Home
Jobs

328 Phishing Jobs - Page 8

Filter
Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

130.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description Current Employees apply HERE Current Contingent Workers apply HERE Secondary Language(s) Job Description Manager, Cybersecurity Engineering Cloud and App Security The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. You will be tasked with identifying vulnerabilities, supporting the response to incidents, and ensuring that security protocols and controls are adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards. What Will You Do In This Role Contribute to the development of enhanced cloud and application security control integrations and architectural best practices. Contribute to the development and implementation of product security policies and standards to ensure that application, cloud services and infrastructure meet organizational security requirements. Help maintain and monitor security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements. Identify and prioritize adoption of our security tools within other teams ensuring the inputs and outputs are fully integrated enabling a complete security function. Follow standard approaches and established design patterns to create new designs for systems or system components. Identify and resolve minor design issues. Assist in implementing and maintaining specific security controls as required by organisational policy and local risk assessments and contribute to identifying risks that arise from potential technical solution architectures. Monitor and log the actual service provided, compared to that required by service level agreements. Undertake low-complexity routine vulnerability assessments using automated and semi-automated tools and contribute to evaluating and documenting the scope of results. Design, implement, test, document, and support integration of security tools and technologies in pipelines, Also, assist the product teams in related activities. Assist in maintaining security infrastructure and performing system updates. Investigate minor security breaches in accordance with established procedures. Assist users in defining their access rights and privileges and perform non-standard operational security tasks. Resolve security events and operational security issues. Work closely with cross-functional Infrastructure teams on Automation and Orchestration. Create and document detailed designs for simple software applications or components. Apply agreed modelling techniques, standards, patterns, and tools. Work within a matrix organizational structure, reporting to both the functional manager and the project manager. What Should You Have Bachelors’ degree in Information Technology, Computer Science or any Technology stream. Working experience in cloud environments AWS must have and good to have Azure, or GCP. Understanding of OWASP Top 10 security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles. Familiarity with programming/scripting languages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks. Familiarity with software development/delivery lifecycle and related technologies 3+ years of hands-on experience working with network protocols, firewalls, intrusion detection systems, encryption technologies, and endpoint security solutions. Proficiency in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysis platforms.. Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP). Ideally AWS certified. Good interpersonal and communication skills (verbal and written). Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are often required or highly desirable. Proven record of delivering high-quality results. Product and customer-centric approach. Innovative thinking, experimental mindset. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Required Skills Design Applications, Information Security, Security Operations, SLA Management, Software Development, Software Development Life Cycle (SDLC), System Designs, Technical Advice, Vulnerability Scanning Preferred Skills Job Posting End Date 06/23/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R335945 Show more Show less

Posted 2 weeks ago

Apply

130.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description Associate Specialist, Cybersecurity Operations The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. You will be tasked with identifying vulnerabilities, supporting the response to incidents, and ensuring that security protocols and controls are adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards. What Will You Do In This Role Collaborate with product teams to enforce application security best practices, conduct reviews, perform scans and assist in threat modeling to identify and mitigate security risks throughout the development lifecycle. Contribute with penetration testing efforts to evaluate the security posture of applications and containers, providing detailed reports on findings and working with development teams to remediate identified issues. Collaborate to the oversight of security-related bugs and vulnerabilities using tracking systems. Help prioritize security issues based on risk and impact and ensuring that reported issues are triaged and addressed in a timely manner. Contribute to the creation and delivery of training materials for the workforce to raise awareness and increase adoption of application security best practices, cloud security best practices, including secure usage of cloud applications and availability of compensating controls. Help maintain and monitor security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements. Follow standard approaches and established design patterns to create new designs for systems or system components. Identify and resolve minor design issues. Monitor and log the actual service provided, compared to that required by service level agreements. Assist in maintaining security infrastructure and performing system updates. Investigate minor security breaches in accordance with established procedures. Assist users in defining their access rights and privileges and perform non-standard operational security tasks. Resolve security events and operational security issues. Work closely with cross-functional Infrastructure teams on Automation and Orchestration. Create and document detailed designs for simple software applications or components. Apply agreed modelling techniques, standards, patterns, and tools. Work within a matrix organizational structure, reporting to both the functional manager and the project manager. What Should You Have Bachelors’ degree in Information Technology, Computer Science or any Technology stream. 3-4 years proficiency in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysis platforms. Understanding of OWASP Top 10 security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles. Working experience in cloud environments AWS must have and good to have Azure, or GCP. Familiarity with software development/delivery lifecycle and related technologies Familiarity with programming/scripting languages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks. Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP). Ideally AWS certified. Good interpersonal and communication skills (verbal and written). Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are often required or highly desirable. Proven record of delivering high-quality results. Product and customer-centric approach. Innovative thinking, experimental mindset. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Current Employees apply HERE Current Contingent Workers apply HERE Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Job Posting End Date 04/28/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R341158 Show more Show less

Posted 2 weeks ago

Apply

130.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description Associate Specialist, Cybersecurity Operations The Opportunity Based in Hyderabad, join a global healthcare biopharma company and be part of a 130- year legacy of success backed by ethical integrity, forward momentum, and an inspiring mission to achieve new milestones in global healthcare. Be part of an organisation driven by digital technology and data-backed approaches that support a diversified portfolio of prescription medicines, vaccines, and animal health products. Drive innovation and execution excellence. Be a part of a team with passion for using data, analytics, and insights to drive decision-making, and which creates custom software, allowing us to tackle some of the world's greatest health threats. Our Technology Centers focus on creating a space where teams can come together to deliver business solutions that save and improve lives. An integral part of our company’s IT operating model, Tech Centers are globally distributed locations where each IT division has employees to enable our digital transformation journey and drive business outcomes. These locations, in addition to the other sites, are essential to supporting our business and strategy. A focused group of leaders in each Tech Center helps to ensure we can manage and improve each location, from investing in growth, success, and well-being of our people, to making sure colleagues from each IT division feel a sense of belonging to managing critical emergencies. And together, we must leverage the strength of our team to collaborate globally to optimize connections and share best practices across the Tech Centers. Role Overview As a Cybersecurity Engineer, you will be responsible for designing, implementing, and maintaining security measures to protect the organization's computer systems, networks, and data from cyber threats. This role will involve a combination of technologies, processes, and practices designed to safeguard data, applications, and networks from threats like malware, phishing, and data breaches. You will be tasked with identifying vulnerabilities, supporting the response to incidents, and ensuring that security protocols and controls are adhered to. Your role is vital in safeguarding critical assets and ensuring compliance with legal and regulatory standards. What Will You Do In This Role Collaborate with product teams to enforce application security best practices, conduct reviews, perform scans and assist in threat modeling to identify and mitigate security risks throughout the development lifecycle. Contribute with penetration testing efforts to evaluate the security posture of applications and containers, providing detailed reports on findings and working with development teams to remediate identified issues. Collaborate to the oversight of security-related bugs and vulnerabilities using tracking systems. Help prioritize security issues based on risk and impact and ensuring that reported issues are triaged and addressed in a timely manner. Contribute to the creation and delivery of training materials for the workforce to raise awareness and increase adoption of application security best practices, cloud security best practices, including secure usage of cloud applications and availability of compensating controls. Help maintain and monitor security tools and dashboards, ensuring that applications deployed in our environments adhere to organizational security standards and compliance requirements. Follow standard approaches and established design patterns to create new designs for systems or system components. Identify and resolve minor design issues. Monitor and log the actual service provided, compared to that required by service level agreements. Assist in maintaining security infrastructure and performing system updates. Investigate minor security breaches in accordance with established procedures. Assist users in defining their access rights and privileges and perform non-standard operational security tasks. Resolve security events and operational security issues. Work closely with cross-functional Infrastructure teams on Automation and Orchestration. Create and document detailed designs for simple software applications or components. Apply agreed modelling techniques, standards, patterns, and tools. Work within a matrix organizational structure, reporting to both the functional manager and the project manager. What Should You Have Bachelors’ degree in Information Technology, Computer Science or any Technology stream. 3-4 years experience and need proficiency in security tools in the areas of cloud, application, endpoint, network or identity, vulnerability scanners, and malware analysis platforms. Understanding of OWASP Top 10 security risks and mitigation strategies, relevant NIST standards, and Zero Trust principles. Good to have experience in any of the cloud environments. Familiarity with software development/delivery lifecycle and related technologies Familiarity with programming/scripting languages like Python, Bash, Terraform, Ansible, JSON, PowerShell, or JavaScript for automating tasks. Knowledge of authentication methods, identity management, and security access protocols (e.g., SSO, MFA, LDAP). Ideally AWS certified. Good interpersonal and communication skills (verbal and written). Relevant certifications (e.g., CISSP, CISM, CEH, CompTIA Security+) are often required or highly desirable. Proven record of delivering high-quality results. Product and customer-centric approach. Innovative thinking, experimental mindset. Our technology teams operate as business partners, proposing ideas and innovative solutions that enable new organizational capabilities. We collaborate internationally to deliver services and solutions that help everyone be more productive and enable innovation. Who We Are We are known as Merck & Co., Inc., Rahway, New Jersey, USA in the United States and Canada and MSD everywhere else. For more than a century, we have been inventing for life, bringing forward medicines and vaccines for many of the world's most challenging diseases. Today, our company continues to be at the forefront of research to deliver innovative health solutions and advance the prevention and treatment of diseases that threaten people and animals around the world. What We Look For Imagine getting up in the morning for a job as important as helping to save and improve lives around the world. Here, you have that opportunity. You can put your empathy, creativity, digital mastery, or scientific genius to work in collaboration with a diverse group of colleagues who pursue and bring hope to countless people who are battling some of the most challenging diseases of our time. Our team is constantly evolving, so if you are among the intellectually curious, join us—and start making your impact today. #HYDIT2025 Current Employees apply HERE Current Contingent Workers apply HERE Search Firm Representatives Please Read Carefully Merck & Co., Inc., Rahway, NJ, USA, also known as Merck Sharp & Dohme LLC, Rahway, NJ, USA, does not accept unsolicited assistance from search firms for employment opportunities. All CVs / resumes submitted by search firms to any employee at our company without a valid written search agreement in place for this position will be deemed the sole property of our company. No fee will be paid in the event a candidate is hired by our company as a result of an agency referral where no pre-existing agreement is in place. Where agency agreements are in place, introductions are position specific. Please, no phone calls or emails. Employee Status Regular Relocation VISA Sponsorship Travel Requirements Flexible Work Arrangements Hybrid Shift Valid Driving License Hazardous Material(s) Job Posting End Date 04/28/2025 A job posting is effective until 11 59 59PM on the day BEFORE the listed job posting end date. Please ensure you apply to a job posting no later than the day BEFORE the job posting end date. Requisition ID R341159 Show more Show less

Posted 2 weeks ago

Apply

1.0 - 3.0 years

0 Lacs

Indore, Madhya Pradesh, India

On-site

Linkedin logo

ECI is the leading global provider of managed services, cybersecurity, and business transformation for mid-market financial services organizations across the globe. From its unmatched range of services, ECI provides stability, security and improved business performance, freeing clients from technology concerns and enabling them to focus on running their businesses. More than 1,000 customers worldwide with over $3 trillion of assets under management put their trust in ECI. At ECI, we believe success is driven by passion and purpose. Our passion for technology is only surpassed by our commitment to empowering our employees around the world . The Opportunity: ECI has an exciting opportunity for a Security Ops Center Analyst , who is responsible for analyzing and responding to network security events. In this role, you will be responsible for threat actor based investigations, directing new detection methodology and providing 1st level support to incident response and monitoring functions. Also, responsible for proactive monitoring and response of known and or emerging threats against the network. This is an onsite role. What you will do: Proactive monitoring and response to known and or emerging threats against the network. Responsible for threat actor-based investigations using SIEM, EDR, Email gateway, directing new detection methodology and providing 1st level support to incident response and monitoring functions. Perform investigation and triage of events and escalate as appropriate. Recognize and investigate intrusion attempts differentiate false positives from true intrusion attempts. Document and present findings on security incidents and investigations. Collaborate with the team to mitigate and counteract threats. Perform email analysis and be able to categorize email with its verdict. Remain informed about the latest security trends and best practices Communicate effectively with representatives of the Lines of Business, technology specialists, customers, and vendor. To continuously improve on their knowledge around information security as it relates to their job and identifying and preventing phishing attempts. Who you are: Minimum 1 - 3 years of experience in the IT industry, preferably working in a SOC environment. Bachelors in Computer science/IT/Electronics Engineering, M.C.A. or equivalent University degree. Certifications: CCNA, CEH, CHFI. Knowledge on SIEM, IDS/IPS, Firewall, VPN, EDR, AV and other security products. Knowledge on TCP/IP network traffic and event log analysis. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Willingness to work in a job that involves 24/7 operations. Remain vigilant while continuing to maintain and enhance the overall security of our client service portfolio. Maintain awareness about the potential risks based on the environment they are operating in and the clients they are working on. Strong verbal and written communication skills, with ability to communicate technical information to non-technical stakeholders Displays an analytical and problem-solving mindset Bonus points if you have: Ability to work well under pressure – particularly during a security incident or regulatory audit Strong interpersonal and presentation skills. ECI’s culture is all about connection - connection with our clients, our technology and most importantly with each other. In addition to working with an amazing team around the world, ECI also offers a competitive compensation package and so much more! If you believe you would be a great fit and are ready for your best job ever, we would like to hear from you! Love Your Job, Share Your Technology Passion, Create Your Future Here! Show more Show less

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Minimum qualifications: Bachelor's degree or equivalent practical experience. 2 years of experience managing projects and defining project scope, goals, and deliverables. 2 years of experience in data analysis including identifying trends, generating summary statistics, and drawing insights from quantitative and qualitative data. Preferred qualifications: 1 year of experience working on signal development, data analysis, cyber-security or anti-abuse. Experience operating within cross-functional teams (e.g., Product, Engineering, Networks, Operations, Business Development). Experience in querying and analyzing large datasets, including time-series data and performing statistical analysis. Experience in SQL, building dashboards, data collection/transformation, visualization/dashboards. Experience in one or more programming languages(e.g., Python, Golang) with the ability to solve real-world problems using the right data and suitable technology. Ability to deliver concise verbal and written communications for various audiences, reflecting a nuanced understanding of the audiences. About the job Trust & Safety team members are tasked with identifying and taking on the biggest problems that challenge the safety and integrity of our products. They use technical know-how, excellent problem-solving skills, user insights, and proactive communication to protect users and our partners from abuse across Google products like Search, Maps, Gmail, and Google Ads. On this team, you're a big-picture thinker and strategic team-player with a passion for doing what’s right. You work globally and cross-functionally with Google engineers and product managers to identify and fight abuse and fraud cases at Google speed - with urgency. And you take pride in knowing that every day you are working hard to promote trust in Google and ensuring the highest levels of user safety. The Google Photos and Google One Trust and Safety team works across both products to provide best protections and high quality user experiences. In this role, you will be responsible for keeping the products free from unwanted interactions, malware, phishing, and egregious content such as violent extremism, hate speech, and misinformation. You'll also help ensure that both Photos and Google One remain sustainable businesses by protecting offerings from malicious actors. You will collaborate with teams including User Protections, Trust and Safety for Workspace and YouTube, GAIA Account, and User Security Screening (GAUSS), among others. Google leverages state-of-the-art machine learning (ML), robust rules, and intelligent reputation systems to achieve these goals.At Google we work hard to earn our users’ trust every day. Trust & Safety is Google’s team of abuse fighting and user trust experts working daily to make the internet a safer place. We partner with teams across Google to deliver bold solutions in abuse areas such as malware, spam and account hijacking. A team of Analysts, Policy Specialists, Engineers, and Program Managers, we work to reduce risk and fight abuse across all of Google’s products, protecting our users, advertisers, and publishers across the globe in over 40 languages. Responsibilities Work with cross-functional teams across the company, identify new trends, vulnerabilities and influence company-wide direction and strategies in the counter-abuse space. Work within Google Photos and Google One to set processes and priorities alongside cross-functional teams to set and reach trust, safety and sustainability goals at a Product Area (PA) level. Define, implement and monitor key abuse metrics, initiate and lead mitigation efforts to address any concerning trends. Identify operational and tooling improvements to counter-abuse processes to improve quality, precision, recall and turn-around-time. Work with Engineering to develop advanced solutions and ML algorithms to improve protection coverage and be resilient to changes in trends. Google is proud to be an equal opportunity workplace and is an affirmative action employer. We are committed to equal employment opportunity regardless of race, color, ancestry, religion, sex, national origin, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. We also consider qualified applicants regardless of criminal histories, consistent with legal requirements. See also Google's EEO Policy and EEO is the Law. If you have a disability or special need that requires accommodation, please let us know by completing our Accommodations for Applicants form . Show more Show less

Posted 2 weeks ago

Apply

12.0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

LivePerson (NASDAQ: LPSN) is the global leader in enterprise conversations. Hundreds of the world’s leading brands — including HSBC, Chipotle, and Virgin Media — use our award-winning Conversational Cloud platform to connect with millions of consumers. We power nearly a billion conversational interactions every month, providing a uniquely rich data set and safety tools to unlock the power of Conversational AI for better customer experiences. At LivePerson, we foster an inclusive workplace culture that encourages meaningful connection, collaboration, and innovation. Everyone is invited to ask questions, actively seek new ways to achieve success and reach their full potential. We are continually looking for ways to improve our products and make things better. This means spotting opportunities, solving ambiguities, and seeking effective solutions to the problems our customers care about. Overview This candidate will join the Conversational Cloud Core Product team and play a pivotal role in shaping how our customers understand and utilize our platform spanning all the core products from Digital to Voice channels, Consumer Experiences over Web, Mobile App, SMS, WhatsApp, Google, Apple, Social channels, Brands experiences such as our workspaces and Copilot experiences, Integrations and more. You'll collaborate closely with cross-functional teams, including Product, UX, Engineering, to create comprehensive documentation that educates and guides users through the implementation, customization, and optimization of our solutions. You Will Content Development: Lead the creation of high-quality technical documentation, including user guides, API references, developer documentation, and tutorials, ensuring accuracy, clarity, and consistency. User Empathy: Champion a user-centric approach to documentation by understanding the needs, challenges, and preferences of our diverse user base, and tailoring content accordingly. Collaboration: Collaborate closely with Product Managers, Engineers, UX Designers, and other stakeholders to gather information and insights, and translate technical concepts into user-friendly documentation. Continuous Improvement: Proactively identify opportunities to improve existing documentation, tools, and processes, and drive initiatives to enhance the overall effectiveness and usability of our documentation. Quality Assurance: Conduct reviews and audits of documentation to ensure accuracy, completeness, and adherence to company standards and industry best practices. Training and Support: Provide training and support to internal teams and external partners on documentation tools, processes, and best practices. Knowledge Sharing: Share knowledge and expertise with the wider team through presentations, workshops, and other internal channels, fostering a culture of learning and collaboration. You Have Bachelor's degree in Technical Communication, English, Computer Science, or a related field (Master's degree preferred). 12+ years of experience in technical writing, with a focus on software documentation, preferably in the SaaS or AI industry. Proven track record of creating clear, concise, and engaging technical documentation for both technical and non-technical audiences. Strong understanding of software development methodologies, APIs, SDKs, and other technical concepts. Proficiency in documentation tools and technologies such as Markdown, Git, JIRA, Confluence, and content management systems. Excellent communication, collaboration, and problem-solving skills. Ability to manage multiple projects simultaneously in a fast-paced, dynamic environment. Passion for learning new technologies and staying up-to-date with industry trends and best practices. Benefits Health: medical, dental, and vision Time away: vacation and holidays Equal opportunity employer Why You’ll Love Working Here As leaders in enterprise customer conversations, we celebrate diversity, empowering our team to forge impactful conversations globally. LivePerson is a place where uniqueness is embraced, growth is constant, and everyone is empowered to create their own success. And, we're very proud to have earned recognition from Fast Company, Newsweek, and BuiltIn for being a top innovative, beloved, and remote-friendly workplace. Belonging At LivePerson We are proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. We also consider qualified applicants with criminal histories, consistent with applicable federal, state, and local law. We are committed to the accessibility needs of applicants and employees. We provide reasonable accommodations to job applicants with physical or mental disabilities. Applicants with a disability who require reasonable accommodation for any part of the application or hiring process should inform their recruiting contact upon initial connection. The talent acquisition team at LivePerson has recently been notified of a phishing scam targeting candidates applying for our open roles. Scammers have been posing as hiring managers and recruiters in an effort to access candidates' personal and financial information. This phishing scam is not isolated to only LivePerson and has been documented in news articles and media outlets.Please note that any communication from our hiring teams at LivePerson regarding a job opportunity will only be made by a LivePerson employee with an @liveperson.com email address. LivePerson does not ask for personal or financial information as part of our interview process, including but not limited to your social security number, online account passwords, credit card numbers, passport information and other related banking information. If you have any questions and or concerns, please feel free to contact recruiting-lp@liveperson.com Show more Show less

Posted 2 weeks ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Red Teaming Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will oversee the strategic planning and execution of red team operations to emulate real-world threats and uncover security weaknesses across the organization. Your typical day will involve planning, scoping and conducting red team operations, including social engineering, network exploitation, and post-exploitation activities along with leading a team of offensive security experts, and aligning red team efforts with business risk priorities. You will work closely with incident response, and threat intelligence teams to identify detection gaps and provide actionable insights, ensuring the organization remains prepared against evolving threats, while fostering a culture of continuous learning and adversary-aware defense. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Plan, scope, and execute red team exercises simulating real-world attack scenarios.- Perform threat modeling and adversary emulation exercises based on MITRE ATT&CK framework.- Conduct internal and external penetration tests, including physical security and social engineering engagements.- Design and deliver phishing campaigns and other social engineering attacks to test human security posture.- Establish and manage command-and-control (C2) infrastructures using tools like Cobalt Strike.- Perform post-exploitation tasks including lateral movement, Active Directory (AD) exploitation, privilege escalation, and data exfiltration.- Identify gaps in detection and response capabilities and provide detailed reports and remediation recommendations.- Collaborate with Blue Team and Incident Response to enhance organizational defense.- Continuously research emerging threats, TTPs, and contribute to the development of new testing methodologies.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills.- Monitor and evaluate the effectiveness of security measures and recommend improvements. Professional & Technical Skills: - Deep understanding of red team tactics, techniques, and procedures (TTPs) align with MITRE ATT&CK framework.- Proven experience in conducting end-to-end red team engagements across different environments (on-prem, cloud, hybrid).- Proficient with red team tools such as Cobalt Strike, Mythic, Metasploit, Bloodhound, Sharp hound, PowerShell Empire, Impacket- Expertise in EDR/AV evasion techniques, custom payload development, and OPSEC-aware operations.- Skilled in Active Directory attacks, Kerberoasting, Pass-the-Hash/Ticket, and Golden/Silver ticket attacks.- Proficient in hardware-based and physical attack techniques including Rubber Ducky payload deployment, planting rogue devices such as LAN Turtle, Raspberry Pi, NAC bypass. Executing Wi-Fi attacks like Evil Twin attacks, and RFID cloning for physical access simulation and red team engagements.- Strong knowledge of data exfiltration methods and covert communication channels.- Experience with phishing toolkits and infrastructure for social engineering campaigns.- Familiarity with scripting and automation using PowerShell, Python, or Bash.- Comfortable working under strict ethical and legal boundaries, with a strong focus on operational safety. Additional Information:- The candidate should have minimum 7.5 years of experience in Red Teaming.- Certifications- OSCP, OSEP, CRTP, CRTE, CRTO.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In cybersecurity incident management at PwC, you will focus on effectively responding to, and mitigating, cyber threats, maintaining the security of client systems and data. You will be responsible for identifying, analysing, and resolving security incidents to minimise potential damage and protect against future attacks. Driven by curiosity, you are a reliable, contributing member of a team. In our fast-paced environment, you are expected to adapt to working with a variety of clients and team members, each presenting varying challenges and scope. Every experience is an opportunity to learn and grow. You are expected to take ownership and consistently deliver quality work that drives value for our clients and success as a team. As you navigate through the Firm, you build a brand for yourself, opening doors to more opportunities. Skills Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to: Apply a learning mindset and take ownership for your own development. Appreciate diverse perspectives, needs, and feelings of others. Adopt habits to sustain high performance and develop your potential. Actively listen, ask questions to check understanding, and clearly express ideas. Seek, reflect, act on, and give feedback. Gather information from a range of sources to analyse facts and discern patterns. Commit to understanding how the business works and building commercial awareness. Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements. Associate TDR Operations Associate L1 (India) A career in our Cyber Managed Services will provide you the opportunity to solve our clients' most critical business and data protection-related challenges. You will be part of a growing team driving strategic programs, data analytics, innovation, deals, cyber resiliency, response, and technical implementation activities. You will have access to not only the top Cybersecurity, Privacy, and Forensics professionals at PwC, but also to our clients and industry analysts across the globe. A career in our Advisory Acceleration Center is the natural extension of PwC’s leading class global delivery capabilities. We provide premium, cost-effective, high-quality services that support process quality and delivery capability in support of client engagements. Our Acceleration Center team extends our leading Cybersecurity, Privacy & Forensics capabilities. Responsibilities As a Cyber Ops Associate, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to: Share and collaborate effectively with others, creating a positive team spirit. Identify and make suggestions for improvements when problems and/or opportunities arise. Validate data and analysis for accuracy and relevance. Follow risk management and compliance procedures. Keep up-to-date with developments in your area of specialty. Communicate confidently in a clear, concise, and articulate manner - verbally and in written form. Seek opportunities to learn about the wider economy alongside the business models/corporate governance and/or regulatory environment of our clients. Uphold the firm's code of ethics and business conduct. Basic Qualifications Minimum Degree Required: Bachelor’s Degree Minimum Years of Experience: 3-5 Years Certification(s) Preferred: CEH, Security+, CHFI, CTIA, or Any SANS certification. Preferred Knowledge/Skills Demonstrates knowledge, leadership, and/or a proven record of success in the following areas: Networking and applying Network Principles (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture. Applying Incident Response Frameworks and Handling Procedures. Fluency with the cyber attack lifecycle and/or the tactics, techniques, and procedures of threat actors. Information security, compliance, assurance, and/or other security best practices and principles. Possessing and fostering an inquisitive mindset amongst team members. SOC L1 Analyst Responsibilities Monitoring: Continuously monitor security alerts and events generated by various security tools, such as SIEM (Security Information and Event Management) systems, Endpoint Detection and Response (EDR), intrusion detection systems, SOAR, UEBA, Email Gateway, Proxy, and firewalls. Incident Detection and Analysis: Analyze security events and incidents to identify potential security breaches or threats. This involves investigating alerts, analyzing network traffic, user/host anomalies, phishing, and conducting initial triage to determine the severity and impact of the incident. Incident Response: Respond to security incidents by following established procedures, protocols, and SLAs. This may involve escalating incidents to higher-level analysts or incident response teams, coordinating with end-users/stakeholders and IT teams, and documenting incident details as per the standard templates. Threat Intelligence: Stay updated on the latest security threats, vulnerabilities, and Zero-Day attacks. Leverage threat intelligence sources to identify potential indicators of compromise/Indicators of Attack and proactively detect emerging threats, notifying leadership and client teams about these threats. Threat Hunting: Detect and mitigate potential threats that may bypass traditional security measures. Utilize various tools and techniques to identify indicators of compromise (IOCs) and potential attack vectors. By continuously monitoring threat intelligence feeds and analyzing security bulletins, stay updated on the latest attack techniques and vulnerabilities. Collaborate with other security teams to investigate incidents, develop hunting techniques, document findings, and provide reports to management. Documentation and Reporting: Maintain accurate and detailed records of security incidents, including incident timelines, actions taken, and outcomes. Prepare incident reports and contribute to post-incident reviews and lessons learned sessions, also working on client weekly, monthly, and quarterly reports. Collaboration: Collaborate with other analysts of the SOC team, as well as with leadership teams, to share knowledge, insights, and best practices. Work closely with client incident response teams to ensure effective incident resolution and mitigation. Continuous Improvement: Contribute to the improvement of security monitoring and incident response processes by identifying areas for SOP/procedure enhancement, proposing solutions, automations, and alert tunings. Compliance: Ensure compliance with relevant security standards, regulations, and policies, such as PCI DSS, HIPAA, or GDPR. Tools Knowledge SentinelOne, Splunk, MS Sentinel, MS Defender EDR, CrowdStrike, Cortex XDR, Palo Alto XSOAR, Phantom, O365, Proofpoint, DLP SentinelOne: Monitoring and analyzing security alerts and logs through SentinelOne SIEM, performing initial triage of security incidents and escalating them as needed. Additionally, collaborate closely with L2/L3 analysts to support incident response and threat hunting efforts. Engage in basic dashboard building, watchlist creation, running queries, and developing an understanding of security use cases to enhance detection capabilities. Show more Show less

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Andhra Pradesh, India

On-site

Linkedin logo

At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They work to identify vulnerabilities, develop secure systems, and provide proactive solutions to safeguard sensitive data. In cybersecurity incident management at PwC, you will focus on effectively responding to, and mitigating, cyber threats, maintaining the security of client systems and data. You will be responsible for identifying, analysing, and resolving security incidents to minimise potential damage and protect against future attacks. Driven by curiosity, you are a reliable, contributing member of a team. In our fast-paced environment, you are expected to adapt to working with a variety of clients and team members, each presenting varying challenges and scope. Every experience is an opportunity to learn and grow. You are expected to take ownership and consistently deliver quality work that drives value for our clients and success as a team. As you navigate through the Firm, you build a brand for yourself, opening doors to more opportunities. Skills Examples of the skills, knowledge, and experiences you need to lead and deliver value at this level include but are not limited to: Apply a learning mindset and take ownership for your own development. Appreciate diverse perspectives, needs, and feelings of others. Adopt habits to sustain high performance and develop your potential. Actively listen, ask questions to check understanding, and clearly express ideas. Seek, reflect, act on, and give feedback. Gather information from a range of sources to analyse facts and discern patterns. Commit to understanding how the business works and building commercial awareness. Learn and apply professional and technical standards (e.g. refer to specific PwC tax and audit guidance), uphold the Firm's code of conduct and independence requirements. A career in our Cyber Managed Services will provide you the opportunity to solve our clients most critical business and data protection related challenges. You will be part of a growing team driving strategic programs, data analytics, innovation, deals, cyber resiliency, response, and technical implementation activities. You will have access to not only the top Cybersecurity, Privacy, and Forensics professionals at PwC, but to our clients and industry analysts across the globe. A career in our Advisory Acceleration Center is the natural extension of PwC’s leading class global delivery capabilities. We provide premium, cost effective, high quality services that support process quality and delivery capability in support for client engagements. Our Acceleration Center team extends our leading Cybersecurity, Privacy & Forensics capabilities. Responsibilities As a Cyber Ops Associate, you'll work as part of a team of problem solvers, helping to solve complex business issues from strategy to execution. PwC Professional skills and responsibilities for this management level include but are not limited to: Share and collaborate effectively with others, creating a positive team spirit. Identify and make suggestions for improvements when problems and/or opportunities arise. Validate data and analysis for accuracy and relevance. Follow risk management and compliance procedures. Keep up-to-date with developments in my area of specialty Communicate confidently in a clear, concise and articulate manner - verbally and in written form. Seek opportunities to learn about the wider economy alongside the business models/corporate governance and/or regulatory environment of our clients Uphold the firm's code of ethics and business conduct Basic Qualifications Minimum Degree Required: Bachelor’s Degree Minimum Years of Experience: 3-5 Years Certification(s) Preferred: CEH, Security+,CHFI,CTIA or Any SANS certification. Preferred Knowledge/Skills Demonstrates knowledge, leadership, and/or a proven record of success in the following areas: Networking and applying Network Principles (including the OSI Model, TCP/IP, DNS, HTTP, SMTP), System Administration, and Security Architecture Applying Incident Response Frameworks and Handling Procedures Fluency with the cyber attack lifecycle and/or the tactics, techniques, and procedures of threat actors Information security, compliance, assurance, and/or other security best practices and principles Possessing and fostering an inquisitive mindset amongst team members SOC L1 Analyst Responsibilities Monitoring: Continuously monitor security alerts and events generated by various security tools, such as SIEM (Security Information and Event Management) systems,Endpoint Detection and Response (EDR),intrusion detection systems, SOAR, UEBA,Email Gateway,Proxy and firewalls. Incident Detection and Analysis: Analyze security events and incidents to identify potential security breaches or threats. This involves investigating alerts, analyzing network traffic, user/host anomaly,Phishing and conducting initial triage to determine the severity and impact of the incident. Incident Response: Respond to security incidents by following established procedures,protocols and SLAs. This may involve escalating incidents to higher-level analysts or incident response teams, coordinating with Endusers/Stakeholders and IT teams, and documenting incident details as per the standard templates. Threat Intelligence: Stay updated on the latest security threats, vulnerabilities, and Zero-Day attacks. Leverage threat intelligence sources to identify potential indicators of compromise/Indicators of Attack and proactively detect emerging threats and also notifying about these threats to Leadership and Client teams. Threat Hunting: To detect and mitigate potential threats that may bypass traditional security measures. You will utilize various tools and techniques to identify indicators of compromise (IOCs) and potential attack vectors. By continuously monitoring threat intelligence feeds and analyzing security bulletins, you will stay updated on the latest attack techniques and vulnerabilities. Collaborating with other security teams, you will investigate incidents, develop hunting techniques, document findings, and provide reports to management. Documentation and Reporting: Maintain accurate and detailed records of security incidents, including incident timelines, actions taken, and outcomes. Prepare incident reports and contribute to post-incident reviews and lessons learned sessions also working on Client weekly,Monthly and quarterly reports. Collaboration: Collaborate with other analysts of the SOC team, as well as with Leadership teams, to share knowledge, insights, and best practices. Work closely with Client incident response teams to ensure effective incident resolution and mitigation. Continuous Improvement: Contribute to the improvement of security monitoring and incident response processes by identifying areas for SOP/Procedure enhancement, proposing solutions, Automations and Alert tunings. Compliance: Ensure compliance with relevant security standards, regulations, and policies, such as PCI DSS, HIPAA, or GDPR. Tools Knowledge: Splunk,Sentinel,MS Defender EDR, CrowdStrike, Cortex XDR,Palo alto XSOAR, Phantom,0365,ProofPoint,DLP Show more Show less

Posted 2 weeks ago

Apply

5.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Linkedin logo

Who We Are Addepar is a global technology and data company that helps investment professionals provide the most informed, precise guidance for their clients. Hundreds of thousands of users have entrusted Addepar to empower smarter investment decisions and better advice over the last decade. With client presence in more than 50 countries, Addepar’s platform aggregates portfolio, market and client data for over $7 trillion in assets. Addepar’s open platform integrates with more than 100 software, data and services partners to deliver a complete solution for a wide range of firms and use cases. Addepar embraces a global flexible workforce model with offices in Silicon Valley, New York City, Salt Lake City, Chicago, London, Edinburgh, Pune, and Dubai. The Role We are currently seeking a Senior Software Engineer to join our Platform Services team! The Platform Services team works on distributed services that are used across the entire Addepar engineering stack. We write critical, performance sensitive code that the organization depends on when delivering customer-facing applications. As a member of the team you will be within a team of talented engineers and will design, implement, and roll out systems instrumental in Addepar's growth and global expansion. Our Areas Of Focus And Expertise Include Distributed systems (microservices, sharded computations) Interprocess messaging and coordination (Kafka, Zookeeper, service meshes like Istio) Observability (distributed tracing, logging, performance and application monitoring) Build systems, test systems, cloud-native deployment suites Who You Are 5+ years of backend software engineering experience Proficiency in object-oriented languages such as Java Proficiency with relational and non-relational datastores Proficiency in CI/CD, monitoring, and logging systems Expertise in any of the above technical requirements is a huge plus! Our Values Act Like an Owner - Think and operate with intention, purpose and care. Own outcomes. Build Together - Collaborate to unlock the best solutions. Deliver lasting value. Champion Our Clients - Exceed client expectations. Our clients’ success is our success. Drive Innovation - Be bold and unconstrained in problem solving. Transform the industry. Embrace Learning - Engage our community to broaden our perspective. Bring a growth mindset. In addition to our core values, Addepar is proud to be an equal opportunity employer. We seek to bring together diverse ideas, experiences, skill sets, perspectives, backgrounds and identities to drive innovative solutions. We commit to promoting a welcoming environment where inclusion and belonging are held as a shared responsibility. We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, to perform essential job functions, and to receive other benefits and privileges of employment. Please contact us to request accommodation. PHISHING SCAM WARNING: Addepar is among several companies recently made aware of a phishing scam involving con artists posing as hiring managers recruiting via email, text and social media. The imposters are creating misleading email accounts, conducting remote “interviews,” and making fake job offers in order to collect personal and financial information from unsuspecting individuals. Please be aware that no job offers will be made from Addepar without a formal interview process. Additionally, Addepar will not ask you to purchase equipment or supplies as part of your onboarding process. If you have any questions, please reach out to TAinfo@addepar.com. Show more Show less

Posted 2 weeks ago

Apply

7.0 years

0 Lacs

Mumbai, Maharashtra, India

On-site

Linkedin logo

Key Responsibilities JOB DESCRIPTION Leadership and Team Management: Lead and manage the Internal Red Team and SOC Operations teams, ensuring effective collaboration and alignment with organizational security objectives. Provide mentorship and guidance to team members, fostering a culture of continuous learning and professional development. Conduct regular performance reviews and provide ongoing feedback and coaching. Red Team Operations: Plan, execute, and oversee red team exercises to identify and exploit vulnerabilities in systems, networks, and applications. Develop and maintain red team methodologies, tools, and documentation. Work closely with other security teams to remediate identified vulnerabilities and improve security defenses. SOC Operations Management: Oversee the daily operations of the SOC, ensuring efficient and effective monitoring, detection, and response to security incidents. Develop and maintain SOC processes, procedures, and documentation to ensure consistent and high-quality operations. Ensure the SOC is staffed 24/7, including managing schedules, shifts, and on-call rotations. Incident Response and Management: Coordinate and lead the response to major security incidents, including investigation, containment, eradication, and recovery. Develop and maintain an incident response plan and ensure the team is well-trained and prepared to handle incidents. Conduct post-incident reviews and develop lessons learned to improve future response efforts. Threat Intelligence and Analysis: Oversee the collection, analysis, and dissemination of threat intelligence to inform security operations and red team activities. Ensure the SOC team utilizes advanced threat detection tools and techniques to identify and mitigate threats. Collaborate with other teams to enhance threat intelligence capabilities and integrate with existing processes. Security Monitoring and Reporting: Ensure continuous monitoring of network traffic, system logs, and security alerts using SIEM (Security Information and Event Management) solutions. Develop and maintain metrics and dashboards to report on SOC and red team performance and security posture. Present regular reports and briefings to senior management on the state of security operations and key incidents. Policy and Compliance: Develop and enforce security policies, procedures, and standards in alignment with industry best practices and regulatory requirements. Ensure compliance with relevant regulations, such as GDPR, and PCI-DSS. Participate in security audits and assessments, and coordinate with external auditors as needed. Qualifications Bachelor’s degree in Computer Science, Information Security, or a related field. Equivalent work experience may be considered. Minimum of 7 years of experience in cybersecurity, with at least 3 years in a management or leadership role overseeing red team and/or SOC operations. Strong understanding of offensive security practices, including penetration testing and red teaming methodologies. Experience with SOC operations, including incident response, threat detection, and SIEM tools such as Splunk, ArcSight, or QRadar. Knowledge of common attack vectors and techniques, such as phishing, malware, and ransomware. Familiarity with regulatory requirements and frameworks, such as NIST, ISO 27001, and GDPR. Relevant certifications, such as CISSP, CISM, OSCP, CEH, or GIAC, are highly desirable. Excellent leadership, communication, and interpersonal skills. Ability to work effectively under pressure and manage multiple priorities. About The Team eClerx is a global leader in productized services, bringing together people, technology and domain expertise to amplify business results. Our mission is to set the benchmark for client service and success in our industry. Our vision is to be the innovation partner of choice for technology, data analytics and process management services. Since our inception in 2000, we've partnered with top companies across various industries, including financial services, telecommunications, retail, and high-tech. Our innovative solutions and domain expertise help businesses optimize operations, improve efficiency, and drive growth. With over 18,000 employees worldwide, eClerx is dedicated to delivering excellence through smart automation and data-driven insights. At eClerx, we believe in nurturing talent and providing hands-on experience. eClerx is an Equal Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, disability or protected veteran status, or any other legally protected basis, per applicable law. Show more Show less

Posted 2 weeks ago

Apply

3.0 - 5.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support Engineer Mandatory Skills : Phishing, Threat Attack, Cyber Security Experience: 3 to 5 Years Location : Hyderabad Notice Period : Immediate to 15 Days Job Description: Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to sushmitha.r@s3staff.com Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Guntur, Andhra Pradesh, India

On-site

Linkedin logo

Microsoft 365 (M365) Administration 1. Exchange Online Health and Administration a. Ensuring Operational Health i.Maintain the security, availability, performance, interoperability, and reliability of the Exchange Online (O365) environment. ii.Administer and support an enterprise-level Microsoft 365 infrastructure. iii.Troubleshoot Exchange Online-related issues and implement remediation strategies. b. User Mail Management i.Ensure all user mailboxes function correctly. ii.Monitor mailbox performance and storage usage. iii.Collect feedback, complaints, and concerns from users regarding email services. iv.Troubleshoot and resolve issues or escalate to relevant support teams/vendors. c. Mailbox Provisioning i.Create new email accounts for onboarding employees. ii.Delete or deactivate email accounts for departing employees. iii.Manage user lifecycle in Exchange Online and Active Directory. 2. Data Backup, Migration, and Recovery a. Data Backup for Outgoing Employees i.Perform backups of emails and data for outgoing employees. ii.Ensure data is securely stored and accessible for compliance or future reference. b. Office 365 Migration and Best Practices i.Hands-on experience migrating to Office 365, including planning, execution, and troubleshooting. ii.Follow migration best practices to ensure a seamless transition. 3. Organizational Email Policies & Security a. Rule Creation & Policy Enforcement • Implement and manage email rules such as: i.External Mail Alerts – Notify users of emails to/from external domains. ii.Phishing Alerts – Detect and alert users about potential phishing attempts. iii.Email Signatures & Banners – Create and maintain standardized email signatures for all employees. b. Security and Compliance i.Ensure adherence to security policies for email communication. ii.Manage spam filters, phishing protection, and compliance measures within Exchange Online. 4. Storage Monitoring & Optimization a. User Storage Oversight i.Regularly monitor and manage storage quotas for each user. ii.Optimize storage usage and prevent exceedances. iii.Ensure efficient allocation of mailbox storage resources. 5. Active Directory (AD) Management & Integration i.Manage and remediate Active Directory issues related to Office 365. ii.Ensure synchronization between AD and Exchange Online for seamless user access. iii.Maintain security policies, role-based access, and compliance within the Microsoft 365 environment. 2. Data Centre Management a. SharePoint Online Administration Maintenance and Management: a) Maintain SharePoint Online environments. b) Organize and manage the collection of important documents centrally. Access Control: a) Grant and revoke access to authorized personnel as needed. b) Ensure security and compliance with organizational policies. 3. Laptops & Assets Management a. Configuration and Deployment Laptop Configuration: a) Set up and configure laptops according to the requirements of individual roles. b) Ensure all necessary software and security measures are in place. b. Asset Register Maintenance Inventory Management: a) Maintain a detailed register of all IT assets, categorized by type. b) Track asset allocation to employees and departments. c. Asset Maintenance Warranty and Repairs: a) Monitor warranty dates for all IT assets. b) Update records with warranty status and manage repair requests. c) Coordinate replacements or upgrades as necessary. 4. Monthly Checklists a. Electronic Checklist Creation Site-Specific Checklists: a) Develop electronic statutory checklists for each site. b) Ensure all sites comply with organizational IT policies and standards, which includes wallpapers, blocking unauthorised sites like torrents and other potential threat sites. b. Submission and Review Reporting: a) Submit completed checklists to the HR team for review and compliance tracking. 5. Monthly Reporting a. Asset Reporting Purchases and Inventory: a) Report on assets purchased during the month. b) Detail assets approaching warranty expiration. b. Warranty and Repairs Warranty Status: a) List products with warranties ending soon. b) Report on warranties claimed and resolved. Repair Metrics: a) Document the number of repair requests received. b) Track the number of repairs completed and those pending. c. Obsolescence Tracking Asset Lifecycle Management: a) Identify and report on assets that have become obsolete. b) Recommend replacements or upgrades as necessary. d. Asset Trackers Maintenance Detailed Tracking: a) Maintain and update asset trackers to reflect current status, location, and condition of all IT assets. Additional Responsibilities a. Vendor Coordination Support and Services: a) Manage relationships with IT vendors and service providers, this can be handshake with procurement team. b. Security Management Policy Enforcement: a) Implement and enforce IT security policies. b) Monitor for security breaches and respond accordingly. c. Documentation Process Documentation: a) Maintain comprehensive documentation for all IT processes and procedures. b) Ensure documentation is up-to-date and accessible to relevant personnel. d. Training and Support User Training: a) Provide training sessions for users on IT systems and best practices. Technical Support: a) Offer ongoing technical support to address user issues and enhance productivity. Show more Show less

Posted 2 weeks ago

Apply

7.0 years

0 Lacs

Thane, Maharashtra, India

On-site

Linkedin logo

Key Responsibilities Leadership and Team Management: Lead and manage the Internal Red Team and SOC Operations teams, ensuring effective collaboration and alignment with organizational security objectives. Provide mentorship and guidance to team members, fostering a culture of continuous learning and professional development. Conduct regular performance reviews and provide ongoing feedback and coaching. Red Team Operations: Plan, execute, and oversee red team exercises to identify and exploit vulnerabilities in systems, networks, and applications. Develop and maintain red team methodologies, tools, and documentation. Work closely with other security teams to remediate identified vulnerabilities and improve security defenses. SOC Operations Management: Oversee the daily operations of the SOC, ensuring efficient and effective monitoring, detection, and response to security incidents. Develop and maintain SOC processes, procedures, and documentation to ensure consistent and high-quality operations. Ensure the SOC is staffed 24/7, including managing schedules, shifts, and on-call rotations. Incident Response and Management: Coordinate and lead the response to major security incidents, including investigation, containment, eradication, and recovery. Develop and maintain an incident response plan and ensure the team is well-trained and prepared to handle incidents. Conduct post-incident reviews and develop lessons learned to improve future response efforts. Threat Intelligence and Analysis: Oversee the collection, analysis, and dissemination of threat intelligence to inform security operations and red team activities. Ensure the SOC team utilizes advanced threat detection tools and techniques to identify and mitigate threats. Collaborate with other teams to enhance threat intelligence capabilities and integrate with existing processes. Security Monitoring and Reporting: Ensure continuous monitoring of network traffic, system logs, and security alerts using SIEM (Security Information and Event Management) solutions. Develop and maintain metrics and dashboards to report on SOC and red team performance and security posture. Present regular reports and briefings to senior management on the state of security operations and key incidents. Policy and Compliance: Develop and enforce security policies, procedures, and standards in alignment with industry best practices and regulatory requirements. Ensure compliance with relevant regulations, such as GDPR, and PCI-DSS. Participate in security audits and assessments, and coordinate with external auditors as needed. Qualifications Bachelor’s degree in Computer Science, Information Security, or a related field. Equivalent work experience may be considered. Minimum of 7 years of experience in cybersecurity, with at least 3 years in a management or leadership role overseeing red team and/or SOC operations. Strong understanding of offensive security practices, including penetration testing and red teaming methodologies. Experience with SOC operations, including incident response, threat detection, and SIEM tools such as Splunk, ArcSight, or QRadar. Knowledge of common attack vectors and techniques, such as phishing, malware, and ransomware. Familiarity with regulatory requirements and frameworks, such as NIST, ISO 27001, and GDPR. Relevant certifications, such as CISSP, CISM, OSCP, CEH, or GIAC, are highly desirable. Excellent leadership, communication, and interpersonal skills. Ability to work effectively under pressure and manage multiple priorities. Show more Show less

Posted 2 weeks ago

Apply

1.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

As a Business Development Executive at Kratikal Tech Pvt Ltd, your primary focus will be to drive revenue growth by converting qualified leads into new clients for our Vulnerability Assessment and Penetration Testing (VAPT) and Compliance services. You will manage the entire sales process for these opportunities and build strong initial relationships with new clients. Key Responsibilities: Drive and exceed your assigned revenue goals for Kratikal's VAPT and Compliance services. Take ownership of engaging with qualified leads and converting them into new clients. This includes conducting effective sales presentations and demonstrations of our cybersecurity solutions and managing your key accounts. Drive the entire sales process for your opportunities, from initial contact to closing deals. You will be responsible for managing your sales pipeline and ensuring accurate sales forecasting. Establish and nurture strong initial connections with your new clients, ensuring a smooth onboarding experience and setting the stage for long-term client relationships. Independently keep up-to-date with the evolving VAPT and Compliance market landscape and effectively collaborate with internal lead generation and technical teams to support your individual sales efforts. Identify opportunities to drive renewals, upsells, and cross-sells​ to reduce churn and help increase monthly recurring revenue from your existing accounts. Requirements: Bachelor’s or Master’s degree. 1+ years of experience in B2B SaaS sales OR B2B IT Services , ideally with cybersecurity or enterprise software, is a MUST have. Strong communication, negotiation, and consultative selling skills Why You'll Enjoy Working at Kratikal: Get the fast learning and exciting environment of a startup, combined with the stable work and strong performance of a bigger company. There's lots of room to learn, grow, and share your ideas. We also provide good benefits like health insurance, a gratuity payment, and Employees' Provident Fund (a savings plan for your future). We are an equal opportunity employer, where everyone has a fair chance. About Us: Kratikal Tech Private Limited is a leading B2B cybersecurity firm offering cutting-edge cybersecurity solutions and services such as Network Security Audits, Compliance Implementation, IoT Security, and VAPT. Serving over 150+ enterprise customers and 1825+ SMEs across industries, including E-commerce, Fintech, BFSI, NBFC, Telecom, Consumer Internet, Cloud Service Platforms, Manufacturing, and Healthcare, Kratikal is dedicated to helping organizations combat cybercriminals using advanced, technology-driven cybersecurity solutions. The company also develops in-house cybersecurity products, including AutoSecT , competing with industry giants, alongside TSAT (Threatcop Security Awareness Training), TDMARC (Threatcop DMARC), TLMS (Threatcop Learning Management System), and TPIR (Threatcop Phishing Incident Response). These products have received numerous awards and recognitions for their innovation and effectiveness. Kratikal has been honored as the Top Cyber Security Startup at the 12th Top 100 CISO Awards. With a global reach, Kratikal collaborates with renowned organizations to secure their digital landscapes. For more information, visit our websites at www.kratikal.com and www.threatcop.com . Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Greater Hyderabad Area

On-site

Linkedin logo

Job Title : Cybersecurity Analyst (Entry-Level) Location: Hyderabad, TS, India – Work From Office Must. Department : Information Technology / Cybersecurity Employment Type : Full-Time Reports To : Cybersecurity Manager Job Purpose The Cybersecurity Analyst (Fresher) will support the organization’s security operations by monitoring, analysing, and responding to cyber threats. This entry-level role is designed for recent graduates passionate about cybersecurity, eager to apply foundational knowledge, and grow into skilled professionals safeguarding critical systems and data. Key Responsibilities Threat Monitoring and Analysis : Monitor security alerts using tools like Splunk, CrowdStrike, or SIEM platforms to identify potential threats. Analyse logs and network traffic for suspicious activities under senior team guidance. Incident Response Support : Assist in investigating security incidents, documenting findings, and escalating issues as needed. Participate in containment and remediation efforts for low-level threats. Vulnerability Assessments : Support vulnerability scans using tools like Nessus or Qualys to identify system weaknesses. Help prioritize remediation based on risk severity with team input. Security Awareness : Contribute to employee training programs on phishing, password hygiene, and cyber best practices. Create basic awareness content under supervision. Documentation and Reporting : Maintain records of security events, incidents, and mitigation steps. Assist in preparing compliance reports for standards like ISO 27001 or GDPR. Learning and Development : Stay updated on emerging threats, attack vectors, and cybersecurity trends. Participate in training programs to gain certifications like CompTIA Security+ or CEH. Qualifications and Skills Education : Bachelor’s degree in computer science, Information Technology, Cybersecurity, or related field (2024/2025 graduates preferred). Relevant certifications (e.g., CompTIA Security+, CySA+, or equivalent) are a plus but not mandatory. Technical Skills : Basic understanding of networking concepts (TCP/IP, DNS, firewalls). Familiarity with operating systems (Windows, Linux) and command-line tools. Exposure to cybersecurity tools like Wireshark, Splunk, or endpoint detection platforms. Knowledge of common attack vectors (e.g., phishing, malware, DDoS). Soft Skills : Analytical mindset with strong problem-solving abilities. Clear communication to document findings and collaborate with teams. Eagerness to learn and adapt in a fast-paced environment. Attention to detail for identifying anomalies in data. Preferred but Not Required : Internship or project experience in cybersecurity, IT, or network administration. Basic scripting knowledge (e.g., Python, Bash) for automating tasks. Awareness of compliance frameworks (e.g., NIST, GDPR). Key Competencies Curiosity : Proactively seeks to understand cyber threats and solutions. Teamwork : Collaborates with senior analysts and cross-functional teams. Time Management : Prioritizes tasks effectively under tight deadlines. Ethics : Maintains integrity and confidentiality in handling sensitive data. Why Join Us? Growth Opportunities : Access to mentorship, certifications, and hands-on projects to build a cybersecurity career. Innovative Environment : Work with cutting-edge tools like AI-driven threat detection and cloud security platforms. Impactful Work : Protect critical systems and data, contributing to organizational and societal security. Inclusive Culture : Join a diverse team committed to collaboration and innovation. Show more Show less

Posted 2 weeks ago

Apply

8.0 - 12.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Our technology services client is seeking multiple Anti Spam Support Engineer to join their team on a contract basis. These positions offer a strong potential for conversion to full-time employment upon completion of the initial contract period. Below are further details about the role: Role: Anti Spam Support Engineer Mandatory Skills : Phishing, Threat Attack, Cyber Security Experience: 8-12 Years Location : Hyderabad Notice Period : Immediate to 15 Days Job Description: Key Responsibilities Conduct email analysis and reverse engineer to identify and mitigate threats. Perform static and dynamic analysis Analyze network traffic and develop heuristic signatures to detect malicious activities. Investigate security incidents, including data breaches, system intrusions, and policy violations. Collaborate with cross-functional teams to improve detection capabilities and response. Develop and implement incident response plans and coordinate incident investigations. Classify, Maintain and update real-time block lists and URL block lists. Write and review regular expressions for phish, spam and fraud detection. Perform URL and email grading to assess and categorize potential threats. Engage in security response activities to address and resolve security incidents. Conduct threat hunting to proactively identify and address potential detection gaps. Basic Qualifications Bachelor's or Master's degree in Computer Science, Computer Engineering, Information Security, or a related field. Strong understanding of computer security, network architecture, and threat landscape. Familiarity with operating systems internals (Windows, MacOS, Linux, Android, iOS). Strong knowledge of networking concepts and OSI layers. Understanding of enterprise IT architecture, operating systems, and file systems. Excellent analytical skills and ability to identify patterns and trends. Strong research skills and ability to analyze and present complex data. Good logical reasoning and deep analytical skills. Good communication skills and attention to detail. Ability to perform well under stress, particularly in critical response situations. Basic qualities of a researcher, including curiosity, persistence, and attention to detail. Technical Skills Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. Security Information and Event Management or Incident Response Tools If you are interested, share the updated resume to mukesh.s@s3staff.com Show more Show less

Posted 2 weeks ago

Apply

8.0 - 13.0 years

13 - 17 Lacs

Bengaluru

Work from Office

Naukri logo

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Red Teaming Good to have skills : NAMinimum 7.5 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will oversee the strategic planning and execution of red team operations to emulate real-world threats and uncover security weaknesses across the organization. Your typical day will involve planning, scoping and conducting red team operations, including social engineering, network exploitation, and post-exploitation activities along with leading a team of offensive security experts, and aligning red team efforts with business risk priorities. You will work closely with incident response, and threat intelligence teams to identify detection gaps and provide actionable insights, ensuring the organization remains prepared against evolving threats, while fostering a culture of continuous learning and adversary-aware defense. Roles & Responsibilities:- Expected to be an SME.- Collaborate and manage the team to perform.- Responsible for team decisions.- Engage with multiple teams and contribute on key decisions.- Plan, scope, and execute red team exercises simulating real-world attack scenarios.- Perform threat modeling and adversary emulation exercises based on MITRE ATT&CK framework.- Conduct internal and external penetration tests, including physical security and social engineering engagements.- Design and deliver phishing campaigns and other social engineering attacks to test human security posture.- Establish and manage command-and-control (C2) infrastructures using tools like Cobalt Strike.- Perform post-exploitation tasks including lateral movement, Active Directory (AD) exploitation, privilege escalation, and data exfiltration.- Identify gaps in detection and response capabilities and provide detailed reports and remediation recommendations.- Collaborate with Blue Team and Incident Response to enhance organizational defense.- Continuously research emerging threats, TTPs, and contribute to the development of new testing methodologies.- Provide solutions to problems for their immediate team and across multiple teams.- Facilitate training sessions to enhance team knowledge and skills.- Monitor and evaluate the effectiveness of security measures and recommend improvements. Professional & Technical Skills: - Deep understanding of red team tactics, techniques, and procedures (TTPs) align with MITRE ATT&CK framework.- Proven experience in conducting end-to-end red team engagements across different environments (on-prem, cloud, hybrid).- Proficient with red team tools such as Cobalt Strike, Mythic, Metasploit, Bloodhound, Sharp hound, PowerShell Empire, Impacket- Expertise in EDR/AV evasion techniques, custom payload development, and OPSEC-aware operations.- Skilled in Active Directory attacks, Kerberoasting, Pass-the-Hash/Ticket, and Golden/Silver ticket attacks.- Proficient in hardware-based and physical attack techniques including Rubber Ducky payload deployment, planting rogue devices such as LAN Turtle, Raspberry Pi, NAC bypass. Executing Wi-Fi attacks like Evil Twin attacks, and RFID cloning for physical access simulation and red team engagements.- Strong knowledge of data exfiltration methods and covert communication channels.- Experience with phishing toolkits and infrastructure for social engineering campaigns.- Familiarity with scripting and automation using PowerShell, Python, or Bash.- Comfortable working under strict ethical and legal boundaries, with a strong focus on operational safety. Additional Information:- The candidate should have minimum 7.5 years of experience in Red Teaming.- Certifications- OSCP, OSEP, CRTP, CRTE, CRTO.- This position is based at our Bengaluru office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 weeks ago

Apply

5.0 - 7.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

About Credgenics : Credgenics is India’s first of its kind NPA resolution platform backed by credible investors including Accel Partners and Titan Capital. We work with financial institutions, Banks, NBFCs & Digital lending firms to improve the efficiency of their collection using technology, automation intelligence and optimal legal routes to facilitate the resolution of stressed assets. With all major banks and NBFCs as our clients, our SaaS-based collections platform helps them efficiently improve their NPA, geographic reach and customer experience. We count most of India's lending majors as our clients such as ICICI Bank, Axis Bank, Bank of Baroda, etc and have been able to grow 100% MoM consistently even among the pandemic. Role Overview: We are looking for a highly skilled Information Security Engineer II to join our team and play a critical role in safeguarding our information systems and data against potential threats. In this position, you will leverage your expertise to design and implement robust security measures, conduct risk assessments, and ensure compliance with industry standards. Responsibilities: Design, implement, and manage security architecture for our systems, ensuring adherence to best practices and compliance requirements. Conduct thorough risk assessments and vulnerability analysis to identify security weaknesses and recommend mitigation strategies for the complete IT infrastructure of the company . Coordinate with Cert-In empanneled vendors for annual VAPT and PCI DSS certification compliance, manage engagements and ensure standards adherence. Coordinate and handle customer queries related to information security during customer onboarding and handle the periodic banks audit for information security. Develop and enforce security policies, procedures, and standards to protect sensitive information. Monitor security alerts and incidents, responding promptly to security breaches and providing detailed reports on findings and resolutions. Collaborate with cross-functional teams to integrate security into all phases of the software development lifecycle (SDLC). Collaborate with third-party vendors and service providers to perform vendor risk assessment and ensure the security of outsourced systems and services. Perform user access management review, firewall config, rules review and coordinate with the team for the mitigation of all observations. Perform email system’s security assessment to evaluate anti-phishing, anti-spam, and DLP controls. Manage and maintain security systems such as SIEM, IDS/IPS, and DLP to detect and respond to security incidents. Document security findings, recommendations, and remediation plans, and communicate them to relevant stakeholders in a clear and concise manner. Assist in the development and maintenance of security awareness and training programs for employees, promoting a culture of security throughout the organization. Required: 5-7 years of experience in information security, with a focus on security architecture and engineering. Cloud security (AWS) - minimum 2-3 years, DevSecOps - minimum 2 years experience. Server & network security close to 3-4 years experience. Proven experience with governance - RBI guidelines in terms of data security, business continuity, data location, disaster recovery. Experience in security standards such as ISO 27001, ISO 27701, PCI DSS and security frameworks CIS and NIST benchmarking. Hands-on experience with network, application, API vulnerability scanning and penetration testing should be at least 3-4 years. Relevant security certifications such as CISA, CEH or ISO 27001 auditor (preference) Soft Skills and Cultural Fit Exceptional analytical and problem-solving skills, with a keen attention to detail. Strong communication skills to effectively convey complex security concepts to technical and non-technical stakeholders. Proactive and self-motivated, with the ability to work independently and collaboratively in a hybrid work environment. A passion for continuous learning and staying current with industry trends and emerging threats. Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Chennai, Tamil Nadu, India

On-site

Linkedin logo

Key Responsibilities: Incident Detection & Response: Monitor security alerts and events through SIEM tools to identify potential threats. Investigate security incidents and respond in a timely and effective manner. Leverage EDR (Endpoint Detection and Response) solutions for threat detection and incident analysis. Threat Analysis & Mitigation: Conduct thorough threat and malware analysis to identify and mitigate risks. Work closely with internal teams to investigate malware, viruses, and ransomware threats. Use CrowdStrike , Defender , and other endpoint security tools to prevent attacks. Email Security Management: Monitor and manage email security systems to prevent phishing, spam, and other malicious email threats. Respond to suspicious email alerts and work with other teams to resolve them. Continuous Monitoring & Alerting: Actively monitor systems, networks, and applications for any signs of suspicious activities. Utilize Endpoint Security solutions to continuously track and protect endpoints across the network. Collaboration & Reporting: Work closely with the IT and security teams to assess, analyze, and resolve security incidents. Maintain detailed documentation of incidents, findings, and responses for future reference. Regularly report on the status of ongoing security incidents and trends to senior management. Research & Knowledge Enhancement: Stay updated with the latest security threats, vulnerabilities, and trends. Participate in security training and development to improve skills in SIEM , EDR , and other security tools. Required Skills and Qualifications: Bachelor’s degree in Cybersecurity, Information Security, Computer Science, or a related field, or equivalent work experience. Strong experience with SIEM (e.g., Splunk, QRadar, ArcSight). Proficient in EDR and Endpoint Security tools (e.g., CrowdStrike, Microsoft Defender). Hands-on experience in threat and malware analysis . Familiarity with email security systems (e.g., Proofpoint, Mimecast). Strong understanding of network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of security frameworks and industry standards (e.g., MITRE ATT&CK, NIST). Excellent analytical and problem-solving skills. Preferred Qualifications: Security certifications like CompTIA Security+ , CISSP , CEH , or GIAC are a plus. Experience with incident response and forensic investigation. Familiarity with cloud security in AWS, Azure, or Google Cloud. Show more Show less

Posted 2 weeks ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Malware Analyst Here are the some of the key skills which we are looking for it: Static and dynamic malware analysis(aware of file structure like, PE, PDF, OLE, windows short cut files etc...) someone who has hands on writing signatures for malware samples(at-least initial vector malware). Aware of trending malware family campaign and analysis for threat write ups for that follow up family. (example malware family - Emotet/Qakbot/AgentTesla etc..) Email security and Endpoint Security (EOP) Investigating the Phishing campaign and spam emails which users have received and reported. Threat Intelligence analysis/ Threat hunting Analyzing PE files (Dynamic and static analysis) and providing detection for malicious PE files.(RE/Malware Analysis) Analyzing non-PE file s (like OLE / PDF / HTML / HTA / VBS|VBE /JS/ WSF/JAR/LNK) andproviding detection for malicious files. Malware Analysis and Reversing. Reverse Engineering skills: familiar with debuggers, disassemblers, network protocols, file formats, sandboxes, hardware/firmware internals, software communication mechanisms, Classification, clustering and labelling of Malware. Knowledge of Advanced Techniques of Malware Analysis. Knowledge of Malware kill chain and MITRE ATT&CK techniques and tactics. Knowledge of AV evasion techniques and Pen testing tools like - Veil (equal rank), PowerShell Empire, Meterpreter, Unicorn, Cactus Torch, and Any other similar tools Additionally, Experience with advanced persistent threats, human adversary compromises and incident response. Excellent cross-group and interpersonal skills, with the ability to articulate business need for detection improvements. Excellent analytical skills and ability to identify patterns and trends. Strong research skills, data knowledge, and ability to analyze and present complex data in a meaningful way. Strong understanding of Cyber Security, modern security problems and threat landscape, Operating Systems (internals), computer networking concepts. Required Skills: Olly DBG, IDA PRO, Static and dynamic malware analysis, PE and non-PE file analysis Show more Show less

Posted 2 weeks ago

Apply

8.0 - 12.0 years

9 - 11 Lacs

Hyderabad

Work from Office

Naukri logo

Role & responsibilities Job Description: Key Responsibilities • Conduct email analysis and reverse engineer to identify and mitigate threats. • Perform static and dynamic analysis • Analyze network traffic and develop heuristic signatures to detect malicious activities. • Investigate security incidents, including data breaches, system intrusions, and policy violations. • Collaborate with cross-functional teams to improve detection capabilities and response. • Develop and implement incident response plans and coordinate incident investigations. • Classify, Maintain and update real-time block lists and URL block lists. • Write and review regular expressions for phish, spam and fraud detection. • Perform URL and email grading to assess and categorize potential threats. • Engage in security response activities to address and resolve security incidents. • Conduct threat hunting to proactively identify and address potential detection gaps. Technical Skills • Threat Analysis and Incident Response: Ability to analyze email threats, identify indicators of compromise (IOCs), and respond to incidents promptly. • Phishing Detection and Mitigation: Expertise in identifying and mitigating phishing attacks, including spear-phishing and whaling. • Malware Analysis: Skills in analyzing email-borne malware, understanding its behavior, and developing countermeasures. • Cryptography: Knowledge of encryption techniques to secure email communications and protect sensitive data. • Network Security: Understanding of network protocols and security measures to detect and prevent email-based attacks. • Programming and Scripting: Proficiency in languages like Kusto, Python, PowerShell, or Bash for automating security tasks and analyzing email logs. • Regulatory Compliance: Familiarity with regulations such as GDPR, HIPAA, and others that impact email security practices. Tools • Secure Email Gateways (SEGs): Tools like Microsoft Defender for Office, Proofpoint, Mimecast, or Barracuda to filter and block malicious emails. • Email Encryption Tools: Solutions like PGP (Pretty Good Privacy) or S/MIME (Secure/Multipurpose Internet Mail Extensions) for encrypting email content. • Threat Intelligence Platforms: Tools other than VirusTotal, MX Tool box like ThreatConnect or Recorded Future to gather and analyze threat intelligence data. • Sandboxing Solutions: Tools like Windows Sandbox, FireEye or Palo Alto Networks WildFire to safely analyze suspicious email attachments. • Anti-Phishing Tools: Solutions like PhishMe or Cofense to detect and respond to phishing attempts. • Security Information and Event Management or Incident Response Tools

Posted 2 weeks ago

Apply

2.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Role Description We are seeking a detail-oriented and proactive SOC Analyst – Level 2 to strengthen our cybersecurity operations. The ideal candidate will have hands-on experience in reviewing and investigating escalated security events using a variety of security tools and methodologies. This role involves working closely with L1 analysts, Incident Response teams, and Threat Hunters to ensure accurate detection, classification, and escalation of security incidents. Key Responsibilities Review and investigate escalated security events from SOC L1 analysts using tools such as SIEM, EDR, NDR, and other monitoring platforms. Perform initial triage and validation of s, classify incidents, and escalate appropriately to Incident Response or Threat Hunting teams. Leverage threat intelligence to contextualize s and correlate evidence across multiple data sources. Analyze suspicious activity across endpoints, networks, email, and cloud environments. Accurately document investigation steps, findings, and recommendations. Maintain and enhance playbooks, runbooks, and standard operating procedures (SOPs). Participate in purple team exercises, tabletop simulations, and contribute to detection engineering feedback loops. Collaborate with L1 analysts, providing guidance and training on detection logic, triage, and escalation procedures. Required Qualifications Minimum 2 years of experience in a SOC, security monitoring, or cybersecurity operations role. Proficiency with SIEM (e.g., Splunk, QRadar, Sentinel), EDR (e.g., CrowdStrike, Microsoft Defender for Endpoint), and analysis of firewall and proxy logs. Solid understanding of attacker tactics, techniques, and procedures (TTPs), especially those outlined in MITRE ATT&CK and the Cyber Kill Chain. Demonstrated experience in triaging s, classifying threats, and escalating incidents. Strong ability to write concise, accurate incident documentation and reporting. Working knowledge of both Windows and Linux operating systems from a security operations perspective. Preferred Qualifications Familiarity with detection logic tuning, custom rule creation, and threat hunting methodologies. Experience in phishing investigations, malware sandboxing, and basic memory/network forensics. Exposure to scripting languages such as Python, Bash, or PowerShell for task automation and data parsing. Knowledge of cloud security monitoring tools and practices (Azure, AWS, Google Cloud). Relevant certifications such as: Security+, CySA+, GCFE, GCIH, SC-200, or equivalent. Technical Skills Active Directory Red Hat Enterprise Linux Group Policy Management Skills SIEM, EDR, NDR Show more Show less

Posted 2 weeks ago

Apply

4.0 years

0 Lacs

Hyderabad, Telangana, India

Remote

Linkedin logo

LivePerson (NASDAQ: LPSN) is the global leader in enterprise conversations. Hundreds of the world’s leading brands — including HSBC, Chipotle, and Virgin Media — use our award-winning Conversational Cloud platform to connect with millions of consumers. We power nearly a billion conversational interactions every month, providing a uniquely rich data set and safety tools to unlock the power of Conversational AI for better customer experiences. At LivePerson, we foster an inclusive workplace culture that encourages meaningful connection, collaboration, and innovation. Everyone is invited to ask questions, actively seek new ways to achieve success, nd reach their full potential. We are continually looking for ways to improve our products and make things better. This means spotting opportunities, solving ambiguities, and seeking effective solutions to the problems our customers care about. Overview In this role, you will be part of an elite group of Technical Program Managers driving large-scale strategic initiatives across LivePerson’s Global Product and Technology Unit. As a Technical Program Manager , you will be at the forefront of transforming how products are developed, ensuring that teams adhere to a structured journey across functionality, stability, security, operational excellence, and GTM readiness. You will collaborate closely with senior management, product managers, engineers, and cross-functional teams, fostering accountability and alignment in execution. The ideal candidate is self-directed, capable of leading large-scale initiatives in ambiguous environments, and excels at defining deliverables, shaping outcomes, and driving teams toward successful execution. This role requires the ability to operate in a fast-paced, iterative environment that emphasizes agility and impact over rigid processes. You will support the operations of the SRE team ensuring alignment, visibility, and execution , while providing direct insights to senior leadership through regular reporting. Your ability to navigate ambiguity, manage complexity, and drive operational efficiency will be key to the success of this initiative. Responsibilities Lead and manage the execution of SRE initiatives, ensuring structured and phased delivery to improve product stability, consistency, and completeness. Develop and implement scalable program frameworks to drive accountability and transparency across Product, Engineering, Operations, and GTM teams. Drive alignment across senior leadership, product teams, and cross-functional stakeholders to establish clear priorities, timelines, and execution strategies. Monitor and track program success, leveraging key metrics to assess progress, impact, and operational efficiency. Identify risks and dependencies, proactively mitigating blockers and ensuring continuous momentum toward program milestones. Champion process improvements to streamline execution, enhance collaboration, and elevate the standards of product delivery. Communicate program updates to executive leadership, providing strategic insights, risk assessments, and recommendations. Foster a culture of accountability. Work with remote, globally distributed teams. Requirements 4+ years of experience in technical program management, leading large-scale, cross-functional strategic initiatives. Proven expertise in driving complex, multi-year programs that involve multiple teams, dependencies, and evolving priorities. Strong understanding of software development processes, product lifecycle management, and enterprise-grade platform development. Knowledge of Site Reliability Engineering (SRE): Deep understanding of core principles and proven experience scaling SRE practices, including observability and automation. Cloud & DevOps Proficiency for Reliability: Knowledge of cloud platforms and DevOps tools with a track record of improving system reliability, availability and performance is desirable. Experience in aligning product, engineering, and GTM teams toward a common execution framework. Ability to analyze trade-offs, define priorities, and drive decision-making at both strategic and execution levels. Strong communication and stakeholder management skills, with experience presenting to senior leadership. A data-driven approach to measuring impact, tracking progress, and optimizing program execution. Experience managing projects across distributed teams in multiple regions and time zones. Familiarity with Agile, SAFe, or similar methodologies for managing large-scale technical programs. A proactive, problem-solving mindset, able to navigate ambiguity and drive clarity in complex environments. Benefits Health: Medical, Dental and Vision Time away: Vacation and holidays Equal opportunity employer Why You’ll Love Working Here As leaders in enterprise customer conversations, we celebrate diversity, empowering our team to forge impactful conversations globally. LivePerson is a place where uniqueness is embraced, growth is constant, and everyone is empowered to create their own success. And, we're very proud to have earned recognition from Fast Company, Newsweek, and BuiltIn for being a top innovative, beloved, and remote-friendly workplace. Belonging At LivePerson We are proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. We also consider qualified applicants with criminal histories, consistent with applicable federal, state, and local law. We are committed to the accessibility needs of applicants and employees. We provide reasonable accommodations to job applicants with physical or mental disabilities. Applicants with a disability who require reasonable accommodation for any part of the application or hiring process should inform their recruiting contact upon initial connection. The talent acquisition team at LivePerson has recently been notified of a phishing scam targeting candidates applying for our open roles. Scammers have been posing as hiring managers and recruiters in an effort to access candidates' personal and financial information. This phishing scam is not isolated to only LivePerson and has been documented in news articles and media outlets. Please note that any communication from our hiring teams at LivePerson regarding a job opportunity will only be made by a LivePerson employee with an @ liveperson.com email address. LivePerson does not ask for personal or financial information as part of our interview process, including but not limited to your social security number, online account passwords, credit card numbers, passport information and other related banking information. If you have any questions and or concerns, please feel free to contact recruiting-lp@liveperson.com Show more Show less

Posted 2 weeks ago

Apply

3.0 years

0 Lacs

Pune, Maharashtra, India

Remote

Linkedin logo

LivePerson (NASDAQ: LPSN) is the global leader in enterprise conversations. Hundreds of the world’s leading brands — including HSBC, Chipotle, and Virgin Media — use our award-winning Conversational Cloud platform to connect with millions of consumers. We power nearly a billion conversational interactions every month, providing a uniquely rich data set and safety tools to unlock the power of Conversational AI for better customer experiences. At LivePerson, we foster an inclusive workplace culture that encourages meaningful connection, collaboration, and innovation. Everyone is invited to ask questions, actively seek new ways to achieve success, and reach their full potential. We are continually looking for ways to improve our products and make things better. This means spotting opportunities, solving ambiguities, and seeking effective solutions to the problems our customers care about. Overview You will report to the Director of Revenue, rolling up under the Chief Accounting Officer org. As part of LivePerson's Revenue Accounting Team, you'll be at the forefront of revolutionizing accounting practices. We prioritize automation and agility, driving efficiency in revenue reporting through collaborative use of cutting-edge tools and technologies. While Python and advanced analytics are part of our toolkit, our focus extends beyond any single language or platform. Our team embraces a data-first approach and upholds the highest standards of integrity. Working closely with data analysts, we continuously refine processes, leveraging automation to streamline operations and deliver actionable insights. As a member of our dynamic team, you'll immerse yourself in a culture of continual learning and growth, with ample opportunities for cross-training. Join us in reshaping the future of revenue accounting in the tech industry, where your dedication to innovation and efficiency will thrive in an environment of collaboration and progress. The working hours will be 2:00 PM IST - 11:00 PM IST. You Will Support the execution and completion of the global monthly, quarterly and year-end accounting close processes for revenue and preparation of relevant sections of the financial statements in accordance with US GAAP. Review revenue contracts, modifications, and terminations to ensure revenue is recorded, following ASC 606 requirements. Identify, analyze, and apply technical guidance related to software and SaaS revenue recognition, overseeing accounting policies and memos related to revenue. Develop and maintain internal controls to ensure compliance with Sarbanes-Oxley 404. Be a liaison with external auditors relating to the closure of revenue accounting matters and annual audits and quarterly reviews. Evaluate processes, and drive system implementation and enhancements including integrations from Salesforce, Zuora, RevPro, and SAP for process improvements. You Have Degree in accounting, active CPA license preferred, but not expressly required 3-5+ years of progressive accounting experience, Big 4 or other public accounting experience required Experience with ASC 606 Revenue Recognition or IND as 115 revenue from contracts with customers SaaS experience required Advanced Excel skills (formula design, pivot tables, charts) Data collection and modeling, what-if scenarios and experience managing large sets of data Demonstrated experience to be a real 'systems' thinker with excellent process orientation Benefits Health: medical, dental, and vision Time away: vacation and holidays Equal opportunity employer Why You’ll Love Working Here As leaders in enterprise customer conversations, we celebrate diversity, empowering our team to forge impactful conversations globally. LivePerson is a place where uniqueness is embraced, growth is constant, and everyone is empowered to create their own success. And, we're very proud to have earned recognition from Fast Company, Newsweek, and BuiltIn for being a top innovative, beloved, and remote-friendly workplace. Belonging At LivePerson We are proud to be an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to age, ancestry, color, family or medical care leave, gender identity or expression, genetic information, marital status, medical condition, national origin, physical or mental disability, protected veteran status, race, religion, sex (including pregnancy), sexual orientation, or any other characteristic protected by applicable laws, regulations and ordinances. We also consider qualified applicants with criminal histories, consistent with applicable federal, state, and local law. We are committed to the accessibility needs of applicants and employees. We provide reasonable accommodations to job applicants with physical or mental disabilities. Applicants with a disability who require reasonable accommodation for any part of the application or hiring process should inform their recruiting contact upon initial connection. The talent acquisition team at LivePerson has recently been notified of a phishing scam targeting candidates applying for our open roles. Scammers have been posing as hiring managers and recruiters in an effort to access candidates' personal and financial information. This phishing scam is not isolated to only LivePerson and has been documented in news articles and media outlets. Please note that any communication from our hiring teams at LivePerson regarding a job opportunity will only be made by a LivePerson employee with an @ liveperson.com email address. LivePerson does not ask for personal or financial information as part of our interview process, including but not limited to your social security number, online account passwords, credit card numbers, passport information and other related banking information. If you have any questions and or concerns, please feel free to contact recruiting-lp@liveperson.com Show more Show less

Posted 2 weeks ago

Apply

Exploring Phishing Jobs in India

Phishing jobs in India are on the rise as organizations continue to strengthen their cybersecurity measures against phishing attacks. With the increasing demand for professionals skilled in identifying and preventing phishing attempts, job seekers in India have a plethora of opportunities in this field.

Top Hiring Locations in India

  1. Bangalore
  2. Hyderabad
  3. Pune
  4. Mumbai
  5. Chennai

Average Salary Range

The average salary range for phishing professionals in India varies based on experience: - Entry-level: INR 3-6 lakhs per annum - Mid-level: INR 6-12 lakhs per annum - Experienced: INR 12-20 lakhs per annum

Career Path

In the field of phishing, a typical career path may include roles such as: - Junior Security Analyst - Security Engineer - Senior Security Consultant - Security Architect

Related Skills

Apart from expertise in phishing, professionals in this field are often expected to have knowledge in: - Cybersecurity - Network security - Incident response - Security operations

Interview Questions

  • What is phishing and how does it differ from spear phishing? (basic)
  • Explain the steps involved in a typical phishing attack. (medium)
  • How can organizations prevent phishing attacks at the employee level? (medium)
  • Describe some common social engineering techniques used in phishing. (medium)
  • What are some tools used for phishing simulation and prevention? (basic)
  • How does SPF (Sender Policy Framework) help in preventing email phishing? (advanced)
  • Can you explain the concept of domain spoofing in phishing attacks? (medium)
  • What role does user awareness training play in preventing phishing attacks? (basic)
  • How can you differentiate between a legitimate email and a phishing email? (basic)
  • Explain the significance of multi-factor authentication in preventing phishing attacks. (medium)
  • What are some common indicators of a phishing email? (basic)
  • How can DMARC (Domain-based Message Authentication, Reporting, and Conformance) help in preventing email spoofing? (advanced)
  • Describe a scenario where you successfully prevented a phishing attack. (medium)
  • What are some best practices for creating a strong password to prevent phishing attacks? (basic)
  • How can you identify a phishing website? (basic)
  • What steps would you take if you suspect a phishing email in your organization? (medium)
  • How does AI and machine learning play a role in detecting phishing attempts? (medium)
  • Explain the concept of email header analysis in identifying phishing emails. (advanced)
  • What are some emerging trends in phishing attacks that professionals should be aware of? (medium)
  • How can you report a phishing email to the relevant authorities? (basic)
  • Describe the role of encryption in preventing phishing attacks. (medium)
  • How can organizations conduct phishing risk assessments? (medium)
  • What are the legal implications of a successful phishing attack on an organization? (advanced)
  • How do you stay updated with the latest phishing tactics and techniques? (basic)

Closing Remark

As you prepare for your journey into the world of phishing jobs in India, remember to stay informed, practice your skills, and approach interviews with confidence. With the right knowledge and expertise, you can make a significant impact in the cybersecurity landscape of the country. Good luck in your job search!

cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies