Job Title: Email Security Configuring Proofpoint Specialist Location: Bengaluru Job Type: Contract (6-12 months) Mode of Work: Work from Office, Bengaluru About the Role: We're seeking an experienced Email Security Configuring Proofpoint Specialist to join our team in Bengaluru. As a seasoned security professional, you'll be responsible for configuring and managing email security solutions using Proofpoint, ensuring the security and integrity of our email infrastructure. Key Responsibilities: - Configure and manage Proofpoint modules, including email protection, targeted attack protection, and threat protection - Define and maintain policies for inbound/outbound filtering, spam protection, URL defense, and attachment protection - Troubleshoot email security issues and respond to operational tickets - Perform phishing email analysis and implement countermeasures - Collaborate with vendors for platform-related issues and ensure timely resolution - Maintain standard operating procedures and documentation - Ensure operational excellence and adhere to SLAs Must-Haves: - 5-8 years of experience in email security and Proofpoint administration - Strong understanding of SMTP, SPF, DKIM, DMARC, and MX records - Experience with email MTAs, spam filters, and rule configuration - Hands-on experience with Proofpoint email security solutions - Good knowledge of secure email gateways and ITSM tools like Remedy and ServiceNow What We Offer: - Opportunity to work with a leading organization - Collaborative and dynamic work environment - Flexible work hours with a 24*7 rotational roster How to Apply: If you're passionate about email security and have experience with Proofpoint, we'd love to hear from you! Please send me Details to emails careers@mainaviglobal.com Full Name : Email Id: Mobile Number: Skills : Total Experience: Relevant Experience: Current Location Preferred Location: WFO 5 days or you ok (Y/N) Bangalore Location or you ok (Y/N) Interview will be Virtual Interview Job Type: Contractual / Temporary Contract length: 1 month Pay: ₹539,614.83 - ₹1,868,551.91 per year Work Location: In person
Position :- C&S Infrastructure Security Engineer – Windows server OS and Mac OS Locations: Bengaluru Mandatory Skills: GCP Notice Period : Immedite to 15 Days Experience: 6 to 8 Years Budget :As per company Norms Job Description: Minimum experience of 6 years in engineering & operations of security & compliance of cloud systems is a must-have Good knowledge of Cloud Services (like Azure servers, GCP servers) Good knowledge of Operating Systems (Windows servers & clients, Linux servers & clients, Mac clients) Good knowledge of Endpoint Security Tools functionalities and structure Good knowledge of networking concept (Security Groups, NACL's, routing, switching, proxy, firewall) Understanding of common cloud IT issues Understanding of MITRE ATTCK framework and being able to drive design of security controls from the various threats,Actors and TTP is a must-have Understanding of Waterfall and Agile processes and principles Good communication and presentation skills Preferred: Previous working experience as a Cloud Security Engineer Understanding of endpoint security controls, forensics, risk assessment and security metrics Solid understanding of Cloud, Windows & Linux security Please send me Details to emails contact@vedaitech.com Full Name : Email Id: Mobile Number: Skills : Total Experience: Relevant Experience: GCP Experience how much Current Location Preferred Location: Preferred Location: GCP Experience how much Current Location WFO 5 days or you ok (Y/N) Bangalore Location or you ok (Y/N) Interview will be Virtual Interview For interview F2F available mentioned Client Location Y/N ; Job Type: Contractual / Temporary Contract length: 12 months Pay: ₹432,477.54 - ₹1,662,644.98 per year Work Location: In person
Role Overview: As an Android Reverse Engineer (Mid/Senior Level), you will be responsible for dissecting Android apps and SDKs to uncover vulnerabilities and provide actionable insights to strengthen mobile ecosystem security. Your role will involve deep hands-on experience in reverse engineering, malware analysis, static/dynamic analysis, and tool development. You must possess an analytical mindset and curiosity for understanding the complexities of mobile software below the surface. Key Responsibilities: - Perform in-depth static and dynamic analysis of Android applications and SDKs, including obfuscated and packed binaries. - Utilize tools such as Ghidra, Jadx, IDA Pro, Frida, Burp Suite, Objection, and Xposed for reverse engineering APKs and native libraries (ELF binaries). - Analyze app logic, SDK integrations, and network behavior to identify data leaks, malicious code, privacy violations, and potential exploitation vectors. - Assess apps for compliance with Google Play policies and security best practices. - Develop and maintain custom tools and scripts for automated analysis, unpacking, and threat detection. - Write signatures (YARA, Sigma) and contribute to internal detection frameworks. - Monitor emerging malware families, exploitation techniques, and Android threat trends. - Collaborate with researchers and developers to report findings and remediation measures. - Continuously learn and stay updated on Android OS internals and security evolutions. Qualification Required: - 4 to 7 years of hands-on experience in Android reverse engineering or mobile malware analysis. - Expert knowledge of Android internals, AOSP, app architecture, and security model. - Strong experience with Jadx, Ghidra, IDA Pro, Frida, Objection, MobSF. - Familiarity with ELF binary analysis and ARM/ARM64 assembly. - Proficiency in Java, Kotlin, C/C++, JavaScript, and ideally Flutter/Dart. - Strong understanding of network analysis, interception proxies (Burp, mitmproxy), and cryptography fundamentals. - Knowledge of malware techniques, exploit methods, and mobile security frameworks (OWASP MASVS, MSTG). - Ability to write YARA rules and heuristic signatures. - Participation in CTFs or bug bounty programs related to mobile security. - Familiarity with Google Play policies, Red/Blue Team operations, or forensics. - Threat Intelligence: VirusTotal, Hybrid Analysis, MITRE ATT&CK, Malpedia.,
As an Android Reverse Engineer at our company, you will play a crucial role in enhancing the security of the mobile ecosystem by leveraging your expertise in Android internals, reverse engineering, and mobile application security. Your responsibilities will include: - Performing in-depth static and dynamic analysis of Android applications and SDKs, including obfuscated and packed binaries. - Utilizing tools like Ghidra, Jadx, IDA Pro, Frida, Burp Suite, Objection, and Xposed for reverse engineering APKs and native libraries (ELF binaries). - Analyzing app logic, SDK integrations, and network behavior to identify data leaks, malicious code, privacy violations, and potential exploitation vectors. - Assessing apps for compliance with Google Play policies and security best practices. You will also be expected to: - Develop and maintain custom tools and scripts for automated analysis, unpacking, and threat detection. - Write signatures (YARA, Sigma) and contribute to internal detection frameworks. - Monitor emerging malware families, exploitation techniques, and Android threat trends. - Collaborate with researchers and developers to report findings and remediation measures. - Continuously learn and stay updated on Android OS internals and security evolutions. Qualifications required for this role: - 4 to 7 years of hands-on experience in Android reverse engineering or mobile malware analysis. - Expert knowledge of Android internals, AOSP, app architecture, and security model. - Strong experience with Jadx, Ghidra, IDA Pro, Frida, Objection, MobSF. - Familiarity with ELF binary analysis and ARM/ARM64 assembly. - Proficiency in Java, Kotlin, C/C++, JavaScript, and ideally Flutter/Dart. - Strong understanding of network analysis, interception proxies (Burp, mitmproxy), and cryptography fundamentals. - Knowledge of malware techniques, exploit methods, and mobile security frameworks (OWASP MASVS, MSTG). - Ability to write YARA rules and heuristic signatures. - Participation in CTFs or bug bounty programs related to mobile security. - Familiarity with Google Play policies, Red/Blue Team operations, or forensics. - Threat Intelligence knowledge including VirusTotal, Hybrid Analysis, MITRE ATT&CK, Malpedia. This is a contract-based job opportunity with work location being in person. As an Android Reverse Engineer at our company, you will play a crucial role in enhancing the security of the mobile ecosystem by leveraging your expertise in Android internals, reverse engineering, and mobile application security. Your responsibilities will include: - Performing in-depth static and dynamic analysis of Android applications and SDKs, including obfuscated and packed binaries. - Utilizing tools like Ghidra, Jadx, IDA Pro, Frida, Burp Suite, Objection, and Xposed for reverse engineering APKs and native libraries (ELF binaries). - Analyzing app logic, SDK integrations, and network behavior to identify data leaks, malicious code, privacy violations, and potential exploitation vectors. - Assessing apps for compliance with Google Play policies and security best practices. You will also be expected to: - Develop and maintain custom tools and scripts for automated analysis, unpacking, and threat detection. - Write signatures (YARA, Sigma) and contribute to internal detection frameworks. - Monitor emerging malware families, exploitation techniques, and Android threat trends. - Collaborate with researchers and developers to report findings and remediation measures. - Continuously learn and stay updated on Android OS internals and security evolutions. Qualifications required for this role: - 4 to 7 years of hands-on experience in Android reverse engineering or mobile malware analysis. - Expert knowledge of Android internals, AOSP, app architecture, and security model. - Strong experience with Jadx, Ghidra, IDA Pro, Frida, Objection, MobSF. - Familiarity with ELF binary analysis and ARM/ARM64 assembly. - Proficiency in Java, Kotlin, C/C++, JavaScript, and ideally Flutter/Dart. - Strong understanding of network analysis, interception proxies (Burp, mitmproxy), and cryptography fundamentals. - Knowledge of malware techniques, exploit methods, and mobile security frameworks (OWASP MASVS, MSTG). - Ability to write YARA rules and heuristic signatures. - Participation in CTFs or bug bounty programs related to mobile security. - Familiarity with Google Play policies, Red/Blue Team operations, or forensics. - Threat Intelligence knowledge including VirusTotal, Hybrid Analysis, MITRE ATT&CK, Malpedia. This is a contract-based job opportunity with work location being in person.
As a C&S Infrastructure Security Engineer, you will need to have a minimum of 6 years of experience in engineering & operations of security & compliance of cloud systems. Your responsibilities will include: - Demonstrating good knowledge of Cloud Services such as Azure servers and GCP servers - Exhibiting good knowledge of Operating Systems including Windows servers & clients, Linux servers & clients, and Mac clients - Understanding the functionalities and structure of Endpoint Security Tools - Possessing good knowledge of networking concepts like Security Groups, NACL's, routing, switching, proxy, and firewall - Having an understanding of common cloud IT issues - Familiarity with the MITRE ATTCK framework to drive the design of security controls from various threats, Actors, and TTP - Understanding of both Waterfall and Agile processes and principles - Demonstrating good communication and presentation skills Preferred qualifications include: - Previous working experience as a Cloud Security Engineer - Understanding of endpoint security controls, forensics, risk assessment, and security metrics - Solid understanding of Cloud, Windows & Linux security Please note that the interview process will be virtual, and there is an option for a face-to-face interview at the client's location. This is a contractual/temporary position with a contract length of 12 months. The work location is in person at Bengaluru. If you meet the above qualifications and are interested in this position, please send your details to contact@vedaitech.com including: - Full Name - Email Id - Mobile Number - Skills - Total Experience - Relevant Experience - GCP Experience - Current Location - Preferred Location - WFO 5 days or you ok (Y/N) - Bangalore Location or you ok (Y/N),