8 Phishing Simulation Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

1.0 - 12.0 years

0 Lacs

maharashtra

On-site

Role Overview: As a Cyber Security Analyst L1, you will play a crucial role in monitoring, detecting, and responding to security threats while supporting various cybersecurity solutions. Your primary focus will be on foundational security operations, such as data discovery, attack surface monitoring, and compliance support. Key Responsibilities: - Assist in Data Discovery & Classification to identify sensitive data across systems. - Support File Upload Security Solutions by monitoring and analyzing file uploads for threats. - Participate in Attack Surface Management (ASM) to identify and mitigate vulnerabilities. - Assist in Breach & Attack Simulation (BAS) and Red Team exercises under super...

Posted 6 days ago

AI Match Score
Apply

8.0 - 10.0 years

0 Lacs

chennai, tamil nadu, india

On-site

Job Description: L3 Data and cloud Security specilist PKI, DLP, CASB, Security Awareness Position Overview As a L3 Data Security Engineer with expertise in Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Cloud Access Security Broker (CASB), and Security Awareness programs. Key Responsibilities 1. PKI (ADCS, Venafi, DigiCert) Administer and troubleshoot enterprise PKI infrastructure including Microsoft ADCS. Manage certificate lifecycle: issuance, renewal, revocation, and CRL/OCSP validation. Integrate Venafi for certificate automation and orchestration across multi-cloud/hybrid environments. Manage external SSL/TLS certificates with DigiCert, including domain validation and SAN/...

Posted 1 week ago

AI Match Score
Apply

4.0 - 8.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Cyber Security professional in the TIFS department, you will be responsible for the following duties and responsibilities: - Strong knowledge of cloud security, including Azure, AWS, and GCP - Ability to configure and monitor security devices like firewalls and antivirus software - Proficiency in incident log monitoring - Good understanding of server hardening techniques - Hands-on experience with XDR/EDR solutions - Conducting phishing simulation and training activities - Experience in Vulnerability Assessment and Penetration Testing (VAPT) using tools such as Nessus, NMAP, and Burp Suite - Capability to perform threat analysis, investigation, threat hunting, and adversary tracking - I...

Posted 3 weeks ago

AI Match Score
Apply

5.0 - 10.0 years

0 Lacs

karnataka

On-site

As a passionate member of Advarra, you will play a crucial role in overseeing the information security compliance program for the relevant region. Your responsibilities will include identifying areas of non-compliance and directing corrective action while serving as a consultant and advisor to regional site leadership on information security and related matters. You will take the lead in initiating, facilitating, and promoting activities that enhance information security awareness within your area of responsibility. Your role at Advarra will involve fostering a culture of cybersecurity within the organization, driving behavioral changes for the business, and providing insightful reports and ...

Posted 1 month ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

vadodara, gujarat

On-site

The primary responsibility of this role will be to monitor security events and alerts utilizing Security Information and Event Management (SIEM) tools, Intrusion Detection/Prevention Systems (IDS/IPS), and other security monitoring platforms. You will be responsible for investigating and analyzing security incidents to identify the root cause, impact, and recommended remediation actions. Additionally, you will conduct in-depth analysis of security logs, network traffic, and other relevant data sources to detect and respond to potential threats. As part of your duties, you will be expected to perform real-time incident response activities, including containment, eradication, and recovery, fol...

Posted 2 months ago

AI Match Score
Apply

3.0 - 7.0 years

0 Lacs

haryana

On-site

As a Specialist at CyberAssure Services (P) Ltd., your primary responsibility will be to conduct phishing simulations and assess vulnerability to social engineering attacks. You will play a crucial role in implementing security awareness training programs and providing recommendations to enhance the overall security posture of the organization. By analysing simulation results, you will identify trends, vulnerabilities, and areas for improvement, allowing you to develop effective strategies to mitigate risks effectively. It is essential to stay updated on the latest phishing trends and tactics to ensure the highest level of protection for the organization. Key Responsibilities: - Design and e...

Posted 2 months ago

AI Match Score
Apply

4.0 - 9.0 years

4 - 9 Lacs

Mumbai, Maharashtra, India

On-site

KEY ACCOUNTABILITIES Monitor and analyze user activities for signs of potential insider threats. Develop and maintain threat detection tools, techniques, and procedures. Utilize threat intelligence platforms to gather, analyze, and disseminate relevant information. Perform advanced analysis of insider threat and DLP alerts across various egress channels in on-premise and cloud environments, prioritizing threats using available tools. Investigate and document event/alert patterns, collaborating with Cyber Defence, Legal, Privacy, and HR teams during incidents as necessary. Create detailed reports on security incidents, investigations, and mitigation efforts. Contribute to refining detection t...

Posted 3 months ago

AI Match Score
Apply

3.0 - 8.0 years

8 - 18 Lacs

pune, bengaluru, delhi / ncr

Hybrid

4-7 years Experience 1. Training Content Creation: Work with colleagues to design and produce phishing simulation exercises using Microsoft Attack Simulator. Ensure that the training content is easy to understand, aligned to the Virgin tone of voice and accessible to employees at all levels. 2. Take end to end ownership of phishing reporting ensuring that processes and metrics are working effectively, and changes are managed to ensure reporting processes are kept clear and simple for colleagues. 3. Champion simple and intuitive phishing reporting processes to encourage reporting and avoid disruption to productivity. 4. Build colleague confidence in recognising and responding to phishing thre...

Posted Date not available

AI Match Score
Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies