The Cyber Forensic Specialist will operate in a secure lab environment equipped with workstations, servers, mobile devices (iOS/Android), IoT devices, and other internet-connected endpoints. The environment supports both live and post-incident Required Candidate profile Essential Certifications(any one of the following) GIAC Certified Forensic Examiner(GCFE) Certified Computer Examiner(CCE) GIAC Certified Forensic Analyst(GCFA) Computer Hacking Forensic Investigation
Advanced knowledge in handling security incidents and leading investigations. Proficiency in managing and optimizing SOC operations. Experience in implementing security protocols and policies. Expertise in Malware Reverse Engineering, Required Candidate profile Certified Information Systems Security Professional (CISSP). Certified Information Security Manager (CISM). GIAC Certified Enterprise Defender (GCED). Certified Information Security Auditor (CISA),
SIEM tools to identify potential threats;VAPT tools, Incident Handling, Forensic Analysis;CEH CSA;CySA+;CISA;incidents and breaches; operating systems, network devices, and security devices.Familiarity with Security Information and Event Management
Experience 3 to 5 years in handling projects, hands-on experience with any of the project management tools like Basecamp, Jira, and Microsoft Project. Good in documentation, preparing project tracker & following up with respective stakeholders for timely updates. Presentation skills are mandatory.
2-3 years of experience in IT security monitoring, detecting, and escalating security incidents, and Patch management. Familiarity with one of the SIEM platforms (Fortinet, LogRhythm, Azure Sentinel, CrowdStrike) Basic knowledge of endpoint protection tools like CrowdStrike, Symantec, Defender for Endpoint. Exposure to firewalls, IDS/IPS, and DLP solutions, Understanding of TCP/IP, DNS, DHCP, NAT, and VPN. Familiar with the OSI model, port numbers, common protocols, and basic Log Analysis, Threat Intelligence. Awareness of Common attack types: phishing, malware, brute-force, DoS, MITRE ATT& Teamwork: Ability to coordinate with L2/L3 teams or network/security admins. Assist in basic forensic data collection if needed.
Installing and configuring new software and hardware Conducting security audits and vulnerability assessments Maintaining software licenses and hardware inventory Monitoring system performance and making recommendations for improvements Responding to user inquiries and resolving technical issues Collaborating with other members of the IT team to develop and implement new technologies Key skills and qualifications required for a Desktop Engineer To become a desktop engineer, one must possess a specific set of skills and qualifications: A bachelor s degree in computer science or a related technical field Experience in managing Windows and Mac OS Familiarity with desktop support software and tools Knowledge of network protocols and security systems Strong problem-solving skills Excellent communication skills to interact with users and other IT professionals Ability to work well under pressure
Act as a strategic partner to business leaders, offering guidance and support on a variety of HR initiatives. Provide coaching and advice to managers and employees on HR-related topics such as timesheet management, performance management Required Candidate profile We are looking for a highly skilled and experienced Human Resources Business Partner (HRBP) to join our team. The ideal candidate will have a solid grasp of HR best practices, excellent communication
Distributed Denial of Services, Network next-generation Firewall, SSL Offloader, (NIPS), (APT), (WAF), Antivirus tools, (EDR), Server security solution, Vulnerability Assessment tools, Forensic Analysis, (VAPT), SIEM, Patch Management etc.
(DDoS), Network next-generation Firewall, SSL Offloader, (NIPS), Anti Advanced Persistent Threat (APT), (WAF), (EDR), Server security solution, Incident Handling, Forensic Analysis, (VAPT), SIEM, Patch Management etc
• Knowledge of operating systems, network devices, and security devices • Understanding of networking protocols and cybersecurity concepts • Familiarity with Security Information and Event Management (SIEM) tools Required Candidate profile Familiarity with VAPT tools, Incident Handling, and Forensic Analysis • Hands-on expertise in log analysis, monitoring, detecting, and investigating security incidents and breaches
threat hunting and intelligence analysis tools,malware analysis and threat detection, SOC operations, Malware Reverse Engineering, Exploit Development, SIEM, IDS/IPS, and other security tools, CTIA, GCIA,GCIH, OSCP+,GCTI Required Candidate profile malware, ransomware, application & network layer attacks,shell, Python, and PowerShell SIEM platform (e.g., Splunk, Elastic Stack) SQL queries,Threat Hunter & Threat Intelligence Analyst
(DDoS), Network next-generation Firewall, SSL Offloader, (NIPS), (APT), (WAF), Antivirus tools, (EDR), Server security solution, Vulnerability Assessment tools, Incident Handling, Forensic Analysis, (VAPT), SIEM, Patch Management etc.
Experience in monitoring and analyzing incidents on DLP solution. Strong knowledge of various data security tool & techniques such as DLP, DRM (e.g. Symantec DLP,CASB, Zscaler, Seclore etc.) Hands-on experience with implementation of DLP Required Candidate profile Ability to handle, resolve data security incidents minimizing impact. Proficient in preparation of reports, dashboards and documentation. Experience in maintaining various metrics and SLAs.
Have good devops experience along with post production live support. Skills-Kubernetes, Terraform, Azure, Grafana, Bash or shell scripting. Only immediate joiners are preferred.
maintainable code using languages like Python, Java, C++, JavaScript,IPS,DDoS,GitLab CI, Travis CI,Python, Bash, PowerShell, Ruby, Go,Ansible, Puppet,firewalls, VPNs
Project Planning, Delivery Oversight, InfoSec Governance, Client Handling,b) Firewalls - CISCO ASA, Palo Alto, WAF : F5 and Barracuda, SSL loaders and load balancers,F5, Radware, DDOS, IPS, IDS, APT, SIEM, VAPT, OS Hardening,SIEM, VAPT,OS Hardening
Install and Configure Databases, Environment Setup,Database Design,Monitor Performance,Optimization Techniques,Backup Strategy,Disaster Recovery Planning,Restore and Recovery,Access Control,Patch Management
Hiring GRC Consultant : MNC Client : Mumbai (Powai Location). Required Experience: 3+Years Notice Period: Immediate -1week Skills Required: Strong in GRC (Governance, Risk, and Compliance). Strong in ISO 27001, NIST, and Indian regulatory frameworks.
Looking for build and Release engineer with AWS, Python, Groovy, Jenkins,CI/CD. Looking for who can join in 15-20 days.
Incident handling, forensic analysis, and VAPT SIEM tools cybersecurity frameworks Log analysis, monitoring, detecting and investigating security incidents and breaches. CEH,CSA,CompTIA Security+,GCIH,security incidents
FIND ON MAP