Jobs
Interviews

510 Nmap Jobs - Page 6

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

3.0 - 7.0 years

0 Lacs

noida, uttar pradesh

On-site

As an Associate Cybersecurity Consultant at Bulletproof, a GLI company headquartered in Canada with a global presence, you will be part of a team with decades of technology, security, and compliance expertise. Our work in the security space has been recognized nationally and globally for excellence. Our vision at Bulletproof is to serve, secure, and empower the world through people and technology, one customer at a time. We believe in ensuring the safety and security of all individuals and organizations we serve. Challenging Work: At Bulletproof, we thrive on solving complex problems and encourage all employees to contribute their best ideas. You will have the opportunity to work on highly challenging projects and make a real impact. Great People: We value openness, honesty, and authenticity. Each member of our team is essential to our collective success, and we believe in fostering a culture of inclusivity and collaboration. Global Impact: Being part of a global team means that your work will have a significant impact on colleagues, customers, communities, and the world at large. We are inspired by the positive influence our work has in various regions and cultures. Diversity, Equity, and Inclusion: We celebrate diversity, strive for equality, and understand that inclusion strengthens us as individuals, as a company, and as global citizens. Role Overview: As an Associate Cybersecurity Consultant specializing in penetration testing, you will be responsible for conducting thorough security assessments on web-based applications, networks, and systems to identify and mitigate vulnerabilities. Your role will involve defining assessment scopes, generating detailed security test reports, collaborating with clients on remediation plans, and delivering exceptional service in a professional manner. Additionally, you will provide technical expertise in security testing, stay updated on the latest tools and technologies, and contribute to the continuous improvement of our Information Security practice. Key Responsibilities: - Conduct comprehensive security assessments for a diverse range of clients - Define scopes for security testing assignments - Generate high-quality security test reports and documentation - Collaborate with clients on remediation strategies - Offer technical support as a subject matter expert in security testing - Stay informed about current tools, technologies, and vulnerabilities - Work collaboratively with cross-functional teams to meet client security needs - Perform other related duties as assigned Requirements: - Degree in Computer Science, Information Systems, Engineering, or related field - Prior experience in vulnerability assessments and penetration testing preferred - Proficiency in Linux, Windows, and network security - Strong communication skills in English, both written and oral - Ability to work independently and as part of a team - Familiarity with security testing tools such as Nessus, MetaSploit, Burp Suite, etc. - Relevant certifications like CEH, LPT, CPEN, OSCP, etc., are an asset - Knowledge of PCI ASV, CREST certifications, and threat modeling methodologies is a plus - Experience with mobile application security testing and social engineering techniques is advantageous Note: This job description outlines the primary responsibilities and qualifications for the role of Associate Cybersecurity Consultant at Bulletproof. It is not exhaustive and may involve additional tasks based on business needs. Bulletproof is an equal opportunity employer committed to diversity, equity, and inclusion.,

Posted 3 weeks ago

Apply

2.0 - 9.0 years

0 Lacs

karnataka

On-site

As an InfoSec Analyst - Information Security II with 6-9 years of experience, you will be responsible for ensuring the security of our systems and applications. Your role includes conducting application security assessments, penetration testing, research activities, and contributing to the Security Operations Center (SOC) team. To excel in this position, you should possess a Bachelor's degree in Computer Science or a related technical field. You must have a minimum of 2 years of experience in application security, penetration testing, red team activities, or working in a SOC environment. Familiarity with CI/CD processes and tools such as Git, Docker, Jenkins, and release pipelines is essential for this role. Proficiency in using penetration testing tools like Metasploit, Kali Linux, BURP Suite, nmap, and sqlmap is required. Holding certifications such as GCPN, GWEB, GMOB, GWAT, GPEN, CEH, C|ASE .NET, C|ASE Java, or OSCP would be advantageous. In addition, you should have at least 2 years of experience in object-oriented design and full-stack development using languages like Go, Java, C#, or Python. Knowledge of CI/CD processes and tools is a must-have skill for this position. This role is based in Bengaluru and requires immediate availability with a notice period. If you are a proactive and skilled InfoSec Analyst who is passionate about information security, we encourage you to apply for this exciting opportunity.,

Posted 3 weeks ago

Apply

3.0 - 4.0 years

7 - 11 Lacs

Chennai, India

Work from Office

Hello Visionary! We empower our people to stay resilient and relevant in a constantly changing world. We’re looking for people who are always searching for creative ways to grow and learn. People who want to make a real impact, now and in the future. Does that sound like youThen it seems like you’d make a great addition to our vibrant team. We are looking for a Penetration Tester. This position is available for Chennai Location. You’ll make a difference by: Having experience in performing advanced penetration testing on networks, web & mobile applications, and systems. Having ability to Identify vulnerabilities, exploit weaknesses, and assess the security posture of various assets. Having ability to develop and maintain automated testing tools and scripts. Creating detailed reports outlining findings, risks, and recommended actions. Having Extensive experience in penetration testing, vulnerability assessment, and ethical hacking. Having Proficiency with penetration testing tools such as Metasploit, Burp Suite, Nmap, Nessus, and others. Strong understanding of network protocols, web and mobile applications, and operating systems. Maintaining documentation of testing methodologies, tools, and processes. Knowledge of scripting and programming languages (e.g., Python, Bash). You’ll win us over by: Having An engineering degree B.E/B.Tech/M.E/M.Tech with good academic record. 3-4 Years of relevant experience as Penetration Tester. Having Good command over English language (spoken & written) is non-negotiable. Working closely with business partners to understand their needs and translate them into technical requirements. Communicating findings, risks, and remediation strategies to both technical and non-technical stakeholders. Foster strong relationships with business units to ensure security measures align with business goals. Certification Preferred: Entry level certifications like CEH, eJPT, eWPT. Other certifications like eWPTX, OSCP is an advantage. We’ll support you with: Hybrid working Opportunities. Diverse and inclusive culture. Great variety of learning & development opportunities. Join us and be yourself! We value your unique identity and perspective, recognizing that our strength comes from the diverse backgrounds, experiences, and thoughts of our team members. We are fully committed to providing equitable opportunities and building a workplace that reflects the diversity of society. We also support you in your personal and professional journey by providing resources to help you thrive. Come bring your authentic self and create a better tomorrow with us. Make your mark in our exciting world at Siemens. This role is based in Chennai and is an Individual contributor role. You might be required to visit other locations within India and outside. In return, you'll get the chance to work with teams impacting - and the shape of things to come. We're Siemens. A collection of over 319,000 minds building the future, one day at a time in over 200 countries. Find out more about Siemens careers at

Posted 3 weeks ago

Apply

4.0 - 8.0 years

15 - 25 Lacs

Pune, Bengaluru

Hybrid

Roles & responsibilities: Perform automated testing of running applications and static code (SAST, DAST). Perform manual application penetration tests on one or more of the following to discover and exploit vulnerabilities: web applications, internal applications, APIs, internal and external networks, and mobile applications Experience in one or more of the following is a plus: mobile application testing, Web application pen testing, application architecture, and business logic analysis. Need to work on application tools to perform security tests: AppScan, NetsSparker, Acunetix,Checkmarx, Veracode, BurpSuite, OWASP ZAP, and Kali Linux. Able to explain IDOR, Second Order SQL Injection, CSRF Vulnerability, Root cause, Remediation Mandatorytechnical & functional skills Minimum three (3) years of recent experience working with application tools to perform security tests: AppScan, NetsSparker, Acunetix,Checkmarx, Veracode, BurpSuite, OWASP ZAP, Kali Linux, or equivalent. Minimum three (3) years of performing manual penetration testing and code review against web apps, mobile apps, and APIs Minimum three (3) years of working with technical and non-technical audiences in reporting results and lead remediation conversations. Preferred one year of experience in the development of web applications and/or APIs. should be able to identify and work with new tools/technologies to plug and play on client projects as needed to solve the problem at hand. One or more major ethical hacking certifications not required but preferred: GWAPT, CREST, OSCP, OSWE, OSWA

Posted 3 weeks ago

Apply

0.0 - 1.0 years

0 - 0 Lacs

Mumbai, Maharashtra

On-site

Job Title: Cyber Security Consultant Company: JHS & Associates LLP Location: Mumbai, India Experience: 1–2 Years Employment Type: Full-Time Job Description: JHS & Associates LLP is looking for a skilled Cyber Security Consultant with 1–2 years of experience in penetration testing, IT audits, and cybersecurity frameworks. The ideal candidate should have hands-on expertise with vulnerability assessments, security tools, and working knowledge of leading frameworks such as ISO 27001, NIST, and SOC 2. Key Responsibilities: Conduct Vulnerability Assessments and Penetration Testing (VA/PT) for web apps, networks, and APIs. Perform ITGC and IT audit support aligned with regulatory and client requirements. Assist in SOC 2, ISO 27001, RBI, SEBI, NCA and CERT-In readiness engagements. Deliver high-quality security reports with internal quality scores exceeding 90%. Respond to client queries and remediation requests in a timely manner. Collaborate with internal teams to enhance audit prep and cyber defense processes. Mentor junior staff and contribute to training and process improvement initiatives. Required Technical Skills: Tools/Languages: Python, C++, Java, PHP, Nmap, Nessus, Postman, Burp Suite, Wireshark, Metasploit, Acunetix Cybersecurity Domains: Penetration Testing, Vulnerability Assessment, ITGC, API Security, Reverse Engineering Security Frameworks: ISO 27001, NIST, SOC 2, PDPL, NCA, SEBI, RBI Controls/Infra: Firewalls, IDS/IPS, Endpoint Protection, VPNs Database: Oracle, RDBMS, PL/SQL, ETL/ELT, Data Modeling DevOps/Cloud: AWS, Docker, Kubernetes, CI/CD, Git/GitHub Candidate Profile: 1–2 years of hands-on experience in cybersecurity consulting or assessments Strong problem-solving, communication, and documentation skills Familiarity with audit lifecycle and client-facing project delivery Certifications like CEH, OSCP, ISO 27001 LA/LI (preferred but not mandatory) Immediate joiners preferred Job Type: Full-time Pay: ₹30,000.00 - ₹45,000.00 per month Experience: Cyber Security: 1 year (Preferred) Location: Mumbai, Maharashtra (Preferred) Work Location: In person Expected Start Date: 14/07/2025

Posted 3 weeks ago

Apply

0.0 - 1.0 years

0 - 0 Lacs

Noida Sector 62, Noida, Uttar Pradesh

On-site

Roles and Responsibility human resources number : 9315611995 1.Monitor computer networks for security issues. 2. Investigate security breaches and other cyber security incidents. 3. Knowledge of Infrastructure, including firewalls and data encryption programs. 4. Fix detected vulnerabilities to maintain a high-security standard. 5. Stay current on IT security trends and news. 6. Perform penetration testing 7. Hands-on practice on Kali Linux & other tools, curl, Nikto, Nmap, Metasploit, Burp, ZAP 8. Help colleagues install security software and understand information security management. 9. Research security enhancements and make recommendations to management. 10. Stay up-to-date on information technology trends and security standards. 11. Analyzing security breaches to identify the root cause 12. Network Security (multi-vendor) experience 14. Hands-on experience in dynamic analysis, container testing, fuzzing, OWASP top 10 and vulnerability scanning 15. Knowledge of SQL Injection, XSS, Click Jacking, CSRF & SSRF 16. if have any certificate ( CEH, ethical hacking , cisco) Job Types: Full-time, Fresher Pay: ₹16,000.00 - ₹18,000.00 per month Benefits: Paid sick time Paid time off Schedule: Day shift Monday to Friday Supplemental Pay: Performance bonus Education: Bachelor's (Required) Experience: total work: 1 year (Preferred) Location: Noida Sector 62, Noida, Uttar Pradesh (Required) Shift availability: Day Shift (Required) Work Location: In person

Posted 3 weeks ago

Apply

2.0 - 8.0 years

0 Lacs

Delhi, India

Remote

Education: BE/BTech/MCA/MTech (Preferably CS/IT) Experience Level: 2-8 years Open to travel from Delhi to any Client location Technical Skills Required Mandatory: Product and Application Support a) Good experience in product and application support with sound knowledge of networking and IT Infrastructure b) How typically big enterprise support product installation and upgrades are managed and how the patch management is done Windows / Linux System Administration a) Expertise in Windows Administration (2012 / R2, 2016, 2019,2k22) or Linux System Administration (Red hat, Ubuntu, CentOS) b) Strong skill sets of Windows Services and Linux Daemons c) Knowledge in Mac operating systems d) Hands on experience in implementing Group Policies & Active Directory Server Roles, Knowledge in ADFS, SAML, Certification services e) Manage and Troubleshoot AD environment, AD components, AD Roles & Functions f) Good knowledge in different server roles (Webservers (IIS), DHCP servers, DNS, Remote Desktop services, FSMO, SCCM, SMTP) g) Product installation, Upgrades and Patch Management Networking a) Strong fundamentals in networking b) Hands on troubleshooting experiencing in Networking (Layer2 and Layer3) c) Experience with firewalls, Internet VPN’s, IPSec tunneling d) Remote implementation and troubleshooting e) Good knowledge about different VPN technologies f) Knowledge about TCP/IP, DNS, Proxy servers g) Basic understanding of IPTables, TLS, SSL, netstat, nslookup h) Knowledge about security software such as DLP, firewalls (End point security are add-on) Tools and Expertise a) Experience in debugging tools like Prefmon, Procmon, Process explorer, Resource monitor & Windows Sysinternal tools b) Hands on experience on Windows Sysinternal Tools, TCP Dump / Wireshark trace analysis c) Knowledge in TCPView & crash dump analysis knowledge d) Experience on Wireshark, Nmap, http analyzer, Debug view etc. (add on) e) Knowledge in VAPT analysis & Security (Desirable) f) Security - Knowledge in TLS, SSL, Encryptions, PKI Concepts, Basic understanding about Vulnerability assessments and penetration tests g) Knowledge of Power-shell scripting, Linux shell scripting and Python is add-on Virtualization and Cloud a) Expertise in Virtualization Technologies – VMWARE, Hyper-V or XenHypervisor b) Cloud technology - understanding of Azure, AWS & GCP (or Certified) Good to have: Knowledge in VDI (Citrix, Parallels, VMware Horizon), Nginx Support Management and Tools Knowledge: a) Knowledge of L1 and L2 Ticket tracking tools b) Should be able to provide reports for any escalations, Root cause Analysis (RCA) and Productivity reports Soft Skills Required Clarity of thought Sincere Proactive Self-motivated Logical bent of mind (Analytical) Team player Flexible/adaptable Good communication skills (both written and verbal) Role and Responsibilities: Providing customer delight Offering excellent technical support experience to customers Good listener to customers, provides on-time deliveries Attending tickets and emails (Proactively involved in escalations and making sure customer commitments are met) Make sure support deliveries are under defined TATs and SLAs Involve appropriate authorities when escalations are required Coordinate with Sr. System Administrators, SME (Subject Matter Expert) Cross-functional team discussions (QA – Quality Analysts, Security Analysts, Development team) - On-time internal escalations Adapt and implement new technologies related to Zero trust network & Virtualization verticals Implementation and Configuration of Products on Cloud Technologies and On-prem virtualization environment Provide solution documents, KB articles, Incident/Preliminary analysis Document & RCAs Reproduce customer issues and if required, analyze the root cause; check and verify any viable solutions available other than development, such as creating scripts, simple solutions, etc Documentations Ready to learn and groom Open to travel for business Founded in 2012, Accops is a leading provider of secure remote access and digital workspace solutions, enabling organizations to maintain control and governance while offering flexibility to work from any device. Accops offers a comprehensive Digital Workspace suite that includes Zero Trust-based Application Access Gateway, End-User Computing (EUC) Virtualization via VDI, robust Identity & Access Management (IAM) solutions such as Multi-Factor Authentication (MFA) and Single Sign-On (SSO), and thin client hardware and software solutions. Accops addresses modern remote work challenges by delivering secure, instant access to business applications. Its solutions protect against network threats and unauthorized access, critical in today’s work-from-anywhere environment. Unlike traditional, multi-product approaches, Accops' pre-integrated suite reduces complexity and deployment time, ensuring faster and more agile implementation. Headquartered in Pune, Accops has become a significant player in the End-User Computing (EUC) virtualization domain, offering a one-stop solution for organizations seeking to deploy secure remote work infrastructures. Its products, including the Nano OS for secure containerization on BYOD devices, and extensive MFA and SSO capabilities, ensure robust data protection and strong identity management. Part of Jio Platforms Ltd, Accops continues to innovate and enhance digital workspace solutions with a focus on security, user experience, and operational efficiency. 𝘈𝘤𝘤𝘰𝘱𝘴 𝘪𝘴 𝘢𝘯 𝘦𝘲𝘶𝘢𝘭 𝘰𝘱𝘱𝘰𝘳𝘵𝘶𝘯𝘪𝘵𝘺 𝘦𝘮𝘱𝘭𝘰𝘺𝘦𝘳 𝘤𝘰𝘮𝘮𝘪𝘵𝘵𝘦𝘥 𝘵𝘰 𝘣𝘶𝘪𝘭𝘥𝘪𝘯𝘨 𝘢 𝘤𝘶𝘭𝘵𝘶𝘳𝘦 𝘸𝘩𝘦𝘳𝘦 𝘢𝘭𝘭 𝘦𝘮𝘱𝘭𝘰𝘺𝘦𝘦𝘴 𝘢𝘳𝘦 𝘷𝘢𝘭𝘶𝘦𝘥, 𝘳𝘦𝘴𝘱𝘦𝘤𝘵𝘦𝘥 𝘢𝘯𝘥 𝘰𝘱𝘪𝘯𝘪𝘰𝘯𝘴 𝘤𝘰𝘶𝘯𝘵. 𝘞𝘦 𝘦𝘯𝘤𝘰𝘶𝘳𝘢𝘨𝘦 𝘢𝘱𝘱𝘭𝘪𝘤𝘢𝘵𝘪𝘰𝘯𝘴 𝘧𝘳𝘰𝘮 𝘢𝘭𝘭 𝘴𝘶𝘪𝘵𝘢𝘣𝘭𝘺 𝘲𝘶𝘢𝘭𝘪𝘧𝘪𝘦𝘥𝘱𝘦𝘳𝘴𝘰𝘯𝘴 𝘪𝘳𝘳𝘦𝘴𝘱𝘦𝘤𝘵𝘪𝘷𝘦 𝘰𝘧, 𝘣𝘶𝘵 𝘯𝘰𝘵 𝘭𝘪𝘮𝘪𝘵𝘦𝘥 𝘵𝘰, 𝘵𝘩𝘦𝘪𝘳 𝘨𝘦𝘯𝘥𝘦𝘳 𝘰𝘳 𝘨𝘦𝘯𝘦𝘵𝘪𝘤 𝘪𝘯𝘧𝘰𝘳𝘮𝘢𝘵𝘪𝘰𝘯, 𝘴𝘦𝘹𝘶𝘢𝘭 𝘰𝘳𝘪𝘦𝘯𝘵𝘢𝘵𝘪𝘰𝘯, 𝘦𝘵𝘩𝘯𝘪𝘤𝘪𝘵𝘺, 𝘳𝘦𝘭𝘪𝘨𝘪𝘰𝘯, 𝘴𝘰𝘤𝘪𝘢𝘭 𝘴𝘵𝘢𝘵𝘶𝘴, 𝘮𝘦𝘥𝘪𝘤𝘢𝘭 𝘤𝘢𝘳𝘦 𝘭𝘦𝘢𝘷𝘦 𝘳𝘦𝘲𝘶𝘪𝘳𝘦𝘮𝘦𝘯𝘵𝘴, 𝘱𝘰𝘭𝘪𝘵𝘪𝘤𝘢𝘭 𝘢𝘧𝘧𝘪𝘭𝘪𝘢𝘵𝘪𝘰𝘯, 𝘱𝘦𝘰𝘱𝘭𝘦 𝘸𝘪𝘵𝘩 𝘥𝘪𝘴𝘢𝘣𝘪𝘭𝘪𝘵𝘪𝘦𝘴, 𝘤𝘰𝘭𝘰𝘳, 𝘯𝘢𝘵𝘪𝘰𝘯𝘢𝘭 𝘰𝘳𝘪𝘨𝘪𝘯, 𝘷𝘦𝘵𝘦𝘳𝘢𝘯 𝘴𝘵𝘢𝘵𝘶𝘴, 𝘦𝘵𝘤. 𝘞𝘦 𝘤𝘰𝘯𝘴𝘪𝘥𝘦𝘳 𝘢𝘭𝘭 𝘢𝘱𝘱𝘭𝘪𝘤𝘢𝘵𝘪𝘰𝘯𝘴 𝘣𝘢𝘴𝘦𝘥 𝘰𝘯 𝘮𝘦𝘳𝘪𝘵 𝘢𝘯𝘥 𝘴𝘶𝘪𝘵𝘢𝘣𝘪𝘭𝘪𝘵𝘺 𝘵𝘰 𝘵𝘩𝘦 𝘳𝘰𝘭𝘦.

Posted 3 weeks ago

Apply

7.0 - 12.0 years

10 - 20 Lacs

Kolkata

Hybrid

Job Description Objective LabVantage Solutions is an industry-leading provider of laboratory software products that support scientific innovation and regulatory compliance across industries such as pharmaceuticals, environmental testing, and food and beverage production. Our OLTP-based solution leverages RDBMS platforms, including Oracle, SQL Server, and EDB (Postgres for our SaaS offering). The Penetration Tester plays a critical role in strengthening LabVantages security posture by simulating real-world attack scenarios across applications, systems, APIs, and cloud infrastructure. This includes conducting black-box, white-box, and grey-box assessments, identifying and exploiting vulnerabilities, and collaborating with engineering teams to remediate findings. Additional responsibilities include performing social engineering campaigns, reviewing third-party services, and contributing to secure architecture evaluations. Job Qualifications Necessary: Education: Bachelors degree in Cybersecurity, Computer Science, Information Security, or a related field. Experience: 7+ years of experience in information security, with at least 3 years focused on offensive security, red teaming, or penetration testing roles. Experience with secure coding practices, code reviews, and security testing. Experience with static and dynamic code analysis tools. Experience with CI/CD pipelines and integrating security into DevOps processes. Certifications: OSCP (required) OSEP, CRTP, PNPT, or OSWE (preferred) CEH (less preferred but acceptable) Skills: Strong understanding of security principles, protocols, and best practices. Proficiency in offensive security tools, including but not limited to: Burp Suite Pro Metasploit Nmap Kali Linux, Parrot OS BloodHound / SharpHound Wireshark SQLmap Hydra, John the Ripper Cloud/Saas Testing familiarity with: AWS/Azure/GCP attack surfaces CNAPPs like Wiz, Orca, or Prisma Cloud Programming Language and scripting: Proficient in scripting languages: Python, Bash, PowerShell Java, JavaScript familiarity for code auditing Knowledge of regulatory requirements and industry standards (e.g., GDPR, ISO 27001, SOC2). Familiarity with the OWASP Top 10 vulnerabilities and mitigation strategies Understanding of NIST cybersecurity standards and frameworks (e.g., NIST CSF, NIST SP 800-53) Excellent analytical and problem-solving skills. Strong communication and collaboration skills. Ability to work independently and as part of a team.

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Thiruvananthapuram

On-site

5 - 7 Years 1 Opening Trivandrum Role description Job Title: Senior Threat Hunter & VAPT Specialist – SIEM/EDR Tools Location: [Trivandrum] Experience Required: 5+ Years Department: Cybersecurity / Information Security Employment Type: Full-Time Role Overview We are seeking a versatile and experienced Cybersecurity Professional to join our team as a Threat Hunter and VAPT Analyst . In this dual-capacity role, you will proactively identify and mitigate emerging cyber threats, perform in-depth vulnerability assessments, and help protect critical infrastructure and data assets. This role requires a blend of advanced technical expertise , analytical mindset , and strong collaboration with SOC and incident response teams. Key Responsibilities Threat Hunting Proactively hunt for undetected threats across networks, systems, and endpoints using behavioral analysis and threat intelligence . Identify Tactics, Techniques, and Procedures (TTPs) and anomalies to detect potential threats or APT activities. Leverage threat intelligence feeds and the MITRE ATT&CK framework to build and validate detection use cases. Collaborate with SOC teams to enhance detection rules and reduce false positives. Conduct forensic investigations and perform root cause analysis on incidents and suspicious behaviors. Develop custom scripts and queries (Python, PowerShell, Bash) for automating hunting activities in EDR, SIEM, and XDR platforms. Document and share threat hunting reports , IOCs , and actionable recommendations with relevant stakeholders. Vulnerability Assessment & Penetration Testing (VAPT) Conduct vulnerability assessments and penetration tests on systems, applications, networks, and APIs. Analyze vulnerabilities, assess risks, and deliver detailed, actionable reports to technical teams. Use a combination of automated tools (e.g., Nessus , Burp Suite , Nmap , Metasploit ) and manual techniques to identify security flaws. Ensure all assessments adhere to internal policies and regulatory standards . Perform periodic and ad-hoc security assessments for web applications , databases , wireless , and cloud environments . Collaborate with IT teams to validate remediations through re-testing and follow-ups . Stay current on emerging vulnerabilities , exploit techniques , and threat actor tactics . Qualifications & Skills Bachelor’s degree in Computer Science , Information Security , or a related discipline. 5+ years of experience in a cybersecurity role with hands-on work in threat hunting and VAPT . Strong expertise in VAPT tools and methodologies: Nessus, Burp Suite, Nmap, Metasploit, OWASP Top 10 . Experience with SIEMs , EDR platforms , and threat intelligence tools . Working knowledge of the MITRE ATT&CK framework . Proficient in scripting languages such as Python, PowerShell, or Bash . Excellent analytical , investigative , and report-writing skills. Strong communication and stakeholder engagement abilities. Preferred Certifications OSCP – Offensive Security Certified Professional CEH – Certified Ethical Hacker GIAC – GCIH, GPEN, GWAPT CISSP – Certified Information Systems Security Professional CESM or other equivalent cybersecurity credentials Skills Soc,TTP,Troubleshooting About UST UST is a global digital transformation solutions provider. For more than 20 years, UST has worked side by side with the world’s best companies to make a real impact through transformation. Powered by technology, inspired by people and led by purpose, UST partners with their clients from design to operation. With deep domain expertise and a future-proof philosophy, UST embeds innovation and agility into their clients’ organizations. With over 30,000 employees in 30 countries, UST builds for boundless impact—touching billions of lives in the process.

Posted 3 weeks ago

Apply

0.0 - 2.0 years

0 - 0 Lacs

Chennai, Tamil Nadu

On-site

Required Qualifications & Skills: Education: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related technical field. A Master's degree is a plus. Experience: Minimum of 2 years of hands-on experience in cybersecurity roles (e.g., Security Analyst, Penetration Tester, Security Engineer, Incident Responder) or dedicated cybersecurity training. Proven track record of successfully delivering training to individuals or teams. Technical Skills: Strong knowledge of core cybersecurity domains, including but not limited to: Network Security (Firewalls, IDS/IPS, VPNs, Network Segmentation, TCP/IP) Operating System Security (Windows, Linux, macOS) Vulnerability Assessment & Penetration Testing (VAPT) methodologies and tools (e.g., Kali Linux, Metasploit, Nmap, Burp Suite) Incident Response & Management Security Operations Center (SOC) functions Cryptography and Encryption Cloud Security (AWS, Azure, GCP) Application Security (OWASP Top 10) Security Frameworks and Compliance (e.g., NIST, ISO 27001) Malware Analysis and Digital Forensics (basic understanding) Proficiency in scripting languages (e.g., Python, PowerShell, Bash) for automation and analysis. Familiarity with SIEM solutions and log analysis. Certifications (Highly Preferred): CompTIA Security+ Certified Ethical Hacker (CEH) CompTIA CySA+ Certified Information Systems Security Professional (CISSP) Offensive Security Certified Professional (OSCP) Any other relevant vendor-specific or domain-specific certifications. Soft Skills: Excellent communication, presentation, and public speaking skills. Ability to explain complex technical concepts clearly and concisely to diverse audiences. Strong analytical and problem-solving abilities. High attention to detail and organizational skills. Passion for teaching and a commitment to learner success. Adaptability and willingness to learn new technologies. Strong interpersonal skills and ability to build rapport. Preferred Qualifications: Prior experience in an educational institution or corporate training department. Experience with Learning Management Systems (LMS). Knowledge of local industry needs and cybersecurity landscape in India/Tamil Nadu. What We Offer: Competitive salary and benefits package. Opportunity to work with cutting-edge cybersecurity technologies. A dynamic and supportive work environment. Continuous professional development and upskilling opportunities. The chance to make a significant impact on the next generation of cybersecurity professionals. franchise@elysiumacadmey.org 7845736974 Job Types: Full-time, Permanent Pay: ₹11,710.30 - ₹18,000.00 per month Schedule: Day shift Work Location: In person

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Who Are We: At SecureLayer7, we aim to solve challenging cybersecurity problems and hurdles faced by organizations. We bring bright minds together to provide a smooth experience in cybersecurity and achieve our vision of making organizations secure from cyber-attacks. Our skilled pen testers and security engineers work on projects ranging from cryptocurrency exchanges to IoT devices. SecureLayer7 is also the parent company of cybersecurity products, namely Sensfrx and BugDazz. About the Role: We are seeking a highly skilled Cybersecurity Expert with over 5 years of hands-on experience in offensive security assessments. The ideal candidate will hold elite certifications such as OSCP, CREST, and have published CVE(s). You should possess deep technical knowledge and practical expertise across Web, Mobile, Source Code (SAST), and Thick Client application testing. Key Responsibilities: Lead and manage end-to-end security assessments for web, mobile (iOS/Android), API, and thick client applications. Conduct manual and automated VAPT using industry-standard tools and methodologies. Drive secure development lifecycle (SDLC) practices, including threat modelling, secure code review, and remediation planning. Design and review secure architectures for enterprise applications and network systems. Perform configuration reviews for firewalls, routers, and operating systems (Linux/Windows). Manage and deliver internal and external application security audits (PCI DSS, HIPAA, ISO 27001). Collaborate with cross-functional teams (development, QA, DevOps) to embed security best practices. Lead red team exercises and simulate attack scenarios to identify exploitable gaps. Own client engagement, project planning, delivery, and post-assessment remediation support. Mentor junior security analysts and contribute to internal knowledge-sharing initiatives. Key Requirements: 5 + years of experience in cybersecurity with a strong focus on application security. Proven expertise in: Vulnerability Assessment & Penetration Testing (VAPT) Source Code Review Red Team Exercises Threat Modelling Secure Architecture Reviews Proficiency in using tools like Burp Suite, OWASP ZAP, Nmap, Metasploit, Nessus, etc. Sound knowledge of secure coding practices across various programming languages. Experience managing client projects across BFSI, telecom, and government sectors. Strong communication and reporting skills for both technical and business stakeholders. Preferred Qualifications & Certifications: Bachelor’s or Master’s degree in Computer Science, Information Security, or related field.

Posted 3 weeks ago

Apply

5.0 years

0 Lacs

Trivandrum, Kerala, India

On-site

Role Description Job Title: Senior Threat Hunter & VAPT Specialist – SIEM/EDR Tools Location: [Trivandrum] Experience Required: 5+ Years Department: Cybersecurity / Information Security Employment Type: Full-Time Role Overview We are seeking a versatile and experienced Cybersecurity Professional to join our team as a Threat Hunter and VAPT Analyst . In this dual-capacity role, you will proactively identify and mitigate emerging cyber threats, perform in-depth vulnerability assessments, and help protect critical infrastructure and data assets. This role requires a blend of advanced technical expertise , analytical mindset , and strong collaboration with SOC and incident response teams. Key Responsibilities Threat Hunting Proactively hunt for undetected threats across networks, systems, and endpoints using behavioral analysis and threat intelligence. Identify Tactics, Techniques, and Procedures (TTPs) and anomalies to detect potential threats or APT activities. Leverage threat intelligence feeds and the MITRE ATT&CK framework to build and validate detection use cases. Collaborate with SOC teams to enhance detection rules and reduce false positives. Conduct forensic investigations and perform root cause analysis on incidents and suspicious behaviors. Develop custom scripts and queries (Python, PowerShell, Bash) for automating hunting activities in EDR, SIEM, and XDR platforms. Document and share threat hunting reports, IOCs, and actionable recommendations with relevant stakeholders. Vulnerability Assessment & Penetration Testing (VAPT) Conduct vulnerability assessments and penetration tests on systems, applications, networks, and APIs. Analyze vulnerabilities, assess risks, and deliver detailed, actionable reports to technical teams. Use a combination of automated tools (e.g., Nessus, Burp Suite, Nmap, Metasploit) and manual techniques to identify security flaws. Ensure all assessments adhere to internal policies and regulatory standards. Perform periodic and ad-hoc security assessments for web applications, databases, wireless, and cloud environments. Collaborate with IT teams to validate remediations through re-testing and follow-ups. Stay current on emerging vulnerabilities, exploit techniques, and threat actor tactics. Qualifications & Skills Bachelor’s degree in Computer Science, Information Security, or a related discipline. 5+ years of experience in a cybersecurity role with hands-on work in threat hunting and VAPT. Strong expertise in VAPT tools and methodologies: Nessus, Burp Suite, Nmap, Metasploit, OWASP Top 10. Experience with SIEMs, EDR platforms, and threat intelligence tools. Working knowledge of the MITRE ATT&CK framework. Proficient in scripting languages such as Python, PowerShell, or Bash. Excellent analytical, investigative, and report-writing skills. Strong communication and stakeholder engagement abilities. Preferred Certifications OSCP – Offensive Security Certified Professional CEH – Certified Ethical Hacker GIAC – GCIH, GPEN, GWAPT CISSP – Certified Information Systems Security Professional CESM or other equivalent cybersecurity credentials Skills Soc,TTP,Troubleshooting

Posted 3 weeks ago

Apply

8.0 - 13.0 years

8 - 12 Lacs

Bengaluru

Work from Office

The IBM Cloud Object Storage team is seeking an experienced Security Developer As a Security developer, you will be part of a highly focused, self-managed team that designs, develops and tests secure solutions created for IBM Cloud Object Storage workloads. Responsible for all aspects of security and compliance activities. Provide feedback to architects regarding any issues that can cause any security and complinace Gaps. Manage projects with various priority levels and timelines from start to finish. Demonstrate best practices in all aspects of administration. Leverage various security tools to secure the offerings and make sure offering is adhered to the best security and compliance priniciples. Continuously stay abreast of new security and complinace guidelines to ensure more secure offering. Must collaborate with other departments to resolve complex issues and be detail oriented. Ability to automate security and complinace solutions to repetitive problems/tasks. Required education Bachelor's Degree Required technical and professional expertise Upto 8+ Years of working experience with Security and Compliance activities Programming Skills: Python Shell Scripting Other Skills: In depth Knowledge of end to end Security and Complinace activities such as Threat Models, Security Privacy by Design. Knowledge of Security scanning tools such as Nessus scanner, SonarQube, NMap. In depth Security concepts (Includes deep understanding of identity mgmt/authentication, authorization, firewall, auditing, secure communication, managing certificates, password management) Excellent presentation and soft skills Security Domain ExpertizeUnderstand of cryptographic key management and it's lifecycle and also security architecture. In depth knowledge of Hardware Security Modules, PKCS #11 APIs, Trusted Execution Environments, Quantum Safe Algorithms Strong English communication skills both written and verbal Preferred technical and professional experience General understanding of private /public / hybrid cloud concepts In depth understanding of HW servers and server components General understanding of open source projects; experience with open source community contribution can be an added advantage Indepth Security concepts and hands on experience on Certificate management/authentication, authorization, firewall, auditing, secure communication, password management)

Posted 3 weeks ago

Apply

3.0 - 8.0 years

10 - 15 Lacs

Mumbai, Thane

Work from Office

Job Description: We are seeking an experienced and highly skilled Penetration Tester with expertise in mobile application security, specifically for both Android and iOS platforms. As a Senior Penetration Tester, you will be responsible for identifying and exploiting vulnerabilities in mobile applications, networks, APIs, and other critical systems. Your primary responsibility will be performing thorough security assessments, including reverse engineering, malware analysis, and incident forensics, to ensure the security and resilience of mobile applications and systems. The ideal candidate should have hands-on experience with penetration testing tools, mobile application testing, and advanced exploitation techniques. You will also be expected to collaborate with various teams, including Red Teams, to develop strategic security initiatives and offer expert-level recommendations for security improvements. Key Responsibilities: Mobile Application Penetration Testing: Conduct in-depth security assessments of mobile applications for both Android and iOS platforms, identifying vulnerabilities and recommending remediation strategies. Red Team Activities: Participate in Red Team exercises to simulate real-world attacks, uncover hidden threats, and assess the effectiveness of security controls. Security Assessments: Perform penetration testing on applications, networks, mobile platforms, APIs, cloud environments, and critical systems to identify advanced threats and vulnerabilities. Custom Exploit Development: Develop custom exploit code and scripts to demonstrate potential security risks to stakeholders and stakeholders, providing hands-on demonstrations of vulnerabilities. Reverse Engineering & Malware Analysis: Use reverse engineering techniques and tools to analyze complex threats, malware, and incidents, providing detailed reports on findings. Collaboration with Leadership: Collaborate with executive leadership and senior management to develop and execute strategic security initiatives and roadmaps to mitigate security risks. Security Architecture Guidance: Provide expert-level guidance on secure coding practices, cryptography, architecture design principles, and implementation to mitigate risks effectively. Tool Development & Automation: Develop custom penetration testing tools and scripts to automate testing processes and enhance capabilities for thorough assessments. Incident Forensics: Lead efforts to analyze and investigate security incidents, determining the root causes and recommending improvements for better prevention. Required Skills and Qualifications: Mobile Pen Testing Expertise: Strong experience in mobile application penetration testing for both Android and iOS platforms. Penetration Testing Tools: Expertise in tools and frameworks such as Metasploit, Burp Suite, Nessus, NMAP, and custom/open-source tools. Red Teaming & Advanced Exploitation: Advanced proficiency in red teaming, black box testing, and using advanced exploitation techniques to identify vulnerabilities. Malware Analysis & Reverse Engineering: Experience in malware analysis and reverse engineering to assess complex threats and incidents. Cryptography & Secure Coding: In-depth knowledge of cryptography, secure coding practices, and secure architecture design principles. Custom Tools & Scripting: Hands-on experience in developing custom scripts and tools to automate testing processes and enhance the effectiveness of assessments. Penetration Testing Methodologies: Expertise in applying penetration testing methodologies, including both network and application-level security assessments. Certifications (Preferred): o OSCP (Offensive Security Certified Professional) o CRTP (Certified Red Team Professional) o eLearn Security Certified Professional Penetration Tester V2.0 o Any other relevant certifications are a plus. Required Experience: Overall Experience: 12+ years in penetration testing, security assessments, and threat analysis. Relevant Experience: 10 years of hands-on experience specifically in penetration testing for mobile applications (Android & iOS), network security, cloud environments, and APIs. Experience working in Red Team environments is a plus.

Posted 3 weeks ago

Apply

5.0 - 9.0 years

5 - 10 Lacs

Thane, Navi Mumbai, Mumbai (All Areas)

Work from Office

Job Title: ISMS (Information Security Management System) Location: Airoli, Navi Mumbai Key Responsibilities: ISMS Implementation & Management: Develop, implement, and maintain the ISMS framework, including policies, procedures, and guidelines based on ISO 27001 and other relevant standards. Conduct regular risk assessments to identify vulnerabilities and recommend appropriate controls to mitigate information security risks. Coordinate with other departments to ensure adherence to ISMS protocols and align information security with business goals. 2. Compliance & Audits: Ensure the organization complies with regulatory requirements related information security, privacy, and data protection. Lead internal and external audits to assess the effectiveness of the ISMS, manage audit processes, and work towards continuous improvement. 3. Documentation & Reporting: Maintain comprehensive documentation for all ISMS processes, policies, controls, and audit activities. Prepare reports for senior management, detailing the effectiveness of the ISMS and recommending improvements. 4. Continuous Improvement: Monitor industry best practices and emerging security trends to enhance the organizations security posture. Recommend improvements to the ISMS based on audit findings, risk assessments, and new business requirements. 5. Desired Traits: Proactive and self-driven. Ability to work independently as well as part of a team. Strong collaboration and interpersonal skills to engage with stakeholders at all levels. Regards, Yugant Mirajkar Human Resources Kiya.ai

Posted 3 weeks ago

Apply

0 years

0 Lacs

India

Remote

🔐 Cyber Security Intern 📍 Location: Remote (100% Virtual) 📅 Duration: 3 Months 💸 Stipend for Top Interns: ₹15,000 🎁 Perks: Certificate | Letter of Recommendation | Full-Time Offer (Based on Performance) About INLIGHN TECH INLIGHN TECH is focused on equipping students and graduates with practical, hands-on experience in emerging tech fields through structured virtual internships. Our Cyber Security Internship is designed to build a strong foundation in ethical hacking, threat detection, and system defense , making you industry-ready for a high-demand domain. 🚀 Internship Overview As a Cyber Security Intern , you will work on projects that simulate real-world cyber threats, learn to identify and mitigate vulnerabilities, and explore techniques used by security professionals to protect systems and data. 🔧 Key Responsibilities Conduct vulnerability assessments and basic penetration testing Analyze logs and traffic to identify potential threats or breaches Assist in incident response and threat mitigation activities Learn and work with tools such as Kali Linux, Burp Suite, Nmap, Metasploit, and Wireshark Study and apply the OWASP Top 10 and other security standards Support the development of security protocols and documentation Stay updated on emerging cyber threats and protection mechanisms ✅ Qualifications Currently pursuing or recently completed a degree in Cybersecurity, IT, Computer Science , or a related field Basic knowledge of networking concepts, operating systems, and system vulnerabilities Familiarity with ethical hacking techniques and cybersecurity tools Understanding of firewalls, encryption, and authentication methods Strong problem-solving skills and a desire to learn more about cyber defense Passion for cybersecurity and protecting digital environments 🎓 What You’ll Gain Hands-on experience with real-world cybersecurity tools and challenges Insight into threat analysis, penetration testing, and security compliance Internship Certificate upon successful completion Letter of Recommendation for high performers Opportunity for a Full-Time Offer based on performance A strong foundation for pursuing careers like Ethical Hacker, SOC Analyst, or Penetration Tester

Posted 3 weeks ago

Apply

2.0 years

0 Lacs

Kanpur, Uttar Pradesh, India

On-site

Description Design, implement, and manage deception strategies and technologies within the organisation's cybersecurity infrastructure. Responsibilities Hands-on experience in working with Deception Technology and SIEM Tool. Design and development of scalable, reliable, and fault-tolerant systems. Integrate/Modify existing open-source software according to the requirements. Prepare presentations and reports. Authoring research papers. Hands-on experience in virtualisation, cloud deployments, and networking. Ability to debug code and overcome fundamental challenges while coding. Hands-on experience in Python. Knowledge of tools like -- nmap, Metasploit, Wireshark, Burp suite, etc. Comfortable in using Linux OS. Good writing and communication skills to assist the group in technical writing. Eligibility A Bachelor's degree in computer science or a similar subject is required 2 years of experience in the same domain as mentioned under the category of responsibilities Travel As and when required, across the country for project execution and monitoring as well as for coordination with geographically distributed teams. Communication Submit a cover letter summarising your experience in relevant technologies and software along with a resume and the Latest passport-size photograph.

Posted 3 weeks ago

Apply

3.0 years

0 Lacs

Ulhasnagar, Maharashtra, India

On-site

Job Title: Cyber Security Specialist Location: Ambernath, India Job Type: Full-Time Reporting : CISO, Global IT Governance About Polypeptide Group: PolyPeptide Group AG and its consolidated subsidiaries (“PolyPeptide”) is a specialized Contract Development & Manufacturing Organization (CDMO) for peptide- and oligonucleotide-based active pharmaceutical ingredients. By supporting its customers mainly in pharma and biotech, it contributes to the health of millions of patients across the world. PolyPeptide serves a fast-growing market, offering products and services from pre-clinical to commercial stages. Its broad portfolio reflects the opportunities in drug therapies across areas and with a large exposure to metabolic diseases, including GLP-1. Dating back to 1952, PolyPeptide today runs a global network of six GMP-certified facilities in Europe, the U.S. and India. PolyPeptide’s shares (SIX: PPGN) are listed on SIX Swiss Exchange. Position Overview: We are seeking a diligent and detail-oriented Cybersecurity specialist to join our cybersecurity team. This role is focused on executing vulnerability scans, analyzing results, and coordinating mitigation efforts to reduce risk across the organization. The candidate should be hands-on with tools like NMAP/ Zenmap and able to generate insightful visualizations and reports using Power BI . As the rest of the team is located in Europe (Sweden), flexibility in working times, and to be self-driven and efficient is highly rated. Key Responsibilities: Conduct regular vulnerability assessments using tools such as NMAP/Zenmap to identify security weaknesses in systems and applications. Analyze scan results, assess risk severity, and escalate critical findings to appropriate stakeholders for timely action. Collaborate with IT and application teams to ensure effective remediation of identified vulnerabilities and verify implemented fixes. Track and document remediation progress, ensuring closure of findings and proper risk mitigation. Develop and maintain reports and dashboards (preferably using Power BI) to monitor vulnerability trends, risk exposure, and key performance indicators (KPIs). Continuously improve and standardize vulnerability management processes and workflows, ensuring alignment with industry standards. Stay updated on the latest security vulnerabilities, exploits, and remediation techniques, and apply threat intelligence to prioritize risks. Work in coordination with the Security Operations Center (SOC) to address vulnerabilities associated with active threats. Participate in patch management and configuration compliance cycles, following security benchmarks such as CIS, NIST, or ISO 27001. Maintain an accurate and up-to-date asset inventory, ensuring comprehensive coverage in scanning and remediation activities. Contribute to the development of security awareness materials, particularly focused on vulnerability risks and secure practices. Create and maintain relevant documentation, SOPs, and playbooks for vulnerability scanning, triage, and response procedures. Support third-party risk assessments by evaluating external vendors' vulnerability exposure and security posture. Participate in red/blue team exercises and tabletop simulations to evaluate and improve vulnerability response readiness. Assist during audits and assessments, with occasional travel as required. Be available to contribute during U.S. operational hours at regular intervals, supporting cross-time-zone collaboration and incident response as needed. Qualifications & Requirements: Bachelor’s degree in Cybersecurity, Computer Science, or related field (or equivalent hands-on experience). 2–3+ years of experience in vulnerability management, security operations, or related fields. Strong hands-on experience with NMAP/Zenmap for scanning and analysis. Familiarity with vulnerability scoring systems like CVSS. Working knowledge of vulnerability management lifecycle and remediation workflows. Experience generating actionable reports and insights; Power BI experience is a plus. Strong analytical and communication skills. Strong skills in writing and speaking English Preferred Qualifications: Certifications such as CompTIA Security+, CEH, or equivalent are desirable. Experience with additional scanning tools (e.g., Nessus, Qualys) is a plus. Familiarity with security standards and frameworks (e.g., ISO 27001, NIST); NIS2 knowledge is a plus. Why Join Us at Polypeptide Group: Polypeptide Group offers an exciting opportunity to work at the forefront of peptide-based therapeutics, a rapidly growing and innovative segment of the pharmaceutical industry. As a key member of our Global IT Cyber Security and IT Compliance, you will have the opportunity to contribute to a company that is dedicated to the success of its clients and the advancement of peptide science. Join us and be part of a global organization that is shaping the future of life-saving therapies.

Posted 3 weeks ago

Apply

0.0 - 1.0 years

2 - 3 Lacs

Bengaluru

Work from Office

Job Description: We are seeking an experienced and highly skilled Penetration Tester with expertise in mobile application security, specifically for both Android and iOS platforms. As a Senior Penetration Tester, you will be responsible for identifying and exploiting vulnerabilities in mobile applications, networks, APIs, and other critical systems. Your primary responsibility will be performing thorough security assessments, including reverse engineering, malware analysis, and incident forensics, to ensure the security and resilience of mobile applications and systems. The ideal candidate should have hands-on experience with penetration testing tools, mobile application testing, and advanced exploitation techniques. You will also be expected to collaborate with various teams, including Red Teams, to develop strategic security initiatives and offer expert-level recommendations for security improvements. Key Responsibilities: Mobile Application Penetration Testing: Conduct in-depth security assessments of mobile applications for both Android and iOS platforms, identifying vulnerabilities and recommending remediation strategies. Red Team Activities: Participate in Red Team exercises to simulate real-world attacks, uncover hidden threats, and assess the effectiveness of security controls. Security Assessments: Perform penetration testing on applications, networks, mobile platforms, APIs, cloud environments, and critical systems to identify advanced threats and vulnerabilities. Custom Exploit Development: Develop custom exploit code and scripts to demonstrate potential security risks to stakeholders and stakeholders, providing hands-on demonstrations of vulnerabilities. Reverse Engineering & Malware Analysis: Use reverse engineering techniques and tools to analyze complex threats, malware, and incidents, providing detailed reports on findings. Collaboration with Leadership: Collaborate with executive leadership and senior management to develop and execute strategic security initiatives and roadmaps to mitigate security risks. Security Architecture Guidance: Provide expert-level guidance on secure coding practices, cryptography, architecture design principles, and implementation to mitigate risks effectively. Tool Development & Automation: Develop custom penetration testing tools and scripts to automate testing processes and enhance capabilities for thorough assessments. Incident Forensics: Lead efforts to analyze and investigate security incidents, determining the root causes and recommending improvements for better prevention. Required Skills and Qualifications: Mobile Pen Testing Expertise: Strong experience in mobile application penetration testing for both Android and iOS platforms. Penetration Testing Tools: Expertise in tools and frameworks such as Metasploit, Burp Suite, Nessus, NMAP, and custom/open-source tools. Red Teaming & Advanced Exploitation: Advanced proficiency in red teaming, black box testing, and using advanced exploitation techniques to identify vulnerabilities. Malware Analysis & Reverse Engineering: Experience in malware analysis and reverse engineering to assess complex threats and incidents. Cryptography & Secure Coding: In-depth knowledge of cryptography, secure coding practices, and secure architecture design principles. Custom Tools & Scripting: Hands-on experience in developing custom scripts and tools to automate testing processes and enhance the effectiveness of assessments. Penetration Testing Methodologies: Expertise in applying penetration testing methodologies, including both network and application-level security assessments. Certifications (Preferred): o OSCP (Offensive Security Certified Professional) o CRTP (Certified Red Team Professional) o eLearn Security Certified Professional Penetration Tester V2.0 o Any other relevant certifications are a plus. Required Experience: Overall Experience: 12+ years in penetration testing, security assessments, and threat analysis. Relevant Experience: 10 years of hands-on experience specifically in penetration testing for mobile applications (Android & iOS), network security, cloud environments, and APIs. Experience working in Red Team environments is a plus.

Posted 3 weeks ago

Apply

2.0 years

1 Lacs

Cochin

On-site

We are seeking a knowledgeable and passionate Cyber Security Tutor. The ideal candidate will be responsible for delivering high-quality instruction in cyber security concepts, practices, and tools to students across different levels. This role includes curriculum development, hands-on training, mentoring, and preparing students for industry certifications. KEY RESPONSIBILITIES Conduct live or recorded sessions on cybersecurity topics. Design and update course materials, practical labs, and assessments. Train students in tools such as Kali Linux, Wireshark, Metasploit, and similar platforms. Mentor students and assist them in preparing for certifications like CEH, Security+, etc. Assess student performance through assignments and exams. Offer personalized feedback and academic support. Stay informed about current trends, tools, and best practices in the cybersecurity field. CANDIDATE REQUIREMENTS Bachelor’s or Master’s degree in Computer Science, Cyber Security, Information Technology, or a related field. Industry-recognized certifications such as CEH, CompTIA Security+, CISSP, OSCP, CISM, or equivalent. Minimum of 2 years of teaching or professional experience in cybersecurity. Strong background in network security, ethical hacking, penetration testing, incident response, and threat analysis. Hands-on proficiency with tools like Nmap, Burp Suite, Nessus, Metasploit, and other cybersecurity frameworks. Understanding of firewalls, VPNs, IDS/IPS, SIEM systems, and endpoint security. Working knowledge of scripting languages (e.g., Python, Bash, PowerShell) is an added advantage. Job Type: Full-time Pay: From ₹15,000.00 per month Schedule: Day shift Work Location: In person

Posted 3 weeks ago

Apply

0 years

0 Lacs

India

Remote

Ethical Hacking Intern 📍 Location: Remote (100% Virtual) 📅 Duration: 3 Months 💸 Stipend for Top Interns: ₹15,000 🎁 Perks: Certificate | Letter of Recommendation | Full-Time Offer (Performance-Based) About INLIGHN TECH INLIGHN TECH is a leading edtech platform focused on providing hands-on, project-based virtual internships. Our Ethical Hacking Internship offers students and freshers the opportunity to dive deep into cybersecurity and gain real-world experience in identifying and patching system vulnerabilities. 🚀 Internship Overview As an Ethical Hacking Intern , you will learn how to ethically test and secure systems, networks, and web applications. You'll work on simulated attack environments, use industry-standard tools, and understand how real-world exploits work — and how to defend against them. 🔧 Key Responsibilities Perform vulnerability assessments and penetration testing on simulated environments Use tools such as Nmap, Metasploit, Burp Suite, Nikto, OWASP ZAP , and Wireshark Learn and practice techniques to test for SQLi, XSS, CSRF, RCE , and more Explore and document the OWASP Top 10 vulnerabilities Assist in developing security reports and suggest remediation strategies Stay updated on the latest security threats, exploits, and patches Participate in ethical hacking labs, capture-the-flag (CTF) exercises, and red team–blue team simulations ✅ Qualifications Pursuing or recently completed a degree in Cybersecurity, Computer Science, IT , or a related field Basic understanding of networking, Linux commands, and web technologies Familiarity with common vulnerabilities and penetration testing tools Strong problem-solving skills and curiosity about how systems can be exploited Eagerness to learn, explore, and ethically test system security Bonus: knowledge of scripting languages like Python or Bash 🎓 What You’ll Gain Practical experience in ethical hacking and penetration testing A portfolio of vulnerability assessments and reports Internship Certificate upon successful completion Letter of Recommendation for high-performing interns Opportunity for a Full-Time Offer based on performance Exposure to real-world red teaming and threat analysis techniques

Posted 3 weeks ago

Apply

0.0 years

0 Lacs

Kochi, Kerala

On-site

Job Title: Cybersecurity Industrial Training Program – 3 Months (On-Site) Company: Matrix Sec Cyber Solutions LLP Location: 2nd Floor, Zareen Complex, Luiz Lane, near Thevara Market, Perumanoor, Kochi, Ernakulam, Kerala 682015 Program Type: Full-Time, On-Site Training Program ₹7,000 per month (Payable to the company) Duration: 3 Months Interview/Orientation Date: July 11, 2025 About the Program Matrix Sec Cyber Solutions LLP is launching a 3-month Cybersecurity Industrial Training Program for aspiring professionals seeking real-world experience in the cybersecurity domain. This hands-on program is designed to simulate a professional work environment, providing participants with exposure to live projects, corporate practices, and industry-standard tools and techniques. This is not a job or internship . It is a certified training program , ideal for those preparing to enter the cybersecurity workforce. Who Should Enroll This program is suitable for: Recent graduates in IT, Computer Science, or related fields Cybersecurity enthusiasts looking to build hands-on skills Individuals seeking practical exposure to ethical hacking, vulnerability assessments, and cyber defense Note: A personal laptop is mandatory for participation in the training. What You Will Learn Fundamentals of network security, web application security, and ethical hacking Conducting basic penetration testing on networks and applications Threat detection, malware analysis, and vulnerability management Using industry tools like Nmap, Burp Suite, Wireshark, and Metasploit Familiarity with compliance frameworks such as OWASP Top 10, ISO 27001, NIST, and GDPR Writing technical reports and documentation Participating in Capture The Flag (CTF) and bug bounty simulations What You Will Gain Real-time training on live cybersecurity projects Mentorship and guidance from experienced professionals Practical exposure to a corporate work environment Certificate of Completion from Matrix Sec Cyber Solutions LLP Enhanced job readiness and improved employability in the cybersecurity domain Additional Information Training charge: ₹7,000/month (Total ₹21,000 for 3 months, payable to the company) Location: Kochi, Kerala (on-site attendance required) Start Date: July 11, 2025 How to Apply To register or request more information: Email: info@matrixsec.in Website: https://matrixsec.in Contact: +91 97469 70442 Job Types: Full-time, Internship Contract length: 3 months Pay: From ₹100.00 per month Work Location: In person Expected Start Date: 14/07/2025

Posted 3 weeks ago

Apply

6.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Experience Required: - 6 to 8 Years Location:- Noida Role Overview- We are seeking a skilled and driven Sr. Security Engineer with a strong background in penetration testing (web, mobile, and network) . The ideal candidate will have hands-on experience identifying and exploiting vulnerabilities, preparing technical and compliance reports, and guiding clients or internal teams on remediation and governance. Key Responsibilities- • Conduct penetration testing of web applications, mobile apps (iOS/Android), and internal/external networks. • Perform vulnerability assessments and risk evaluations across client environments. • Create detailed technical and executive reports with prioritized remediation strategies. • Assist in SOC 2 readiness assessments, ISO 27001 implementation, and GDPR compliance checks. • Collaborate with cross-functional teams for remedial activities to improve the security posture. • Stay updated with the latest exploits, tools, and compliance updates. Required Qualifications- • 6-8 years of experience in cybersecurity with a focus on penetration testing and compliance. • Proficiency in tools like Burp Suite, Nmap, Metasploit, Nessus, MobSF, and manual testing techniques. • Strong knowledge of OWASP Top 10, secure coding practices, network protocols, and common attack vectors. • Understanding of SOC 2, ISO 27001, GDPR, and associated implementation or audit processes. Certifications (Preferred)- • CEH (Certified Ethical Hacker) • ISO/IEC 27001 Lead Auditor / Lead Implementer • Other relevant certs: e.g., CompTIA Security+, eWPT, eCPPT, GPEN Nice-to-Have Skills- • Familiarity with DevSecOps pipelines, source code reviews, or CI/CD security integration. • Client-facing consulting experience or report presentation skills. • Cyber Security vibe is a must.

Posted 3 weeks ago

Apply

2.0 - 3.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Job Summary: We are looking for a Python Developer with 2-3 years of experience to develop network automation and monitoring solutions. The ideal candidate should have strong Python programming skills, a good understanding of networking concepts, and experience in automation and data processing. Key Responsibilities: · Develop Python Applications: Write clean, scalable, and efficient Python code for backend services, APIs, and automation solutions. · Maintain and Optimize: Enhance and maintain existing Python codebase to improve performance, scalability, and reliability. · Integration: Integrate with third-party services and APIs, ensuring smooth data exchange and API consumption. · Debugging and Troubleshooting: Identify and resolve issues with code, infrastructure, or performance through debugging and effective problem-solving. · Perform performance testing and ensure system scalability using the appropriate tools and techniques. Required Skills & Qualifications: · 2-3 years of experience as a Python developer or in a related role. · Proficiency in Python with strong understanding of object-oriented programming (OOP), data structures, and algorithms. · Experience with Python frameworks (e.g., Django). · Solid knowledge of RESTful API development and integration. · Experience working with databases (e.g., PostgreSQL, MongoDB) and writing efficient queries. · Familiarity with version control systems (e.g., Git, GitHub, GitLab). · Strong problem-solving skills and ability to debug and optimize code. · Knowledge of CI/CD practices and tools like Jenkins. Good to have: · Networking Knowledge – Understanding of TCP/IP, SNMP, ICMP, SSH, and other network protocols. · Network Scanning Tools – Experience with Nmap, Scapy, or similar libraries.

Posted 3 weeks ago

Apply

3.0 years

0 Lacs

Tirunelveli, Tamil Nadu, India

On-site

Position – Cybersecurity Trainer We are seeking a skilled Cybersecurity Trainer with 2–3 years of relevant experience to deliver an industry aligned cybersecurity training program. The trainer will be responsible for conducting practical and theoretical sessions, focusing on system security, ethical hacking, network defense, and emerging cybersecurity threats. Key Responsibilities: • Deliver training for the following curriculum modules: • Fundamentals of Cybersecurity • Network Security and Protocols • Ethical Hacking and Penetration Testing • Cyber Laws and Governance • Real-time Labs: Phishing, Ransomware Simulation, Vulnerability Scanning • SOC Operations and Tools (e.g., Wireshark, Splunk, Burp Suite) • Conduct interactive, hands-on sessions using live lab environments, simulators, or online platforms (TryHackMe, Hack The Box, etc.) Qualifications: - Bachelor’s degree in Information Security, Computer Science, or equivalent field - 2–3 years of experience in Cybersecurity training, IT security, or a related domain with Practical knowledge in Networking security protocols, Penetration testing and vulnerability assessment tools, SOC tools like SIEM. • Operating systems (Linux, Windows Server) and virtual machines and Tools like Kali Linux, Metasploit, Nmap, Wireshark, and Burp Suite. Additional Information: • Location: Tirunelveli Interested candidates should submit their resume to nasar@a2000india.com

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies