Jobs
Interviews

703 Phishing Jobs - Page 29

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4 - 9 years

5 - 15 Lacs

Hyderabad, Pune

Work from Office

Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response : Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation : Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis : Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography : Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security : Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting : Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance : Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs) : Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools : Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms : Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions : Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools : Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools

Posted 3 months ago

Apply

4 - 9 years

0 Lacs

Hyderabad, Telangana, India

On-site

Experience: 4 to 9 YearsNotice Period: 30 days maxWork Mode: WFOShift: Rotational Shift Key ResponsibilitiesConduct email analysis and reverse engineer to identify and mitigate threats.Perform static and dynamic analysisAnalyze network traffic and develop heuristic signatures to detect malicious activities.Investigate security incidents, including data breaches, system intrusions, and policy violations.Collaborate with cross-functional teams to improve detection capabilities and response.Develop and implement incident response plans and coordinate incident investigations.Classify, Maintain and update real-time block lists and URL block lists.Write and review regular expressions for phish, spam and fraud detection.Perform URL and email grading to assess and categorize potential threats.Engage in security response activities to address and resolve security incidents.Conduct threat hunting to proactively identify and address potential detection gaps. Basic QualificationsBachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field.Strong understanding of computer security, network architecture, and threat landscape.Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS).Strong knowledge of networking concepts and OSI layers.Understanding of enterprise IT architecture, operating systems, and file systems.Excellent analytical skills and ability to identify patterns and trends.Strong research skills and ability to analyze and present complex data.Good logical reasoning and deep analytical skills.Good communication skills and attention to detail.Ability to perform well under stress, particularly in critical response situations.Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly.Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling.Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures.Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data.Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks.Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs.Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. ToolsSecure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails.Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content.Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data.Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments.Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts.Security Information and Event Management or Incident Response Tools

Posted 3 months ago

Apply

5.0 years

0 Lacs

Chennai, Tamil Nadu

On-site

Location Chennai, Tamil Nadu, India Category HR/Finance/IT Posted Date 10/22/2024 Job Id P-100965 Job Requirements Job Purpose: The Network person is responsible for the smooth functioning and upkeep of the IT infrastructure (including software and hardware) at RE. Position Overview: Location: Chennai Position Title: Deputy Manager - Network Reports to: Information Technology - Functional Head Function: Information Technology What you’ll do: Network Architecture and Planning: Suggest architecture of Royal Enfield Network to Infra Head Stay updated on new technology and its implications to ROYAL ENFIELD Network. Keep Network Architecture (WAN, LAN, Cloud, Wifi) and other related documents updated Deploy necessary tools to monitor the network. Review LAN architectures of Data Center, Plants, HQ, Warehouse, offices etc Maintain EOS and EOL of all devices and suggest timely replacements Participate/Manage network projects with external vendors. Capacity Management: Continually reviewing current service capacity and service performance Ensuring Team follow the right approach while installing new network devices in production. There should be thorough review of system resources and discussion before deployment. Sufficient sizing of network links should be done well in advance to avoid unexpected performance issues or resource crunch. Propose upgradation/ changes in system resources if any to Infra Head well in advance Availability Management: All mission Critical network devices should be configured in high availability. HA Failover testing half yearly/ yearly or based on business need Ensuring the Backup of all critical network devices are done as per defined policy. Network Links review every week to see SLAs of service providers. Oversee usage of Tools to monitor network availability. Configuration management: Manage configuration of all network devices Execute changes and configuration as required POC and Upgrade of network devices after getting approvals from Infra Head Keep backup of configurations. IT Infra Processes compliance and Documentation of core domain: Ensuring up to date SOPs uploaded on portals for network team operations. Develop and maintain documents of Network and security devices Assisting in designing and implementation of the Infrastructure support processes and policies Identify and facilitate training programs for IT teams to improve productivity of IT tools. Operations management: Supervise the daily operations of any future NOC and FMS network team/security domain leads. Analysis of network traffic flow and take appropriate improvement actions wherever needed Escalate and report the exceptions to Infra Head. Technical Support: Technical support to be given to CMS domain leads wherever they stuck, Provide L3 / L4 Support on network and security devices and Conclude RCA Do analysis and prepare RCAs for major incidents and submit to Infra head. Make sure proper handover to be given at the time of replacement of domain leads. Security and Patch Management: Ensure upgradation of firmware’s and other security updates on all critical network devices on a Quarterly basis. This include testing of patches on test environment and then pushing to production environment Hardening of Network device as per standards. Ensure updating all security devices like Firewall’s OS on latest firmware, IPS, IDS with latest signatures on all internet firewalls. Quarterly review of Vulnerability Assessment Scan and closure penetration testing of all Network critical devices). Test and VAPT scan data center devices before setting up in the production environment. Do activities for Infra compliance for ISO27001 security standards Log management Event log analyzer: Review logs as per the access management. Analyzing logs and try to find out a pattern of the vulnerability. Check for suspicious contents accessed by any user. Real Time Review multiple login failures, command executed on the firewall etc. 100% capturing of Admin Activities / Task (internal / FMS Team) done on Network devices. Any changes made in system without approval can be tracked down Real time analyzing of events logs generated out of the system - to ensure the system is free of Bots, Phishing activities, Virus. Backup of Log analysis for Audit requirement IT Change Management: Operates as the Change Manager for IT network changes. Support Infra Head on completion of Changes authorized. Work Experience What you'll bring: Experience: Minimum 5+ years of experience in SD WAN and 3+ years of experience in FortiGate / Fortinet (Firewall) and 3+ years of experience in Cisco. Qualification: BE/BTech/MCA/ Diploma in Systems / engineering Skills: Good understanding of infrastructure, products, standards and configuration Ability to work flexible and stretch hours Demonstrate ownership of and accountability for relevant products and services Ability to work as part of a team and independently Ability to successfully handle multiple tasks while under pressure People Management skill; Working in synergy with cross functional teams Strong understanding of following technologies Fortinet SD-WAN and UTM including Forti Analyzer and Forti Manager Cisco Wireless LAN Controller, Indoor and outdoor wireless access points Forescout NAC or similar CyberArk PAM or similar Citrix and F5 Application Load Balancer Cisco Routing and Switching Cisco Data Center Networking (Nexus) Having understanding of following will be an added advantage - Web Proxy Cloud Networking (Azure, GCP) Secure Web Gateway Zero Trust Network Access Any SASE Solution Fast Track Career Growth Outstanding launches and riding events Riders' Leave Leadership Development Programs Medical Insurance and Life Cover Career Progression via internal movements Equal Employment Opportunity Amazing Employee Discounts on company products Voluntary Parental Coverage - Medical Insurance Rewards and Recognition Maternity & Paternity leave and benefits

Posted 9 months ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies