute Secure Code Audits using manual and automated methods to review product codes; Secure SDLC Processes including DevOps and Agile; Knowledge of languages, including Java, .Net, PHP, C++, and XML; Security Testing tools, including Nmap, Nessus, Web Inspect, BurpSuite, ZAP Scanner, Fortify Secure code scanner, SOAP UI, Kali Linux, and Metasploit; Operating Systems including Windows and Linux; Cryptographic algorithms, hashing algorithms, encryption; and Network and web related protocols, including TCP/IP, TLS/SSL, HTTP, and FTP. Detailed Description And Job Requirements As a member of the software security team, you will assist in defining and developing software for tasks associated with the security testing of software applications. Provide technical leadership to other software developers. Specify, design and implement modest changes to existing software architecture to meet changing needs. Develop, implement, and enforce Oracle’s security policies. Develop, implement, and manage Oracle’s compliance with operational security procedures. Develop Security Review threat model and operationalization standards for cloud services to be built and deployed into Oracle’s Service cloud. Duties and tasks are varied and complex needing independent judgment. Fully competent in own area of expertise. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans status or any other characteristic protected by law. Career Level - IC4 Responsibilities Supports the strengthening of Oracle’s security posture, focusing on one or more of the following: risk management; regulatory compliance; threat and vulnerability management; incident management and response; security policy development and enforcement; privacy; information security education, training and awareness (ISETA); digital forensics and similar focus areas. Risk Management: Brings advanced level skills to assess the information security risk associated with existing and proposed business operational programs, systems, applications, practices and procedures in very complex, business-critical environments. May conduct and document very complex information security risk assessments. May assist in the creation and implementation of security solutions and programs. Regulatory Compliance: Brings advanced level skills to manage programs to establish, document and track compliance to industry and government standards and regulations, e.g. ISO-27001, PCI-DSS, HIPAA, FedRAMP, GDPR, etc. Researches and interprets current and pending governmental laws and regulations, industry standards and customer and vendor contracts to communicate compliance requirements to the business. Participates in industry forums monitoring developments in regulatory compliance. Threat and Vulnerability Management: Brings advanced level skills to research, evaluate, track, and manage information security threats and vulnerabilities in situations where in-depth analysis of ambiguous information is required. Incident Management and response: Brings advanced level skills to respond to security events, identifying possible intrusions and responding in line with Oracle incident response playbooks. May operate as Incident Commander on serious incidents. Digital Forensics: Brings advanced level skills to conduct data collection, preservation and forensic analysis of digital media independently, where an advanced understanding of forensic techniques is required. Other areas of focus may include duties providing advanced level skills and knowledge to manage Information Security Education, Training and Awareness programs. In Security role, may manage the creation, review and approval of corporate information security policies. Mentors and trains other team members. Compiles information and reports for management. About Us As a world leader in cloud solutions, Oracle uses tomorrow’s technology to tackle today’s challenges. We’ve partnered with industry-leaders in almost every sector—and continue to thrive after 40+ years of change by operating with integrity. We know that true innovation starts when everyone is empowered to contribute. That’s why we’re committed to growing an inclusive workforce that promotes opportunities for all. Oracle careers open the door to global opportunities where work-life balance flourishes. We offer competitive benefits based on parity and consistency and support our people with flexible medical, life insurance, and retirement options. We also encourage employees to give back to their communities through our volunteer programs. We’re committed to including people with disabilities at all stages of the employment process. If you require accessibility assistance or accommodation for a disability at any point, let us know by emailing accommodation-request_mb@oracle.com or by calling +1 888 404 2494 in the United States. Oracle is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, sexual orientation, gender identity, disability and protected veterans’ status, or any other characteristic protected by law. Oracle will consider for employment qualified applicants with arrest and conviction records pursuant to applicable law. Show more Show less

Posted 2 months ago

Apply

2.0 - 3.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Requisition Id : 1599689 As a global leader in assurance, tax, transaction and advisory services, we hire and develop the most passionate people in their field to help build a better working world. This starts with a culture that believes in giving you the training, opportunities and creative freedom. At EY, we don't just focus on who you are now, but who you can become. We believe that it’s your career and ‘It’s yours to build’ which means potential here is limitless and we'll provide you with motivating and fulfilling experiences throughout your career to help you on the path to becoming your best professional self. The opportunity : Associate Consultant-National-Forensics-ASU - Forensics - Discovery - Mumbai Your key responsibilities Technical Excellence Assist in conducting security assessments, penetration tests, and red team exercises for clients across various industries. Support the execution of security testing methodologies and frameworks. Participate in source code reviews to identify vulnerabilities and recommend remediation strategies. Collaborate with the team to analyse security findings and prepare detailed reports for clients. Experience with security tools such as Metasploit, Burp Suite, or OWASP etc Skills and attributes To qualify for the role you must have Qualification Strong analytical and problem-solving skills, with attention to detail. Stay updated on the latest security threats, vulnerabilities, and industry best practices. Familiarity with industry certifications such as OSCP (Offensive Security Certified Professional), eJPT (eLearnSecurity Junior Penetration Tester), or equivalent is a plus. Experience 2-3 years of experience in cyber security, with a focus on offensive security, security testing, or related areas. What we look for People with the ability to work in a collaborative manner to provide services across multiple client departments while following the commercial and legal requirements. You will need a practical approach to solving issues and complex problems with the ability to deliver insightful and practical solutions. We look for people who are agile, curious, mindful and able to sustain postivie energy, while being adaptable and creative in their approach. What we offer With more than 200,000 clients, 300,000 people globally and 33,000 people in India, EY has become the strongest brand and the most attractive employer in our field, with market-leading growth over compete. Our people work side-by-side with market-leading entrepreneurs, game- changers, disruptors and visionaries. As an organisation, we are investing more time, technology and money, than ever before in skills and learning for our people. At EY, you will have a personalized Career Journey and also the chance to tap into the resources of our career frameworks to better know about your roles, skills and opportunities. EY is equally committed to being an inclusive employer and we strive to achieve the right balance for our people - enabling us to deliver excellent client service whilst allowing our people to build their career as well as focus on their wellbeing. If you can confidently demonstrate that you meet the criteria above, please contact us as soon as possible. Join us in building a better working world. Apply now. Show more Show less

Posted 2 months ago

Apply

10.0 years

0 Lacs

Ahmedabad, Gujarat, India

On-site

Position Senior Security Engineer - IOT Experience Job Description: 6–10 years of relevant experience in system security, embedded systems, and vulnerability assessments. Key Skills Firmware Analysis Tools: Expertise in using firmware analysis tools such as Ghidra, Binwalk, and Radare2 for static and dynamic analysis of firmware images. Embedded Linux Platforms: In-depth knowledge of embedded Linux, Yocto, and OpenWRT platforms for secure firmware and OS testing. Secure Boot & Firmware Update Mechanisms: Proficiency in testing secure boot processes and firmware update mechanisms, ensuring integrity and authenticity. OS Hardening & Security Configurations: Strong understanding of OS hardening techniques and security configurations to mitigate threats and enhance system integrity. Vulnerability Assessment & CVE Analysis: Extensive experience with vulnerability assessment frameworks and CVE analysis, identifying and addressing security vulnerabilities in embedded systems. Debugging & Emulation Tools: Proficient in using debugging tools and emulators such as QEMU to analyze embedded system behavior. SBOM & Secure Update Protocols: Familiarity with SBOM (Software Bill of Materials), patch management, and secure update protocols to ensure safe software deployments. Firmware Reverse Engineering: Expertise in performing reverse engineering of firmware images to detect vulnerabilities and potential exploits. Penetration Testing Frameworks: Experience using penetration testing frameworks like Metasploit, Kali Linux, and custom tools for system vulnerability testing. Custom Test Case Development: Ability to develop and execute custom test cases to simulate real-world attack scenarios and identify potential risks in embedded systems. Leadership & Mentoring: Strong leadership skills with a proven track record of mentoring junior engineers and guiding teams in advanced security testing methodologies. Technical Writing & Reporting: Excellent technical writing skills, including the ability to produce clear, concise, and detailed reports on security findings and risk assessments. Proactive Security Risk Mitigation: Proactive in identifying and mitigating security risks within embedded systems, ensuring the implementation of security best practices. Responsibilities Leadership in Security Testing: Lead system-level Vulnerability Assessment and Penetration Testing (VAPT) for firmware, operating systems, and embedded software, ensuring thorough security evaluations. Test Plan Development & Execution: Develop and implement comprehensive test plans for secure update and patch validation, ensuring security fixes are applied correctly and without introducing new risks. Firmware Static & Dynamic Analysis: Conduct detailed static and dynamic analysis of firmware images using tools like Ghidra, Binwalk, and Radare2 to identify potential vulnerabilities. Secure Boot & Root of Trust Validation: Validate secure boot implementations and hardware root of trust to ensure system integrity and protection from malicious code injection. OS Hardening & Access Control Testing: Test OS hardening configurations and secure access control mechanisms to strengthen system defenses against unauthorized access and exploitation. Vulnerability Identification & Classification: Identify and classify vulnerabilities and misconfigurations in embedded systems, following industry standards such as CVSS for risk assessment and remediation prioritization. Collaboration with Compliance & Engineering: Work closely with compliance and engineering teams to prioritize remediation efforts, ensuring that vulnerabilities are addressed effectively. Custom Attack Simulations: Develop and execute custom test cases to simulate real-world attack scenarios and evaluate the system's resilience against cyber threats. Rollback & Patch Management Testing: Oversee testing of rollback and patch management procedures, ensuring that system updates do not compromise security or functionality. Mentoring & Knowledge Sharing: Mentor junior engineers in security testing methodologies, sharing knowledge on advanced techniques and tools for improving system security testing processes. CVE Monitoring & Testing Updates: Monitor relevant CVE feeds, integrating new vulnerabilities and security patches into testing procedures to ensure up-to-date protection. Reporting & Risk Assessments: Provide detailed technical reports and risk assessments to stakeholders, outlining identified vulnerabilities, potential impact, and recommended mitigations. Regulatory Compliance: Ensure that all testing activities align with industry standards, including RED 18031 compliance, and adhere to relevant regulatory frameworks. Secure Lab Environment Maintenance: Maintain a secure lab environment for all system testing activities, ensuring that testing procedures are conducted in a controlled and isolated setting. Qualifications & Certifications Education: Bachelor's or Master’s degree in Cybersecurity, Embedded Systems, Computer Engineering, or a related field. Certifications (Preferred): OSCP (Offensive Security Certified Professional) OSCE (Offensive Security Certified Expert) GXPN (GIAC Exploit Researcher and Advanced Penetration Tester) Equivalent certifications in ethical hacking, penetration testing, or embedded system security are also highly valued. Industry Standards Familiarity: Familiarity with security frameworks such as ISO/IEC 62443, RED 18031, and IoT security frameworks. Why Join Us? Opportunity to work with cutting-edge automation technologies in a collaborative and innovative environment. Competitive salary and benefits package. Career growth opportunities in a fast-paced and dynamic industry. A strong focus on work-life balance and employee well-being. Location: IN-GJ-Ahmedabad, India-Ognaj (eInfochips) Time Type Full time Job Category Engineering Services Show more Show less

Posted 2 months ago

Apply

4.0 years

0 Lacs

Greater Chennai Area

On-site

Line of Service Advisory Industry/Sector Not Applicable Specialism Risk Management Level Associate Job Description & Summary At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In threat intelligence and vulnerability management at PwC, you will focus on identifying and analysing potential threats to an organisation's security, as well as managing vulnerabilities to prevent cyber attacks. You will play a crucial role in safeguarding sensitive information and enabling the resilience of digital infrastructure. Why PWC At PwC, you will be part of a vibrant community of solvers that leads with trust and creates distinctive outcomes for our clients and communities. This purpose-led and values-driven work, powered by technology in an environment that drives innovation, will enable you to make a tangible impact in the real world. We reward your contributions, support your wellbeing, and offer inclusive benefits, flexibility programmes and mentorship that will help you thrive in work and life. Together, we grow, learn, care, collaborate, and create a future of infinite experiences for each other. Learn more about us. At PwC, we believe in providing equal employment opportunities, without any discrimination on the grounds of gender, ethnic background, age, disability, marital status, sexual orientation, pregnancy, gender identity or expression, religion or other beliefs, perceived differences and status protected by law. We strive to create an environment where each one of our people can bring their true selves and contribute to their personal growth and the firm’s growth. To enable this, we have zero tolerance for any discrimination and harassment based on the above considerations. Job Description & Summary: In-depth knowledge and hands-on experience in VAPT , including: Web Application Vulnerability Assessment & Penetration Testing, Mobile Application Vulnerability Assessment & Penetration Testing , API and Network Penetration Testing, Cloud Security, Network Security, SOC Monitoring and Incident management. Responsibilities Vulnerability Assessment and Penetration Testing (VA/PT) Conduct VAPT Program Management including Remediation and Closure Management Conduct secure configuration review Conduct/ Manage Secure Code review Conduct/ Manage API secure testing Conduct/ Manage VA/PT for new web/ app development Conduct/ Manage Application Security Conduct/ Manage Red Teaming Conduct/ Manage DevSec/DevSecOps Conduct/ Manage Patch Management Mandatory Skill Sets VAPT In-depth knowledge of security issues, exploitation techniques and remediation measures. Hands-on Experience in Vulnerability Assessments & Penetration Testing (Automated + Manual) on business critical assets ( IP,Web,Mobile,API and AWS) Hands-on experience with well-known security tools BurpSuite, Nessus, Nmap, Accunetix, Metasploit Netsparker, Qualys etc Understanding of web application security vulnerabilities (OWASP Top 10), including XSS, SQL injection, CSRF, and others. Strong knowledge of network security concepts, firewalls, VPNs, IDS/IPS, and TCP/IP protocols. Familiarity with mobile security vulnerabilities in iOS and Android platforms, including reverse engineering, mobile app testing, and OWASP Mobile Security Project. Strong written and verbal communication skills for delivering clear, concise security reports and presenting findings to stakeholders. Preferred Skill Sets Strong organizational, teamwork, multitasking & time management skills. Outstanding communication abilities. Ability to effectively communicate the required recommendations. Years Of Experience Required 4+ Years Education Qualification Minimum Qualification: BE/ BTech Education (if blank, degree and/or field of study not specified) Degrees/Field of Study required: Bachelor of Technology, Bachelor of Engineering Degrees/Field Of Study Preferred Certifications (if blank, certifications not specified) Required Skills Burp Suite, Nessus Vulnerability Scanner, Structured Query Language (SQL) Optional Skills Teamwork Desired Languages (If blank, desired languages not specified) Travel Requirements Not Specified Available for Work Visa Sponsorship? No Government Clearance Required? No Job Posting End Date Show more Show less

Posted 2 months ago

Apply

3.0 years

0 Lacs

New Delhi, Delhi, India

On-site

Job Description for Information Security Auditor profile with SecNinjaz Technologies LLP Profile : Information Security Auditor Number of Requirements : 01 Location of Deputation : New Delhi Experience Range : 3+ years Salary Range : No Bar for Potential Candidates Role Overview: The Security Auditor will be responsible for conducting comprehensive security assessments, including audits, penetration testing, and compliance evaluations. This role requires a meticulous, analytical professional with OSCP and CEH certifications, capable of identifying vulnerabilities and recommending technical and strategic security improvements. Key Responsibilities: Perform technical security audits across internal and client infrastructures (networks, systems, and applications). Conduct vulnerability assessments and manual penetration testing, including both black-box and white-box scenarios. Analyze security policies, standards, and configurations against best practices and compliance frameworks. Develop detailed audit and assessment reports with risk ratings and mitigation strategies. Collaborate with internal teams and client stakeholders to understand business requirements and security needs. Participate in incident response planning and security awareness training initiatives. Stay informed about the latest threats, attack techniques, and regulatory developments. Required Qualifications: Bachelor’s degree in Cybersecurity, Information Technology, Computer Science, or equivalent experience. Active OSCP (Offensive Security Certified Professional) certification. Active CEH (Certified Ethical Hacker) certification. 3+ years of experience in information security auditing, penetration testing, or ethical hacking. Strong understanding of operating systems (Linux, Windows), networking, and web application security. Hands-on experience with tools such as Burp Suite, Nmap, Metasploit, Wireshark, Nessus, etc. Excellent documentation and communication skills. Preferred Qualifications: Experience conducting audits for compliance standards (ISO 27001, PCI-DSS, HIPAA, etc.). Exposure to cloud environments (AWS, Azure, GCP) and their security models. Scripting knowledge in Python, Bash, or PowerShell. Additional certifications such as CISA, CISSP, or GPEN are a plus. Show more Show less

Posted 2 months ago

Apply

4.0 years

0 Lacs

Kanpur, Uttar Pradesh, India

Remote

Description As an Automotive Cybersecurity Engineer, you will be responsible for assessing and enhancing the security of connected vehicles through advanced penetration testing, wireless and hardware exploitation, and embedded system analysis. You will evaluate vehicle communication systems, infotainment platforms, and remote entry mechanisms to identify vulnerabilities that could compromise vehicle safety, privacy, and functionality. This position is ideal for cybersecurity professionals passionate about automotive technologies, embedded interfaces, and threat simulation. Responsibilities Perform Security Testing of In-Vehicle Systems: Conduct assessments of vehicle internal networks (e.g., CAN, OBD-II) to identify and exploit vulnerabilities in communication flows and control mechanisms. Analyze infotainment systems and user interfaces for privacy concerns, data leakage, and potential malware injection points. Simulate remote and physical attack vectors, including key fob signal replay, wireless intrusion, and unauthorized access. Evaluate Embedded & Wireless Communication Interfaces: Assess the security of Bluetooth, Wi-Fi, and RF-based protocols used in the vehicle ecosystem. Examine communication channels between connected mobile applications, infotainment clusters, and backend services. Test for privilege escalation, data interception, and firmware or hardware manipulation. Reverse Engineer Vehicle Architectures: Understand and map circuit-level data flows across ECUs and control modules. Extract and analyze firmware, debug interfaces, and physical ports for security analysis. Utilize diagnostic tools, CAN analyzers, and SDR platforms for in-depth testing. Identify Vulnerabilities and Recommend Mitigation: Document test findings with detailed risk assessments and technical evidence. Work with internal teams and OEMs to recommend security hardening measures. Contribute to the ongoing improvement of testing methodologies and lab capabilities. Stay Aligned with Industry Standards: Ensure compliance with national and international automotive cybersecurity standards, including AIS 189, ISO/SAE 21434, and UN R155. Stay updated on emerging vehicle technologies and cyber threat landscapes. Eligibility Educational Background: Bachelor’s degree in electrical/Electronics, Computer Science, Cybersecurity, or related discipline. Technical Skills: Knowledge of vehicle networking protocols (CAN, LIN, UDS). Experience with CAN analysis tools (CANalyzer, SavvyCAN, PCAN). Familiarity with Android-based systems, ADB, rooting, and mobile OS exploitation. Experience in wireless exploitation (Wi-Fi, Bluetooth, RF using SDR). Circuit and system-level debugging, reverse engineering PCBs, or automotive modules. Experience: 1–4 years of experience in penetration testing, embedded security, or automotive security assessment. Desired Eligibility Exposure to AIS 189 or ISO/SAE 21434 frameworks. Participation in hardware-based CTFs, red teaming, or automotive-focused security research. Familiarity with tools such as Metasploit, Burp Suite, IDA Pro, Ghidra, Wireshark, and SDR tools. Certifications like CEH, CRTP, OSCP, PJPT, PNPT, or relevant embedded/automotive certifications. Ability to work in lab environments and travel for on-site testing engagements. Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph. Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

India

Remote

Ethical Hacking Intern Company: INLIGHN TECH Location: Remote (100% Virtual) Duration: 3 Months Stipend for Top Interns: ₹15,000 Certificate Provided | Letter of Recommendation | Full-Time Offer Based on Performance About the Company: INLIGHN TECH empowers students and fresh graduates with real-world experience through hands-on, project-driven internships. The Ethical Hacking Internship is designed to equip you with offensive cybersecurity skills through practical exposure to penetration testing, vulnerability assessment, and ethical hacking methodologies. Role Overview: As an Ethical Hacking Intern, you will work on real-world cybersecurity challenges, identify system vulnerabilities, and learn how to ethically exploit weaknesses to help secure systems. This internship will enhance your skills in reconnaissance, exploitation, and reporting, while working on live simulations and projects. Key Responsibilities: Perform vulnerability scanning and security assessments on virtual systems Conduct reconnaissance and information gathering using open-source tools Analyze potential threats and simulate cyberattacks in controlled environments Document and report discovered vulnerabilities and exploits Collaborate with mentors to understand system hardening techniques Assist in preparing cybersecurity awareness and best practices materials Qualifications: Pursuing or recently completed a degree in Cybersecurity, Computer Science, or a related field Basic understanding of networking, operating systems, and web application security Familiarity with tools like Nmap, Burp Suite, Metasploit, Wireshark, or Kali Linux Knowledge of OWASP Top 10 and common vulnerability types Strong analytical and problem-solving skills Eagerness to learn, adapt, and apply ethical hacking techniques Internship Benefits: Hands-on experience with industry-standard cybersecurity tools Certificate of Internship upon successful completion Letter of Recommendation for top performers Build a strong portfolio of ethical hacking reports and security assessments Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Make an impact with NTT DATA Join a company that is pushing the boundaries of what is possible. We are renowned for our technical excellence and leading innovations, and for making a difference to our clients and society. Our workplace embraces diversity and inclusion – it’s a place where you can grow, belong and thrive. Your day at NTT DATA The Vulnerability Assessment Specialist is a seasoned subject matter expert, responsible for conducting advanced vulnerability assessments, identifying vulnerabilities, and provides expert recommendations to mitigate security risks to ensure the security and integrity of the organization's systems and infrastructure. This role requires collaboration with cross-functional teams, and they lead/perform vulnerability assessments, analyze findings, and provide recommendations to mitigate security risks and contributes to the improvement of vulnerability management practices. What You'll Be Doing Key Responsibilities: Conducts vulnerability assessments using automated scanning tools and manual techniques to identify security vulnerabilities in systems, networks, applications, and infrastructure components. Conducts penetration tests using automated tools and manual techniques to identify security vulnerabilities in systems, networks, applications, and infrastructure components. Analyzes scan results and prioritizes vulnerabilities based on severity, impact, and exploitability. Assesses the potential risks associated with identified vulnerabilities. Analyzes the business impact, likelihood of exploitation, and potential attack vectors to prioritize remediation efforts based on risk severity. Provides detailed remediation recommendations to system owners, administrators, and IT teams. Collaborates to develop practical mitigation strategies, configuration changes, and patch management processes to address identified vulnerabilities. Utilizes vulnerability scanning tools such as Nessus, OpenVAS, Qualys, or similar tools to conduct scans, configure scan policies, and fine-tune scan parameters for accurate and comprehensive assessments. Utilizes penetration testing tools such as Metasploit, Burp Suite, and similar tools to conduct tests, configure test policies, and fine-tune test parameters for accurate and comprehensive assessments. Prepares vulnerability assessment reports, documenting assessment findings, risk analysis, and recommended actions. Communicates assessment results to stakeholders, including technical and non-technical audiences, in a clear and concise manner. Collaborates with cross-functional teams, including IT operations, development teams, and security stakeholders, to ensure effective communication, coordination, and alignment on vulnerability management efforts. Communicates technical concepts and recommendations to non-technical stakeholders. Participates in security awareness programs and provides training to end-users and stakeholders on vulnerability management best practices, secure coding, and security hygiene. Promotes a culture of security awareness within the organization. Collaborates with incident response teams to identify and address vulnerabilities associated with security incidents. Provides support during incident response efforts and contribute to post-incident analysis and remediation. Stays updated with the latest security trends, emerging vulnerabilities, and industry best practices. Contributes to the enhancement of vulnerability assessment processes, methodologies, and tools. Shares knowledge and provides guidance to improve vulnerability management practices. Shares knowledge and provides guidance to improve penetration testing practices. Contributes to open source security projects and the security community. Performs any other related task as required. Knowledge and Attributes: Seasoned understanding of vulnerability assessment methodologies, tools, and industry best practices. Seasoned understanding of penetration testing methodologies, tools, and industry best practices. Seasoned understanding of networking concepts, operating systems, and common software vulnerabilities. Solid proficiency in using vulnerability assessment tools such as Nessus, OpenVAS, Qualys, or similar tools. Solid proficiency in using penetration testing tools such as Metasploit, Burp Suite, and similar tools. Seasoned knowledge of risk analysis principles and the ability to assess the business impact of vulnerabilities. Solid knowledge of vulnerability management frameworks, such as CVE, CVSS, and common vulnerability databases. Strong analytical and problem-solving skills to analyze scan results, prioritize vulnerabilities, and recommend effective remediation actions. Excellent written and verbal communication skills to prepare vulnerability assessment reports and effectively communicate technical information to diverse stakeholders. Excellent collaboration and teamwork skills to work effectively with cross-functional teams and stakeholders. Seasoned familiarity with security frameworks, standards, and regulatory compliance requirements. Academic Qualifications and Certifications: Bachelor's degree or equivalent in Computer Science, Information Security, or a related field. Relevant certifications such as Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP) GIAC Penetration Tester (GPEN) or GIAC Certified Vulnerability Assessor (GCVA) are beneficial. Required Experience: Seasoned demonstrated experience in information security or related roles, with a focus on conducting vulnerability assessments and providing remediation recommendations. Seasoned demonstrated experience in conducting advanced vulnerability assessments, including application security assessments, network security assessments, penetration testing, or code review. Experience in bug bounty programs and identifying zero-day vulnerabilities is a plus. Workplace type: Hybrid Working About NTT DATA NTT DATA is a $30+ billion trusted global innovator of business and technology services. We serve 75% of the Fortune Global 100 and are committed to helping clients innovate, optimize and transform for long-term success. We invest over $3.6 billion each year in R&D to help organizations and society move confidently and sustainably into the digital future. As a Global Top Employer, we have diverse experts in more than 50 countries and a robust partner ecosystem of established and start-up companies. Our services include business and technology consulting, data and artificial intelligence, industry solutions, as well as the development, implementation and management of applications, infrastructure, and connectivity. We are also one of the leading providers of digital and AI infrastructure in the world. NTT DATA is part of NTT Group and headquartered in Tokyo. Equal Opportunity Employer NTT DATA is proud to be an Equal Opportunity Employer with a global culture that embraces diversity. We are committed to providing an environment free of unfair discrimination and harassment. We do not discriminate based on age, race, colour, gender, sexual orientation, religion, nationality, disability, pregnancy, marital status, veteran status, or any other protected category. Join our growing global team and accelerate your career with us. Apply today. Show more Show less

Posted 2 months ago

Apply

0.0 - 3.0 years

0 Lacs

Delhi, Delhi

On-site

Experience: 1 - 3 years Location: New Delhi Job Description : The Security Auditor will be responsible for conducting comprehensive security assessments, including audits, penetration testing, and compliance evaluations. This role requires a meticulous, analytical professional with OSCP and CEH certifications, capable of identifying vulnerabilities and recommending technical and strategic security improvements. Number of Requirements : 01 Key Responsibilities : Perform technical security audits across internal and client infrastructures (networks, systems, and applications). Conduct vulnerability assessments and manual penetration testing, including both black-box and white-box scenarios. Analyze security policies, standards, and configurations against best practices and compliance frameworks. Develop detailed audit and assessment reports with risk ratings and mitigation strategies. Collaborate with internal teams and client stakeholders to understand business requirements and security needs. Participate in incident response planning and security awareness training initiatives. Stay informed about the latest threats, attack techniques, and regulatory developments. Required Qualifications : Bachelor's degree in Cybersecurity, Information Technology, Computer Science, or equivalent experience. Active OSCP (Offensive Security Certified Professional) certification. Active CEH (Certified Ethical Hacker) certification. 3+ years of experience in information security auditing, penetration testing, or ethical hacking. Strong understanding of operating systems (Linux, Windows), networking, and web application security. Hands-on experience with tools such as Burp Suite, Nmap, Metasploit, Wireshark, Nessus, etc. Excellent documentation and communication skills. Preferred Qualifications : Experience conducting audits for compliance standards (ISO 27001, PCI-DSS, HIPAA, etc.). Exposure to cloud environments (AWS, Azure, GCP) and their security models. Scripting knowledge in Python, Bash, or PowerShell. Additional certifications such as CISA, CISSP, or GPEN are a plus.

Posted 2 months ago

Apply

8.0 - 10.0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Join our Team Grow with us About this opportunity: We are seeking a Security Specialist to join our team. The role involves identifying, researching, prioritizing, remediating, and mitigating vulnerabilities as part of our vulnerability management practice. You'll work with a diverse and skilled team to ensure the security of our information assets. What you will do: Align with units and stakeholders on PT test requirements and schedules. Conduct manual penetration testing with hands-on experience. Create scripts for payloads and simulate security breaches. Perform web, API, mobile, and infrastructure pen testing. Set up test labs for zero-day attacks and plan penetration methods. Execute periodic testing based on threat intelligence and data review. Report findings and suggest risk mitigation strategies. Present conclusions to stakeholders. Manage PT tools, licenses, and infrastructure. Drive automation and innovation for improved efficiency and quality. Document designs and configurations. Resolve reported vulnerabilities and propose solutions for gaps. Analyze critical exploits and mentor security engineers. Provide after-hours support for IT security incidents. The skills you bring: Bachelor’s Degree in Computer Science or related field. 8-10 years of experience. Strong knowledge of security controls (e.g., access control, encryption, and application security). Proficiency with PT tools like Kali Linux, Metasploit, and Burp Suite. Deep understanding of security issues in enterprise, network, API, and mobile systems. Familiarity with enterprise computing, distributed applications, and TCP/IP network security. Experience in writing technical reports and summaries. Ability to provide after-hours support and work under pressure. Effective in both team and independent work settings. Participate in on-call rotation for critical incidents. Strong collaboration and knowledge-sharing skills. Results-driven with excellent communication skills; fluency in English is essential. Preferred certifications: OSCP, OSWP, OSEP, OWSA, OWSE. Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Gurgaon, Noida, Bangalore, Kolkata, Pune Req ID: 767059 Show more Show less

Posted 2 months ago

Apply

8.0 - 10.0 years

0 Lacs

Greater Kolkata Area

On-site

Join our Team Grow with us About this opportunity: We are seeking a Security Specialist to join our team. The role involves identifying, researching, prioritizing, remediating, and mitigating vulnerabilities as part of our vulnerability management practice. You'll work with a diverse and skilled team to ensure the security of our information assets. What you will do: Align with units and stakeholders on PT test requirements and schedules. Conduct manual penetration testing with hands-on experience. Create scripts for payloads and simulate security breaches. Perform web, API, mobile, and infrastructure pen testing. Set up test labs for zero-day attacks and plan penetration methods. Execute periodic testing based on threat intelligence and data review. Report findings and suggest risk mitigation strategies. Present conclusions to stakeholders. Manage PT tools, licenses, and infrastructure. Drive automation and innovation for improved efficiency and quality. Document designs and configurations. Resolve reported vulnerabilities and propose solutions for gaps. Analyze critical exploits and mentor security engineers. Provide after-hours support for IT security incidents. The skills you bring: Bachelor’s Degree in Computer Science or related field. 8-10 years of experience. Strong knowledge of security controls (e.g., access control, encryption, and application security). Proficiency with PT tools like Kali Linux, Metasploit, and Burp Suite. Deep understanding of security issues in enterprise, network, API, and mobile systems. Familiarity with enterprise computing, distributed applications, and TCP/IP network security. Experience in writing technical reports and summaries. Ability to provide after-hours support and work under pressure. Effective in both team and independent work settings. Participate in on-call rotation for critical incidents. Strong collaboration and knowledge-sharing skills. Results-driven with excellent communication skills; fluency in English is essential. Preferred certifications: OSCP, OSWP, OSEP, OWSA, OWSE. Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Gurgaon, Noida, Bangalore, Kolkata, Pune Req ID: 767059 Show more Show less

Posted 2 months ago

Apply

8.0 - 10.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Join our Team Grow with us About this opportunity: We are seeking a Security Specialist to join our team. The role involves identifying, researching, prioritizing, remediating, and mitigating vulnerabilities as part of our vulnerability management practice. You'll work with a diverse and skilled team to ensure the security of our information assets. What you will do: Align with units and stakeholders on PT test requirements and schedules. Conduct manual penetration testing with hands-on experience. Create scripts for payloads and simulate security breaches. Perform web, API, mobile, and infrastructure pen testing. Set up test labs for zero-day attacks and plan penetration methods. Execute periodic testing based on threat intelligence and data review. Report findings and suggest risk mitigation strategies. Present conclusions to stakeholders. Manage PT tools, licenses, and infrastructure. Drive automation and innovation for improved efficiency and quality. Document designs and configurations. Resolve reported vulnerabilities and propose solutions for gaps. Analyze critical exploits and mentor security engineers. Provide after-hours support for IT security incidents. The skills you bring: Bachelor’s Degree in Computer Science or related field. 8-10 years of experience. Strong knowledge of security controls (e.g., access control, encryption, and application security). Proficiency with PT tools like Kali Linux, Metasploit, and Burp Suite. Deep understanding of security issues in enterprise, network, API, and mobile systems. Familiarity with enterprise computing, distributed applications, and TCP/IP network security. Experience in writing technical reports and summaries. Ability to provide after-hours support and work under pressure. Effective in both team and independent work settings. Participate in on-call rotation for critical incidents. Strong collaboration and knowledge-sharing skills. Results-driven with excellent communication skills; fluency in English is essential. Preferred certifications: OSCP, OSWP, OSEP, OWSA, OWSE. Why join Ericsson? At Ericsson, you´ll have an outstanding opportunity. The chance to use your skills and imagination to push the boundaries of what´s possible. To build solutions never seen before to some of the world’s toughest problems. You´ll be challenged, but you won’t be alone. You´ll be joining a team of diverse innovators, all driven to go beyond the status quo to craft what comes next. What happens once you apply? Click Here to find all you need to know about what our typical hiring process looks like. Encouraging a diverse and inclusive organization is core to our values at Ericsson, that's why we champion it in everything we do. We truly believe that by collaborating with people with different experiences we drive innovation, which is essential for our future growth. We encourage people from all backgrounds to apply and realize their full potential as part of our Ericsson team. Ericsson is proud to be an Equal Opportunity Employer. learn more. Primary country and city: India (IN) || Gurgaon, Noida, Bangalore, Kolkata, Pune Req ID: 767059 Show more Show less

Posted 2 months ago

Apply

0.0 - 3.0 years

0 Lacs

Greater Kailash II, Delhi, Delhi

On-site

Job Title: Ethical Hacking Trainer (Full-Time/Part-Time) Location: Greater Kailash 2, South Delhi Company: DizitalAdda – A Leading Digital & Professional Education Institute About Us: DizitalAdda is a premier digital marketing and professional skills training institute located in the heart of South Delhi. With an established presence in digital education, we are now expanding into the Cyber Security and Ethical Hacking domain. We are currently seeking a skilled and passionate Ethical Hacking Trainer to join our team and deliver hands-on, industry-relevant training to aspiring cybersecurity professionals. Roles & Responsibilities: Deliver engaging, practical, and real-world-based training in Ethical Hacking . Teach topics like: Vulnerability Assessment Penetration Testing Network & Web Application Security Social Engineering Wi-Fi Hacking Cryptography Tools like Kali Linux, Wireshark, Nmap, SQLMap, Metasploit, etc. Create training content, assignments, and live labs for learners. Prepare students for certifications like CEH, OSCP, or CompTIA Security+ . Maintain course quality and student satisfaction. Conduct doubt sessions and assessments regularly. Required Skills: Strong knowledge of Ethical Hacking, Cybersecurity, and Penetration Testing . Hands-on experience with real-world attack & defense scenarios. Good communication and presentation skills. Familiarity with Linux OS, Networking basics, and scripting (Python preferred). Previous training experience (offline/online) preferred. Qualifications: Bachelor's in Computer Science/IT/Cyber Security or equivalent. Certifications like CEH / OSCP / Security+ (preferred but not mandatory). 1–3 years of experience in cybersecurity training or real-world cybersecurity projects. Employment Type: Full-Time / Part-Time / Weekend Batch Trainer (Flexible Options Available) Salary: ₹20,000 – ₹50,000 per month (Based on experience & expertise) Why Join Us? Prime Location: South Delhi (Greater Kailash 2) Modern classrooms & lab setup Freedom to design practical sessions Exposure to corporate clients and real projects Growth opportunities in a fast-growing education brand How to Apply: Send your resume and any certification proof to: ✅ hr@dizitaladda.com ✅ +91-9555393551 ✅ www.dizitaladda.com Job Types: Full-time, Permanent Pay: ₹11,340.58 - ₹45,000.00 per month Benefits: Health insurance Paid sick time Provident Fund Schedule: Day shift Evening shift Morning shift Rotational shift Weekend availability Supplemental Pay: Commission pay Performance bonus Yearly bonus Language: English (Preferred) Work Location: In person

Posted 2 months ago

Apply

1.0 years

0 Lacs

Ahmedabad, Gujarat

On-site

Red & White Education Pvt Ltd , founded in 2008, is Gujarat's leading educational institute. Accredited by NSDC and ISO, we focus on Integrity, Student-Centricity, Innovation, and Unity. Our goal is to equip students with industry-relevant skills and ensure they are employable globally. Join us for a successful career path. Job Description: Faculties guide students, deliver course materials, conduct lectures, assess performance, and provide mentorship. Strong communication skills and a commitment to supporting students are essential. Key Responsibilities: Deliver lectures and practical sessions on various cyber security topics. Design curriculum and assessments based on industry standards. Guide students through hands-on labs and projects. Stay updated with current cybersecurity trends, tools, and practices. Mentor students on ethical practices and real-world case studies. Participate in academic meetings, workshops, and faculty development. Required Skills: Strong knowledge of Computer Basics, OS, DBMS, Ethical Hacking, Network & System Security, Web/API/Mobile Security, Digital Forensics, and SOC operations. Hands-on experience with tools like Kali Linux, Metasploit, Nmap, Wireshark, Burp Suite, OWASP ZAP, SQLmap, Postman, MobSF, Frida, Xcode, Autopsy, FTK Imager, Splunk, ELK Stack, AlienVault, and TheHive. Education & Experience Requirements: Bachelor’s or Master’s degree in Computer Science, IT, Cybersecurity, or related field Minimum 1 year of teaching or industry experience in cybersecurity or networking Practical knowledge of cybersecurity tools and technologies Strong communication and presentation skills Relevant certifications (CEH, OSCP, CompTIA Security+, etc.) preferred For further information, please feel free to contact 7862813693 us via email at career@rnwmultimedia.edu.in Job Types: Full-time, Permanent, Fresher Pay: ₹25,000.00 - ₹35,000.00 per month Benefits: Cell phone reimbursement Flexible schedule Leave encashment Paid sick time Paid time off Schedule: Day shift Morning shift Supplemental Pay: Performance bonus Yearly bonus Application Question(s): Current Salary? Experience: Teaching / Mentoring: 1 year (Preferred) Cybersecurity: 1 year (Preferred) Location: Ahmedabad, Gujarat (Preferred) Work Location: In person

Posted 2 months ago

Apply

1.0 years

2 - 2 Lacs

IN

Remote

About the job: Key responsibilities: 1. Plan, execute, and optimize Meta Ads (Facebook and Instagram) and Google Ads (PPC campaigns) 2. Handle SEO strategies including On-page and Off-page techniques to improve search rankings 3. Create and publish compelling written and visual content 4. Design engaging graphics and posters for campaigns 5. Manage LinkedIn Ads for B2B targeting and branding 6. Build and implement brand strategies from scratch 7. Set up and manage business pages on Facebook, Instagram, and LinkedIn 8. Oversee social media accounts with a focus on growth and engagement 9. Run effective lead generation campaigns to drive business results Requirements: 1. Meta Ads (Facebook and Instagram) 2. Google Ads and PPC Campaigns 3. SEO (On-page and Off-page) 4. Content creation (written and visual) 5. Graphic and poster design 6. LinkedIn Ads 7. Developing brand strategy 8. Business page creation and management 9. Social media management 10. Lead generation Who can apply: Only those candidates can apply who: have minimum 1 years of experience Salary: ₹ 2,00,000 - 2,16,000 /year Experience: 1 year(s) Deadline: 2025-06-20 23:59:59 Skills required: Social Media Marketing, Digital Marketing, Google AdWords, Search Engine Optimization (SEO), Lead Generation, Content Management, Web Design, Canva, Instagram Marketing, Facebook Ads, Metasploit and Google My Business About Company: At Propel Pioneer, we drive your business forward with innovative digital marketing solutions. Our expertise spans social media marketing, online marketing through Google Ads and SEO, offline marketing, personal branding, and design services for seamless user experiences. We excel in influencer marketing, content creation, reputation management, e-commerce marketing, video marketing, and conversion rate optimization (CRO). Our services ensure comprehensive brand growth, supported by strategic analytics & reporting.

Posted 2 months ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Job Overview: We are looking for an experienced and dynamic Freelance Cybersecurity Trainer to deliver high-quality training sessions to professionals and/or students. The ideal candidate will have a solid background in cybersecurity practices, hands-on industry experience, and a passion for teaching and mentoring. Key Responsibilities: Design, develop, and deliver cybersecurity training content (live sessions, workshops, online modules, etc.). Conduct sessions on topics such as network security, ethical hacking, threat analysis, incident response, risk management, and security compliance. Prepare hands-on labs, case studies, and real-world scenarios to enhance learner engagement. Customize training based on audience skill level (beginner to advanced). Evaluate learner progress through assessments, projects, and feedback. Stay up-to-date with industry trends, emerging threats, and latest tools/technologies. Provide mentorship and answer technical questions during and after sessions as needed. Requirements: Significant years of hands-on experience in cybersecurity roles. Proven experience in delivering training or workshops in-person. Proficiency with Cybersecurity tools such as Kali Linux, Metasploit, Wireshark, Nessus, etc. In-depth knowledge of information security principles, risk assessment, and regulatory frameworks (e.g., ISO 27001, NIST, GDPR). Excellent communication and presentation skills. Relevant certifications (e.g., CEH, CISSP, CompTIA Security+, OSCP) are highly desirable. Preferred Qualifications: Prior experience working with training companies or educational platforms. Ability to develop custom course materials and content. Flexibility to conduct sessions across different time zones if needed. Compensation: Competitive freelance/hourly rates (based on experience and course complexity). Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Sadar, Uttar Pradesh, India

On-site

Who We Are: Headquartered in Canada with locations across the United States and around the globe with a footprint on six continents, Bulletproof, a GLI company has decades of technology, security, and compliance expertise. Bulletproof’s work in the security space has been recognized nationally and globally with Microsoft’s global Security Partner of the Year in 2021 and five Microsoft Canada Impact Award wins from 2019 to present-day. At Bulletproof, our vision is to serve, secure, and empower the world through people and technology; one customer at a time. We believe everyone has the right to feel safe and secure. Our mission is to serve and protect organizations to ensure their success. What We Have To Offer Challenging Work - We love solving highly complex problems. Across our teams and in all roles, every employee is empowered to bring their best ideas forward and to jump in and solve the problems they're passionate about. Great People - We are stronger, together, when we are open, honest, and above all, real. Every person is valued here and plays an important role in our shared success. Global Impact - As a global team spanning continents, boundaries, and cultures, every day we are inspired by the impact our work has on our colleagues, our customers, our communities, and the world at large. Diversity, Equity and Inclusion - We celebrate each other’s differences, continuously strive for equality and recognize that inclusion makes us stronger as individuals, a company and a global citizen. What the Role Does… As a pentester, you will conduct security assessments by probing for and exploiting security vulnerabilities in web-based applications, networks and systems and finding ways to ensure that any risk to our client is mitigated. We highly prefer if you live in Noida (India) because you will need to be in the office. Duties and Responsibilities include, but are not limited to: Conducts security assessments that can be multi-faceted for a wide variety of assigned clients Defines the scope for security testing assignments Creates quality assurance security test reports and other documentation as needed Works with clients to develop appropriate remediation plans Provides clients with exceptional service in a professional, courteous and timely manner Provides technical support as a subject matter expert in the sale of security testing assignments on an as needed basis Provides thought leadership and direction for the Information Security practice on malware, attack vectors and methods to protect against threats Teams up with colleagues in other lines of services in support of client needs for Information Security services Stays up to date on current tools, technologies and vulnerabilities to incorporate into testing practices Other related duties as assigned Requirements: Degree in Computer Science, Information Systems, Engineering or related major from an accredited University or College Diploma equivalent Experience performing vulnerability assessments and/or penetration tests would be preferred Application and/or infrastructure penetration testing experience above and beyond running automated tools A good understanding of Linux, Windows and network security skills Excellent written and oral communication skills in English Ability to meet deadlines and deliver a high-quality product (reports) Strong attention to detail Ability to work both independently and in a team environment. Familiar with (if not qualified in) test suites such as: Nessus MetaSploit Burp Suite Kali NMap Fortify Acunetix Certifications - One or more of the following certifications are considered an asset: EC-Council Certified Ethical Hacker (CEH) EC-Council Licensed Penetration Tester (LPT) GIAC Certified Penetration Tester (CPEN) IACRB Certified Penetration Tester (CPT) Offensive Security Certified Professional (OSCP) CREST Registered Tester (CRT) CREST Infrastructure Certification CESG CHECK Team Leader CESG CHECK Team Member Tiger Scheme Senior Security Tester Tiger Scheme Qualified Security Tester Any other recognized penetration testing certification/accreditation The following skills are preferred but not required: PCI ASV CREST recognized penetration testing certification/accreditation (CREST Certified Tester (CCT) or CHECK Team Leader (CTL) Experience developing custom scripts or tools used for vulnerability scanning and identification Familiarity with threat modelling and security design review methodologies Support team technical development (e.g. through service development or research) and contribute to company technical processes overall Development and/or source code review experience in C/C++, C#, VB.NET, ASP, PHP, or Java and/or Fortify, Veracode, Brakeman and/or IDA Pro Experience with physical security testing, phishing and social engineering techniques. Experience with mobile applications such as Android DeBug Bridge (ADS), OWASP ZAP, Drozer, Mobile Security Framework (MobSF), Smartphone Pentest Framework (SPF), Burp Suite, Android SDK, Friday, Cydia and/or IDB This job description should not be interpreted as all-inclusive; it is intended to identify major responsibilities and requirements of the job. The incumbent may be requested to perform other job-related task and responsibilities than those stated above. Equal Opportunity Statement Bulletproof is committed to creating a diverse environment and is proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, colour, religion, gender, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or veteran status. Bulletproof is also committed to compliance with all fair employment practices regarding citizenship and immigration Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Gurugram, Haryana, India

On-site

About The Position Job Description Snowbit is looking for an experienced Security Incident Responder to join our Managed Detection and Response (MDR) team. This role requires expertise in incident response, threat hunting, and forensic investigations, with a strong emphasis on cloud environments and Kubernetes. You will lead efforts to protect our customers from advanced cyber threats while contributing to the continuous improvement of Snowbit’s methodologies, processes, and technology stack. Requirements What You’ll Do: Leverage Snowbit’s advanced MDR platform to lead large-scale incident response investigations and proactive threat-hunting initiatives. Conduct log analysis, and cloud artifact reviews using EDR and similar tools depending on availability, to support incident resolution and root-cause investigations. Investigate and respond to security incidents in containerized environments, with a specific focus on Kubernetes security and architecture. Research evolving cyberattack tactics, techniques, and procedures (TTPs) to strengthen customer defenses and codify insights for our services. Provide technical and executive briefings to customers, including recommendations to mitigate risk and enhance cybersecurity posture. Collaborate with internal teams, including engineering and research, to enhance Snowbit’s MDR and incident response capabilities. Partner with customer teams (IT, DevOps, and Security) to ensure seamless integration and adoption of Snowbit’s MDR services. Share expertise through presentations, research publications, and participation in the global cybersecurity community. Experience 3-5 years in incident response, threat hunting with strong experience in cloud security (AWS, Azure, GCP) and Kubernetes environments. Proven Incident response experience in complex environments. Technical Skills Demonstrates strong expertise in understanding adversary tactics and techniques, translating them into actionable investigation tasks, conducting in-depth analysis, and accurately assessing the impact. Familiarity with attack vectors, malware families, and campaigns. Deep understanding of network architecture, protocols, and operating system internals (Windows, Linux, Unix). Expertise in Kubernetes security, including container orchestration, workload isolation, and cluster hardening. Experience securing Kubernetes infrastructure, runtime security, and security monitoring. Problem-Solving Ability to work independently and collaboratively in dynamic, fast-paced environments. Communication Excellent written and verbal communication skills to interact with technical and non-technical stakeholders. Preferred Skills Scripting skills (e.g., Python, PowerShell) Experience with Red Team operations, penetration testing, or cyber operations. Hands-on knowledge of attack frameworks (e.g., MITRE ATT&CK, Metasploit, Cobalt Strike). Proficiency in host forensics, memory forensics, and malware analysis. Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Responsibilities: • Execute complex Red Team engagement as a penetration tester, simulating real-world ransomware / malware attacker scenarios to uncover critical vulnerabilities • Identify, research, and exploit various vulnerabilities (including zero-days) to gain unauthorized access to systems and data. • Develop custom tools, scripts, and exploit code. • Document findings in a clear, concise, and actionable manner, including detailed reports with working proofs of concept and recommendations for remediation and product improvements • Collaborate with the Blue Team (engineering and QA) to prioritize vulnerabilities, develop mitigation strategies, and improve overall security posture through tangible requirements • Participate in knowledge sharing by mentoring junior team members and presenting findings, including opportunities to document reports for external consumption Qualifications: • Minimum 5+ years of experience in offensive security engagements. • Proven experience in participating in Red Team engagements. • Expertise in various operating systems (Mac, Linux, etc.) and scripting languages (Python, Ruby, etc.). • Coding skills to automate tasks, customize attacks, and create payloads • Solid understanding of networking concepts, such as TCP/IP, DNS, HTTP, FTP, SMTP, and VPN. • Hands-on knowledge on how to use network analysis tools, such as Nmap, Wireshark, and Metasploit, to scan, sniff, and exploit network services and protocols. Ability to discover and map network devices, identify open ports and services, and bypass firewalls and other security measures. • System knowledge . Good understanding of OS concepts • Experience with exploit development and post-exploitation techniques. • Strong understanding of the threat landscape and attacker motivations. • Well-versed in security principles, such as encryption, authentication, authorization, and access control. • Good knowledge of malwares , ransomwares , APTs , Trojans and how they work. • Ability to think outside the box, and come up with innovative and unconventional ways to break into a system or network. • Excellent communication, collaboration, and problem-solving skills. Show more Show less

Posted 2 months ago

Apply

3 years

0 Lacs

India

On-site

Job Title: CEH Trainer Job Summary: CEH Trainer designs and delivers training programs to prepare individuals for the Certified Ethical Hacker (CEH) certification by EC-Council. The trainer educates participants on ethical hacking techniques, cybersecurity principles, and tools to identify and mitigate security vulnerabilities in systems and networks. Key Responsibilities: Training Delivery: Conduct virtual CEH training sessions, covering topics like footprinting, scanning, enumeration, system hacking, malware threats, sniffing, social engineering, and penetration testing. Content Development: Create, update, and customize training materials, including presentations, labs, case studies, and practice exams aligned with the latest CEH curriculum. Hands-On Labs: Facilitate practical exercises using tools like Nmap, Metasploit, Wireshark, and Kali Linux to simulate real-world hacking scenarios. Student Support: Provide guidance, answer queries, and mentor students to ensure comprehension and exam readiness. Assessment & Feedback: Evaluate student performance through quizzes, mock exams, and practical assessments, offering constructive feedback. Stay Updated: Keep abreast of evolving cybersecurity threats, tools, and EC-Council updates to ensure training relevance. Collaboration: Work with training coordinators and organizations to schedule sessions, tailor content, and meet client-specific needs. Qualifications: Certification: Valid CEH certification (mandatory); additional certifications like OSCP, CISSP, or CompTIA PenTest+ are a plus. Experience: 3+ years in cybersecurity, ethical hacking, or penetration testing, with at least 1–2 years of training or teaching experience. Technical Skills: Proficiency in ethical hacking tools, techniques, and methodologies; strong knowledge of network security, OS (Windows/Linux), and cloud security. Communication: Excellent presentation, interpersonal, and mentoring skills to engage diverse audiences. Education: Bachelor’s degree (preferred but not mandatory). Soft Skills: Ability to simplify complex technical concepts. Strong problem-solving and time-management skills. Passion for teaching and staying current in cybersecurity trends. Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Gurgaon, Haryana, India

On-site

Who We Are Sirion is the world’s leading AI-native CLM platform, pioneering the application of generative AI to help enterprises transform the way they store, create, and manage contracts. The platform’s extraction, conversational search, and AI-enhanced negotiation capabilities have revolutionized contracting across enterprise teams – from legal and procurement to sales and finance. The world’s most valuable brands trust Sirion to manage 7M+ contracts worth nearly $800B and relationships with 1M+ suppliers and customers in 100+ languages. Leading analysts such as Gartner, IDC, and Spend Matters have consistently recognized Sirion as a leader in CLM for its focus on category-leading innovation. About The Role What You’ll Do : Experienced in application security testing (source code review and application penetration tests) – web, mobile, API’s, Plugin’s. Experienced in performing Threat Modelling. Experience with Cloud and Container Security. Experience with Secure Development and Testing processes and detection. Experience in automating security testing and remediation through scripting using languages like Bash, Python and VBScript. Knowledge of secure coding concepts. Good knowledge of OWASP and current and emerging threats Good experience in Security testing tools like Burp Suite/Acunetix/Metasploit/Kali. Understands Security testing requirements and testing strategy. Knowledge on capturing and diagnosing logs for application errors. Good understanding of the entire project life cycle, QA methodologies and processes. Experience with web application firewall, encryption, networking, web services. Create detailed, comprehensive and well-structured Security test plans and Security test cases. Estimate, prioritize, plan, and coordinate testing activities. Strong, effective interpersonal and communications skills; able to interact professionally with customers and team members. What You’ll Need Ability to multi-task effectively and work under pressure Relationship and trust-based information security program (not authority-based) Self-driven and initiator Task finisher Commitment To Diversity And Inclusion We are an equal opportunity employer committed to diversity and inclusion. We do not discriminate based on race, color, gender, religion, national origin, ancestry, age, disability, medical condition, genetic information, military or veteran status, marital status, pregnancy, gender identity, sexual orientation, or any other protected characteristic. We provide reasonable accommodations for disabled employees and applicants as required by law. These principles apply to all aspects of employment, including recruitment, training, promotions, compensation, benefits, transfers, and social programs. Excited about this opportunity? We’d love to hear from you! To apply, simply visit our Careers Page Careers at Sirion page and follow the easy steps to submit your application. Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Navi Mumbai, Maharashtra, India

On-site

Eventus Security requires a Technical Manager - Cyber Resilience with strong understanding of cybersecurity practices, extensive experience in vulnerability assessment and penetration testing (VAPT), leadership skills to manage a team of security professionals, and the ability to identify, prioritize, and remediate critical vulnerabilities across an organization's systems and applications, ensuring compliance with security standards and regulations; key responsibilities would include leading VAPT projects, overseeing vulnerability scanning, managing penetration testing activities, generating detailed reports, and collaborating with stakeholders to implement security improvements. Job Title: Technical Manager - Cyber Resilience Experience: 7-15yrs Key Responsibilities: VAPT Strategy Development: · Define and implement a comprehensive VAPT strategy aligned with organizational security goals and compliance requirements. · Establish VAPT methodologies, standards, and best practices for conducting assessments. · Prioritize critical assets and systems for regular VAPT scans. Team Management : · Lead a team of VAPT analysts, penetration testers, and vulnerability assessors. · Assign tasks, monitor performance, and provide technical guidance to team members. · Develop and maintain team skills through training and certifications. · Vulnerability Assessment and Penetration Testing: · Conduct comprehensive vulnerability assessments across networks, systems, applications, and web services using automated tools and manual techniques. · Execute penetration testing engagements to identify exploitable vulnerabilities and assess potential security risks. · Analyze test results, prioritize vulnerabilities based on severity and impact, and generate detailed reports with actionable remediation recommendations. Risk Management: · Collaborate with security stakeholders to assess the risk associated with identified vulnerabilities. · Communicate security risks to relevant decision-makers and advocate for timely remediation. · Track remediation progress and ensure vulnerabilities are addressed effectively. Compliance Management: · Ensure VAPT activities align with industry standards and regulatory compliance requirements (e.g., PCI DSS, HIPAA, GDPR). · Maintain documentation and reporting to demonstrate compliance with security policies. Required Skills and Qualifications: Technical Expertise: · Deep understanding of network security concepts, protocols, and vulnerabilities. · Proficient in various VAPT tools and frameworks (e.g., Nessus, Burp Suite, Nmap, Metasploit). · Familiarity with web application security, OWASP Top 10, and secure coding practices Leadership Skills : · Proven ability to lead and mentor a team of security professionals. · Strong communication and presentation skills to effectively convey technical information to stakeholders. Analytical Skills: · Ability to analyze complex security issues, identify root causes, and prioritize remediation actions. · Critical thinking and problem-solving skills to evaluate potential security threats. Certifications: Relevant cybersecurity certifications such as CISSP, CISA, OSCP, CEH, or equivalent. Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

About Gruve Gruve is an innovative software services startup dedicated to transforming enterprises to AI powerhouses. We specialize in cybersecurity, customer experience, cloud infrastructure, and advanced technologies such as Large Language Models (LLMs). Our mission is to assist our customers in their business strategies utilizing their data to make more intelligent decisions. As a well-funded early-stage startup, Gruve offers a dynamic environment with strong customer and partner networks. Position Summary We are seeking a System Test Engineer with expertise in SaaS applications providing cybersecurity solution to join our dynamic team. The ideal candidate will play a critical role in testing, validating, and ensuring the reliability and security of our SaaS-based cyber security platform. This position requires strong analytical skills, hands-on experience with automation, and a deep understanding of cloud environments, networking protocols, firewalls and security frameworks. Key Responsibilities Design, develop, and execute system-level test plans, test cases, and automated test scripts for a SaaS-based cyber security platform. Validate end-to-end functionality, scalability, and performance of security applications integrated with external ITSM systems. Develop and maintain automation frameworks to streamline test execution and enhance test coverage. Conduct security, performance, and regression testing to identify vulnerabilities, bottlenecks, and reliability issues. Test and validate the functionality of agents that connect with the SaaS platform. Work closely with development, product management, and DevOps teams to troubleshoot issues and ensure high-quality product releases. Implement and execute API testing, system integration testing, and user acceptance testing. Participate in test strategy planning and provide feedback for continuous improvement of the test process. Required Skills & Qualifications A bachelor’s or master’s degree in computer science, electronics engineering or a related field 8-10 years of experience in system testing for SaaS applications and Cyber Security platforms. Strong knowledge of networking protocols (TCP/IP, HTTP/HTTPS, DNS, VPN, IPSec, TLS, etc.). Strong understanding of security concepts such as firewalls, IDS/IPS, zero-trust architecture, and cloud security controls. Hands-on experience with test automation tools (Selenium, Robot Framework, PyTest, etc.). Proficiency in scripting and automation using Python, Bash, or similar languages. Experience working with cloud platforms such as AWS, Azure, or Google Cloud. Familiarity with containerization and orchestration tools like Docker and Kubernetes. Experience with CI/CD pipelines and DevOps processes. Strong troubleshooting and debugging skills in distributed systems and cloud environments. Preferred Qualifications Knowledge of security frameworks such as SOC2, ISO 27001, and compliance standards. Experience with security testing tools such as Burp Suite, Nessus, Wireshark, or Metasploit. Familiarity with Infrastructure as Code (IaC) tools such as Terraform or Ansible. Certifications such as AWS Certified Security - Specialty, CCNA Security, CISSP, or CEH are a plus. Why Gruve At Gruve, we foster a culture of innovation, collaboration, and continuous learning. We are committed to building a diverse and inclusive workplace where everyone can thrive and contribute their best work. If you’re passionate about technology and eager to make an impact, we’d love to hear from you. Gruve is an equal opportunity employer. We welcome applicants from all backgrounds and thank all who apply; however, only those selected for an interview will be contacted. Show more Show less

Posted 2 months ago

Apply

0 years

0 Lacs

India

Remote

Ethical Hacking Intern Company: INLIGHN TECH Location: Remote (100% Virtual) Duration: 3 Months Stipend for Top Interns: ₹15,000 Certificate Provided | LOR | Potential Full-Time Offer Based on Performance About the Company: INLIGHN TECH is dedicated to preparing the next generation of cybersecurity professionals by offering hands-on, project-based internships. Our Ethical Hacking Internship provides a comprehensive opportunity to explore system vulnerabilities, learn penetration testing techniques, and gain practical skills essential for the cybersecurity field. Role Overview: As an Ethical Hacking Intern, you'll work closely with our cybersecurity experts to identify and analyze security flaws in systems and applications. This role provides exposure to real-world security challenges and helps you build foundational skills in ethical hacking and penetration testing. Key Responsibilities: Perform vulnerability assessments and penetration tests on simulated environments Analyze system security using tools like Nmap , Burp Suite , Wireshark , Metasploit , etc. Document findings and recommend mitigation strategies Assist in developing scripts or tools for automation of testing processes Stay updated with the latest cybersecurity threats and trends Create reports highlighting attack vectors and potential security improvements Qualifications: Pursuing or recently completed a degree in Cybersecurity , Computer Science , Information Technology , or related field Basic knowledge of ethical hacking techniques , OWASP Top 10 , and Linux commands Familiarity with tools such as Kali Linux , Nmap , Wireshark , and Metasploit Strong curiosity and passion for cybersecurity Good analytical, problem-solving, and documentation skills Internship Benefits: Hands-on training in ethical hacking tools and techniques Certificate of Internship upon successful completion Letter of Recommendation for high-performing interns Opportunity to contribute to real-world security simulations and projects Top interns eligible for stipend and full-time job offers Show more Show less

Posted 2 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies