Get alerts for new jobs matching your selected skills, preferred locations, and experience range. Manage Job Alerts
3.0 - 7.0 years
16 - 20 Lacs
gurugram
Work from Office
We are seeking a skilled IT Technician to join our Cyber Security team in India. The successful candidate will be responsible for design and test new Cyber Security portfolio elements, ensuring robust and secure solutions and tools to guarantee the cybersecurity of our installed plant base (brownfield) in accordance with the latest standards and guidelines (NIS2, NERC CIP, etc.) and customers demands. Working with technical experts from other business units, the aim is to ensure that these solutions meet the latest security standards and address potential threats in the IT/OT environment. Especially for our installed systems (brownfield), new cybersecurity technologies need to be assessed, and proof-of-concepts organized/created. As part of a hybrid working model and due to the nature of the role, you will need to travel frequently to Germany. A Snapshot of your Day How Youll Make an Impact (responsibilities of role) Planning, setup, operation and maintenance of an IT/OT test environment for the simulation of production systems. With a special focus on servers, firewalls, routers, switches, etc. and corresponding users and operating software Testing and evaluation of new cybersecurity technologies (HW and SW) for our HVDC/FACTS systems and their implementation in case of positive evaluation Ensuring protection against cyberattacks by implementing the latest technologies Support in the automation and optimization of production processes Collaborate with the Control & Automation team to integrate new technologies Preparation of technical documentation, installation instructions and user manuals Provide technical expertise for bidding activities, present security concepts, and assist in creating customer-centric solutions What You Bring Degree in network/communication technology, computer science or IT security, alternatively a relevant apprenticeship with several years of professional experience Sound knowledge of IT administration, e.g. network security, Windows Server, Active Directory, WSUS, virtualization, firewalls, remote access solutions, etc. Preferably several years of experience in IT/OT cybersecurity in the field of critical infrastructures Desirable, experience in automation technology. Familiarity with national and international IT security standards in an industrial environment (e.g. BDEW, NERC-CIP, IEC 62443) Very good knowledge of English (German will be an added advantage) High level of commitment, ability to work in a team and willingness to solve technical challenges independently, pragmatically and purposefully
Posted 2 days ago
3.0 - 4.0 years
7 - 11 Lacs
chennai
Hybrid
We are looking for a Penetration Tester. This position is available for Chennai Location. Youll make a difference by: Having experience in performing advanced penetration testing on networks, web & mobile applications, and systems. Having ability to Identify vulnerabilities, exploit weaknesses, and assess the security posture of various assets. Having ability to develop and maintain automated testing tools and scripts. Creating detailed reports outlining findings, risks, and recommended actions. Having Extensive experience in penetration testing, vulnerability assessment, and ethical hacking. Having Proficiency with penetration testing tools such as Metasploit, Burp Suite, Nmap, Nessus, and others. Strong understanding of network protocols, web and mobile applications, and operating systems. Maintaining documentation of testing methodologies, tools, and processes. Knowledge of scripting and programming languages (e.g., Python, Bash). Youll win us over by: Having An engineering degree B.E/B.Tech/M.E/M.Tech with good academic record. 3-4 Years of relevant experience as Penetration Tester. Having Good command over English language (spoken & written) is non-negotiable. Working closely with business partners to understand their needs and translate them into technical requirements. Communicating findings, risks, and remediation strategies to both technical and non-technical stakeholders. Foster strong relationships with business units to ensure security measures align with business goals. Certification Preferred: Entry level certifications like CEH, eJPT, eWPT. Other certifications like eWPTX, OSCP is an advantage. Well support you with: Hybrid working Opportunities. Diverse and inclusive culture. Great variety of learning & development opportunities.
Posted 2 days ago
5.0 - 10.0 years
5 - 15 Lacs
bengaluru
Work from Office
Description: • Create execution plan • Carry out design and architecture phase • Validate implementation of the secure appliance • Integrate security measures with the edge devices • Validation of the implementation with stakeholders • Pen testing as required Requirements: • Creating a secure device which interfaces with all devices and handles all outbound and inbound communications. • Facilitates hosting of customer specific security requirements like AV, end point monitoring agents etc. • Understand requirements from Alcon and it’s end customers • Create execution plan • Carry out design and architecture phase • Validate implementation of the secure appliance • Integrate security measures with the edge devices • Validation of the implementation with stakeholders • Pen testing as required Job Responsibilities: • Understand requirements from Client and it’s end customers • Create execution plan • Carry out design and architecture phase • Validate implementation of the secure appliance • Integrate security measures with the edge devices • Validation of the implementation with stakeholders • Pen testing as required What We Offer: Exciting Projects: We focus on industries like High-Tech, communication, media, healthcare, retail and telecom. Our customer list is full of fantastic global brands and leaders who love what we build for them. Collaborative Environment: You Can expand your skills by collaborating with a diverse team of highly talented people in an open, laidback environment — or even abroad in one of our global centers or client facilities! Work-Life Balance: GlobalLogic prioritizes work-life balance, which is why we offer flexible work schedules, opportunities to work from home, and paid time off and holidays. Professional Development: Our dedicated Learning & Development team regularly organizes Communication skills training(GL Vantage, Toast Master),Stress Management program, professional certifications, and technical and soft skill trainings. Excellent Benefits: We provide our employees with competitive salaries, family medical insurance, Group Term Life Insurance, Group Personal Accident Insurance , NPS(National Pension Scheme ), Periodic health awareness program, extended maternity leave, annual performance bonuses, and referral bonuses. Fun Perks: We want you to love where you work, which is why we host sports events, cultural activities, offer food on subsidies rates, Corporate parties. Our vibrant offices also include dedicated GL Zones, rooftop decks and GL Club where you can drink coffee or tea with your colleagues over a game of table and offer discounts for popular stores and restaurants!
Posted 2 days ago
7.0 - 11.0 years
16 - 20 Lacs
bengaluru
Work from Office
This Position reports to: IS Service Owner You will be mainly accountable for: Ensures that the IS solutions/services provides the required functionality, meet the expectations of business and are reliable, maintainable, compliant, and auditable. Manages/monitors software development and analyses data to continually improve solution. Collaborates with and contributes to project setup and delivery and to service operations optimization. Accountable to approve, sign-off, and build any solution to be implemented on ABB production environment, within the respective service line, ensuring required quality and safety standards. Defines the technical IS solution and ensures alignment with other modules and surrounding IS applications through cooperation and collaboration among IS solution architects and IS delivery units. Engages in requirement engineering to decide the requirements to be covered by available standard functionalities. Supports the validation and prioritization of incoming business demand, in collaboration with the relevant IS Service Owner and/or IS Lead Architect. Reviews and signs off the functional and technical use-case specifications. Acts as the escalation point for solution architecture related issues. Contributes to IS problem and incident management in managing the ticket volume by identifying and eliminating the reoccurring defects. Qualifications for the role Bachelors or Master degree in Computer Science stream Certifications required- ITIL V4, Any recognized security or Architecture certification Certifications preferred- CISSP, CSSLP, TOGAF, Network+, CCNP, Security+, Certified Cloud Solutions Architect (Azure/AWS/ GCP), ISSAP Taking End-to-End Accountability of Project Deliverable in a multi-stakeholder environment where conflicting priorities may exist. Analytical skills for monitoring the market and industry trends for security threats and technologies. Documentation skills for creating business cases including clearly defined problem statement, impact and business value. Knowledge of various technologies and frameworks.
Posted 3 days ago
4.0 - 8.0 years
20 - 25 Lacs
bengaluru
Work from Office
This Position reports to: BU Digital Leader Your role and responsibilities: In this role, you will have the opportunity to define and implement ABBs cybersecurity strategy aligned with the overall strategy and business needs. Each day, you will manage cybersecurity risks that could affect the ABB brand and customer base for all ABB offerings, in a cost-effective way. You will also showcase your expertise by collaborating with businesses to protect and grow revenue by effectively addressing customer cybersecurity expectations and actively driving cybersecurity opportunities and demand. The work model for the role is: #LI-Onsite This role is contributing to the Motion Business in Service division in Bangalore, India. You will be mainly accountable for: Be accountable for identifying, reporting, and mitigating cybersecurity risks within the division, including impact assessments on financial, safety, and operational aspects. Support and influence the execution of ABBs cybersecurity strategy within the Motion Services division, aligning with group-level initiatives and standards. Represent the division in the Group Cybersecurity Council, contributing to the development of global cybersecurity policies, standards, and guidelines. Provide cybersecurity requirements for offerings, conducts threat modeling and assessments, and ensures compliance with relevant regulations and certifications. Act as a cybersecurity expert for customers, guides product managers, and drives internal awareness through training and assessments. Maintain awareness of emerging cybersecurity trends and technologies, ensuring the division stays ahead of evolving threats and market expectations. Qualifications for the role: B.E., B.Sc. or M.Sc. in Cybersecurity, computer science, communications and information technology, mathematics or a related field Excellent interpersonal communication skills in English Strong command and several years experience in IT Cybersecurity operational topics for cloud-based systems In-depth knowledge of existing and evolving regulations and security standards for IoT based offering or industrial offering in general Independent, cooperative and emphatic with colleagues, first leadership experience Knowledge of tools and processes around SecDevOps, standards like CRA, NIS-2, IEC62443 and SOC-2 Knowledge of threat modeling, security monitoring tools, application of cryptography, Cybersecurity testing and forensics is a plus
Posted 3 days ago
6.0 - 11.0 years
8 - 14 Lacs
hyderabad
Work from Office
Experience 6+ Years Skill SIEM Notice Period Immediate Employment Type Contract Work Mode WFO/Hybrid 6 years of SIEM, or SOC experience Strong communication, written, and verbal skills Experience with writing/creation of formal documentation such as reports, slide decks, and architecture diagrams Customer service/support experience Ability to conduct in-depth forensic analytical studies and investigations Role Preferences Splunk certification Coding or scripting experience Strong knowledge of Unix/Linux Security+, GIAC, SSGB, ITIL, or similar certification Working knowledge of applicable industry controls such as NIST 800-536 or Mitre Attack Framework
Posted 4 days ago
3.0 - 7.0 years
7 - 11 Lacs
bengaluru
Work from Office
Will be working on Application security testing Skills. Strategize and plan static and dynamic application security testing (SAST/DAST / SCA) tools. Will be responsible for Secure Coding Practices. Required education Bachelor's Degree Preferred education Master's Degree Required technical and professional expertise BE / B Tech in any stream, M.Sc. (Computer Science/IT) / M.C.A, with Minimum 5 plus years of experience Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST/ SCA) tools. Secure Coding Practices: Knowledge of secure coding standards (e.g., OWASP Top Ten) and experience in reviewing code for security vulnerabilities. Threat Modelling: Ability to conduct threat modelling sessions to identify and mitigate security risks Preferred technical and professional experience Vulnerability Assessment: Experience in conducting vulnerability assessments and penetration testing Application Security Testing: Experience with static and dynamic application security testing (SAST/DAST) tools. Security Tools: Proficiency in using security tools like Burp Suite, Nessus, or Fortify.
Posted 4 days ago
4.0 - 9.0 years
8 - 12 Lacs
udaipur
Work from Office
Conduct vulnerability assessments and penetration testing on web applications, mobile apps, and network infrastructure. Analyze scan results, identify security gaps, and provide actionable remediation plans. Collaborate with development, network. Required Candidate profile Relevant exp in VAPT, ethical hacking,security testing.Sound knowledge of network protocols, web technologies, operating systems, security best practices. Certified Ethical Hacker (CEH) certification
Posted 5 days ago
4.0 - 8.0 years
0 Lacs
hyderabad, telangana
On-site
As a Penetration Tester, you will be responsible for conducting and coordinating comprehensive Attack Surface Discovery, Penetration tests, and Cloud on system and network levels using advanced ethical hacking techniques. Your role will involve Application Penetration Testing (Browser-based, API, Mobile, IoT), Threat Modeling, and Source Code Review. You will perform penetration testing on web applications and APIs to identify, assess, and report vulnerabilities. Additionally, you will conduct red team exercises to identify weaknesses in clients" infrastructure and provide remediation solutions. You will be required to organize and deliver technical security operational briefings for both technical and non-technical audiences. Setting scope, objectives, and timelines for penetration testing engagements, leveraging data to create useful metrics, and performing dynamic application security testing (DAST) scans are also part of your responsibilities. Furthermore, you will play a critical role in building an AppSec program with a wide scope and impact by researching open-source emerging technologies and developing required frameworks for red team exercises. To qualify for this role, you should have a Bachelor's degree in Engineering or a closely related field with certifications like OSCP, CEH, OSCE, OSWE, GPEN, GCIH, GWAPT, or GXPN being desirable. A total of 4+ years of experience is required, along with knowledge and experience in offensive security certifications, secure development life cycle, common vulnerabilities, application attack vectors, security testing processes, and network security protocols. You should have familiarity with common threat tactics and tools such as Nmap, Metasploit, Kali Linux, Burp Suite Pro, CobaltStrike, App Detective, and Web Inspect. Experience in cloud service penetration testing, mobile platform penetration testing, and microservices testing will be beneficial. Additionally, you should possess the ability to find and exploit bugs in various programming languages and cloud platforms. Personal attributes required for this role include being a self-starter, quick learner, excellent analytical and communication skills, self-motivated, detail-oriented, and able to effectively prioritize tasks in a high-pressure environment. Strong interpersonal skills to collaborate cross-functionally across the organization are essential. This is a full-time contractual/temporary position with a duration of 6 months, requiring work to be conducted in person at the Hyderabad location. If you meet the qualifications and are interested in this opportunity, please contact the employer at +91 9966773665.,
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
hyderabad, telangana
On-site
As an experienced offline Faculty for Cyber Security at Naresh IT KPHB & Ameerpet branches, your primary responsibility will be to deliver high-quality classroom training in Cyber Security, Ethical Hacking, Networking, Cyber Forensics, and related areas. You should possess a strong understanding and expertise in Cyber Security concepts to effectively impart knowledge to students. The ideal candidate must have a rich background in conducting classroom training sessions and be proficient in Cyber Security practices. A minimum of 3 years of experience in software training is preferred for this role. Your expertise will play a crucial role in shaping the skill sets of aspiring professionals in the field of Cyber Security. This is a full-time position based in Hyderabad, Telangana, requiring your physical presence at the training center. If you are passionate about sharing your knowledge and skills in Cyber Security with enthusiastic learners, we welcome you to join our team at Naresh IT and contribute to the growth and development of our students.,
Posted 1 week ago
2.0 - 6.0 years
0 Lacs
haryana
On-site
As a Junior Cybersecurity Engineer at Appzlogic, you will be responsible for leveraging your expertise in cybersecurity to protect our systems and data. With 2-5 years of experience in the field, you will operate at a mid-level capacity, conducting Penetration Testing, SAST, VAPT, and Ethical Hacking to identify and address vulnerabilities. Your proficiency in Networking Security, Cloud Security, Security Frameworks, Threat Modeling, and API Testing will be crucial in safeguarding our organization against cyber threats. In this full-time, permanent role based in Gurugram, you will be expected to work in person at our office. We are looking for candidates who can join immediately or within 15-20 days. Your experience of at least 3 years in Cybersecurity, particularly in Gurugram, Haryana, will be highly valued. Additionally, you will be required to provide information on your notice period. As part of our team, you will enjoy benefits including health insurance and Provident Fund. If you are passionate about cybersecurity and eager to contribute to a dynamic team, we look forward to receiving your application.,
Posted 1 week ago
2.0 - 6.0 years
0 Lacs
udaipur, rajasthan
On-site
You will be working as a part of the IS department, requiring 2 to 5 years of experience, on a full-time basis with the flexibility to work from anywhere. Your primary responsibilities will include conducting vulnerability assessments and penetration testing on various platforms such as web applications, mobile apps, and network infrastructure. You will be expected to analyze scan results, identify security gaps, and develop actionable remediation plans. Collaboration with development, network, and infrastructure teams will be essential to validate and verify fixes. To excel in this role, you must possess a Bachelor's degree in Computer Science, Information Security, or a related field. Additionally, you should have at least 2 years of relevant experience in VAPT, ethical hacking, or security testing. Proficiency in network protocols, web technologies, operating systems, and security best practices is crucial. Holding certifications like Certified Ethical Hacker (CEH) will be advantageous. You will be responsible for keeping VAPT tools and scripts up to date to ensure effective testing. Detailed reporting following industry standards such as OWASP and CVSS will also be part of your duties. Staying informed about the latest vulnerabilities, threats, attack vectors, and security trends is imperative for this role. Moreover, compliance with internal security policies and external regulatory requirements like ISO 27001 and PCI-DSS will be expected from you. Your involvement in red teaming/ethical hacking initiatives and providing support during security audits, both internal and external, will be required. Additionally, you will play a role in enhancing standard operating procedures (SOPs), testing methodologies, and reporting templates. Overall, your role will be critical in maintaining the security posture of the organization by conducting thorough security testing, identifying vulnerabilities, and recommending appropriate remediation measures.,
Posted 1 week ago
2.0 - 6.0 years
0 Lacs
delhi
On-site
As a Security Engineer VAPT, you will be responsible for conducting comprehensive security assessments, identifying vulnerabilities, and implementing effective remediation strategies. Leveraging your expertise in penetration testing and ethical hacking, you will play a key role in enhancing the security posture of our clients" systems and networks. This position offers an exciting opportunity to work on challenging projects, collaborate with talented professionals, and contribute to the advancement of cybersecurity practices. You will perform end-to-end Vulnerability Assessment and Penetration Testing (VAPT) for clients" IT infrastructure, applications, and networks. Conduct thorough security assessments using industry-standard tools and methodologies, including but not limited to, Nmap, Nessus, Metasploit, Burp Suite, and OWASP. Identify and exploit security vulnerabilities to assess the potential impact on clients" systems and data. Prepare detailed assessment reports outlining findings, risk levels, and recommended remediation measures. Collaborate with clients" IT teams to prioritize and address identified security issues in a timely manner. Develop and implement custom scripts or tools to enhance testing capabilities and automate repetitive tasks. Stay abreast of emerging security threats, vulnerabilities, and industry best practices to continually improve testing methodologies. Provide guidance and mentorship to junior security engineers, fostering a culture of knowledge sharing and skill development within the team. Requirements include a Bachelor's degree in Computer Science, Information Technology, or related field. 2+ years of experience in cybersecurity, with a focus on Vulnerability Assessment and Penetration Testing. Proficiency in using tools such as Nmap, Nessus, Metasploit, Burp Suite, and OWASP. Hands-on experience with various operating systems, including Windows, Linux, and Unix. Strong understanding of network protocols, web application architecture, and common security Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or similar certifications preferred. Excellent analytical skills and attention to detail, with the ability to prioritize and manage multiple tasks effectively. Effective communication skills, both verbal and written, with the ability to convey technical concepts to non-technical stakeholders. Proven track record of delivering high-quality security assessments and actionable recommendations.,
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
ongole, andhra pradesh
On-site
Are you passionate about cybersecurity and eager to share your expertise We're looking for a knowledgeable and motivated Cybersecurity Mentor to guide aspiring professionals through an intensive 2-month training program. As a Cybersecurity Mentor, you will be responsible for designing and delivering engaging lessons, supervising practical labs, and mentoring students throughout their learning journey. This is a part-time/freelance opportunity perfect for industry experts looking to give back and shape the next generation of cybersecurity professionals. Key Responsibilities: - Conduct 30 comprehensive classes over 2 months (Monday to Friday, 4 classes per week, between 6 PM - 10 PM) - Develop and deliver curriculum covering core cybersecurity topics (Network Security, Cryptography, Ethical Hacking, Web Security, etc.) - Supervise and evaluate practical labs and student projects - Guide students on two major projects and provide mentorship and feedback - Facilitate Q&A sessions and industry insights to enhance learning experience Qualifications: - Proven experience in cybersecurity (minimum 3+ years) in roles such as Security Analyst, Ethical Hacker, Penetration Tester, or similar - Strong knowledge of network security, cryptography, cloud security, and incident response - Prior experience in teaching, mentoring, or training is highly preferred - Excellent communication and presentation skills - Ability to work independently and motivate students What We Offer: - Flexible part-time engagement - Opportunity to influence and inspire future cybersecurity professionals - Competitive honorarium / freelance engagement Interested Apply with your CV and a brief note on your teaching/training experience or send your inquiries to 8712007153,
Posted 1 week ago
3.0 - 7.0 years
0 Lacs
haryana
On-site
We are looking for a certified ethical hacker to assist in enhancing the security of our network against potential threats. Your main responsibility will involve evaluating our company's network, servers, and overall infrastructure to discover any vulnerabilities that may exist. As a certified ethical hacker, you must possess the knowledge and expertise in utilizing various network and security tools, along with a high-level comprehension of computer and network security principles. This includes a deep understanding of encryption and cryptography. Responsibilities Your duties as a certified professional ethical hacker will encompass the following: - Conducting ethical hacking and penetration testing - Performing vulnerability assessments - Analyzing malware - Collaborating with other penetration testers and information security analysts - Ensuring web application security - Executing social engineering tactics - Enhancing database security - Implementing reverse engineering techniques - Safeguarding network security - Conducting threat modeling and risk assessment Job Qualifications and Skill Sets The qualifications necessary for a certified ethical hacker are as follows: - A Bachelor's degree in computer science, information technology security, or a related field - Security certifications such as Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH) - Demonstrated proficiency in penetration tests, vulnerability assessment, and security monitoring - Knowledge of the OSI model, TCP/IP, HTTP, SSL, and wireless networking - Experience with common network infrastructure and security tools - Familiarity with web applications, including HTTP and SQL injection attacks - Understanding of security testing methodologies as per the EC-Council standards - Ability to thrive in a fast-paced work environment,
Posted 3 weeks ago
5.0 - 9.0 years
0 Lacs
karnataka
On-site
As an Emerging Tech Specialist at our Applied Research center, you will focus on applying scientific and technical research to solve practical problems and develop new products or processes within a specific industry or field. Your responsibilities will include conducting research, analyzing data, and developing solutions that can be implemented in real-world settings. You will define the research agenda and collaborate with academia and partners to conduct applied research. Additionally, you will be responsible for building tech playbooks that can be utilized by product and implementation teams. Your key responsibilities will involve researching emerging tech trends, the ecosystem of players, use cases, and their impact on client businesses. This will include scanning and curating startups, universities, and tech partnerships to create an innovation ecosystem. You will rapidly design and develop Proof of Concepts (PoCs) in emerging tech areas, sharing design specifications with team members, integrating, and testing components. Furthermore, you will contribute to thought leadership by developing showcases that demonstrate the application of emerging technologies in a business context. As part of the Applied Research Center activities, you will contribute to the design, development, testing, and implementation of proof of concepts in emerging tech areas. You will also be involved in problem definition and requirements analysis, developing reusable components, and ensuring compliance with coding standards and secure coding guidelines. Your role will also include innovation consulting, where you will understand client requirements and implement solutions using emerging tech expertise. Additionally, you will be responsible for talent management, mentoring the team to acquire identified emerging tech skills, and participating in demo sessions and hackathons. You will work with startups to provide innovative solutions to client problems and enhance our offerings. In terms of technical requirements, you should have expertise in various emerging areas such as Advanced AI, New Interaction Models, Platforms and Protocols, Cybersecurity, Quantum, Autonomous Machines, and Emerging Research areas like Brain AGI and Space Semicon. You will also need advanced theoretical knowledge, experimental design expertise, data analysis skills, prototype development capabilities, and research tool proficiency. Preferred skills include experience in User Experience Design, Artificial Intelligence, Cybersecurity Competency Management, Machine Learning, Robotics Algorithms, and X Reality (XR) technologies. Soft skills like a collaborative mindset, communication skills, problem-solving approach, intellectual curiosity, and commercial awareness will be beneficial for this role.,
Posted 3 weeks ago
1.0 - 5.0 years
0 Lacs
telangana
On-site
As a Cybersecurity Trainer, you will play a crucial role in equipping professionals with the knowledge and skills necessary to navigate the dynamic landscape of cyber threats. Your primary responsibility will involve designing and delivering virtual training sessions that cover various cybersecurity domains like network security, ethical hacking, incident response, and risk management. You will be expected to develop and update training content, facilitate engaging live sessions, workshops, and webinars, and assess learners" performance through evaluations, labs, and hands-on exercises. Additionally, you will customize training programs to suit the specific requirements of clients or organizations and stay abreast of the latest industry trends, tools, certifications, and threats. To excel in this role, you should have prior experience as a Cybersecurity Trainer, IT Instructor, or Security Professional, with a deep understanding of cybersecurity frameworks, principles, and practices. Strong communication and presentation skills are essential, and experience in instructional design or curriculum development would be advantageous. Possessing relevant certifications such as CompTIA Security+, CEH, CISSP, or CISM is a requirement, along with the ability to simplify complex technical concepts for easy comprehension. Ideally, you should hold a Bachelor's degree in Cybersecurity, Computer Science, or a related field and be familiar with eLearning platforms like Moodle or Canvas. Experience with hands-on labs such as Cyber Range, TryHackMe, or Hack The Box would be beneficial. Joining our team offers you competitive compensation, flexible working hours, and the chance to make a meaningful impact on the future generation of cybersecurity professionals. You will thrive in a supportive, mission-driven work environment that prioritizes continuous learning and professional development.,
Posted 3 weeks ago
1.0 - 6.0 years
0 - 0 Lacs
thane
On-site
Quastech: Urgent opening for Cyber Security and Ethical Hacking Trainer for Thane location. Designation: Cyber Security and Ethical Hacking Trainer Location: Thane. Experience: 0-5yrs Salary: As per Market standards Notice Period: Immediate joinee to 15 days Working Days: 6 days Required Skills: *Proficient knowledge of Cyber Security and Ethical Hacking* Job Profile: Conducting lectures and preparing the material for students. As faculty, to teach students programming languages, designing languages About the Job Looking for a Cyber Security and Ethical Hacking Trainer to learn and understand Cyber Security and Ethical Hacking Training Mumbai. Deliver training based on latest technologies. INTERESTED CANDIDATES CAN SHARE THEIR UPDATED CV ON resource@quastech.in OR 7400095741
Posted 3 weeks ago
0.0 years
2 - 3 Lacs
Noida
Work from Office
Knowledge of scripting languages (Perl, Python, HTML, Java, Shell). Hands-on experience in dynamic analysis, container testing, fuzzing, OWASP top 10 and vulnerability scanning if have any certificate ( CEH, ethical hacking
Posted 3 weeks ago
0.0 - 3.0 years
0 Lacs
karnataka
On-site
The need for cybersecurity professionals is never-ending, the world needs really skilled and ethical hackers. We provide opportunities to make you more skilled! Here at CyberSapiens, we always look for enthusiastic individuals who are keen on their skills & interests. This way our crowd is something that makes you enjoy your work. Join us to explore yourself, as it is in your growth that we grow. We are looking for candidates interested in the hacking field for performing vulnerability assessments and penetration testing on websites and applications (any platform) and recommending remediations accordingly. Required Skills: Knowledge of Cyber Security concepts and/or a related certification. Experience: 0-1 (Freshers are welcome). If you are interested in this position, please share your updated resume at sales@cybersapiens.co to apply or send it to click@cybersapiens.in for consideration.,
Posted 3 weeks ago
0.0 - 1.0 years
1 - 3 Lacs
Kolkata
Work from Office
Cyber security instructor, SOC operations, Bug bounty operations, Network Security, Python Scripting, Security Consulting, Training Delivery, Student Mentorship, Assessment and Evaluation
Posted 3 weeks ago
5.0 - 10.0 years
8 - 12 Lacs
Noida, Gurugram
Work from Office
Min 4–7-year experience performing security testing on Industrial control system components like PLC’s, SCADA, IIOT devices etc. Proven experience in conducting penetration tests, vulnerability assessments, and security audits across diverse environments. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP etc. Strong knowledge of common security vulnerabilities, attack vectors, threat modelling and exploitation techniques. Proficiency in using penetration testing tools and frameworks such as Nessus, Burp Suite, Nmap, and other ethical hacking tools. Understanding of component/system architectures in OT environments. Understanding and evaluation of security testing methods. Knowledge of typical industrial protocols (e.g., Modbus, Profinet, OPC, DNP3.0, CAN) Excellent communication skills, with the ability to clearly articulate technical findings and recommendations to both technical and non-technical audiences Roles and Responsibilities Handle the training delivery for IEC 62443 topics and OT security Handle the OT security project delivery and AUdits
Posted 3 weeks ago
1.0 - 5.0 years
2 - 7 Lacs
Pune
Work from Office
About The Role : Job Title- I&A On-boarding Information Security Analyst, Associate Location- Pune, India Role Description: As I&A On-boarding Information Security Analyst you will be part of Access Lifecycle On-boarding global family which includes access management for application end user recertification On-boarding, user access for request & approval, user provision On-boarding and Functional Taxonomy SoD On-boarding & maintenance as well as IDAHO (Access concept) SME as central DB services. Deutsche Bank is looking for bright and open-minded individuals to support Business Identity & Access Services within Access Lifecycle Solution On-boarding team for application end user request & approval as well as end user access provision central service On-boarding. A key success factor of the Access Lifecycle Solution On-boarding team is the quick understanding of complex application set ups for Identity & Access Management and support Information Security Officer (ISO) and IT Application Owner (ITAO) along end-to-end central solution On-boarding process across DB. You will gain insights into the complete Identity & Access Management lifecycle as you will learn about the roles and entitlements and their set up, segregation of duties, application authentication and authorization process. What well offer you 100% reimbursement under childcare assistance benefit (gender neutral) Sponsorship for Industry relevant certifications and education Accident and Term life Insurance Your key responsibilities As I&A On-boarding Information Security Analyst you will be responsible to perform On-boarding assessments if an IT asset is applicable for end user application access for request & approval and business requirement gathering (based on existing KOP ID Admin procedures) to identify, how future user provisioning (ID Admin via automated connector or manual, centrally or decentral managed) will be set up between central request & approval platform and to be on-boarded application in adhering to Information Security (IS) internal and regulatory requirements. Efficiently engage, manage, and influence the main stakeholders, along with application On-boarding process including Information Security Officer, IT Application Owner, Engineering and Operations teams Provide process improvement inputs to various stakeholders involved. Proactively seek ways to improve upon existing practices and processes. Display insight and ability in identifying issues and develop successful solutions. Report and escalate potential risks to the management to help avoid / minimize the impact. Work with multiple, distributed teams (across different locations) Support develops key operational procedures where necessary and ensure adherence to all such defined policies. Comfortable with associated disciplines of Security Policy and Governance in banking domain Very good presentation and communication skills allowing to communicate with our stakeholders. A structured and methodological way of working with the objective to deliver high quality results. Supports tough people decisions to ensure people performance is aligned with organization imperatives and needs. Addresses individual performance issues, where necessary, to drive for high performance. Pro-active and flexible working approach, Team spirit Your skills and experience Minimum 5 years working experience in Identity & Access Management, Governance, Risk and Control related topics. Team management experience Basic knowledge and/or willingness to work with industry best practices and frameworks like ISO27001, NIST, CSA CCM, COBIT, ITIL Good business analyses knowledge of system design, development, implementation, and user support principles and practices Knowledge of IT Service Management or IT Governance or IT Delivery Management or IT Project Management or IT Delivery background or IT Security Knowledge on Database Systems, application interactions and server operating systems Excellent Excel knowledge Competencies: Self-motivated and flexibility to work autonomously in virtual and multicultural teams. Good communication skills (both written and verbal), fluent in English (written/verbal) Good analytical skills and problem-solving abilities Pro-active and flexible working approach A structured and methodological way of working with the objective to deliver high quality results. Flexible mindset with an eye for detail and continuous improvement Good understanding in business related information Being flexible, open minded, able to share information, transfer knowledge and expertise to stakeholders and other team members. How well support you . . . .
Posted 3 weeks ago
5.0 - 10.0 years
6 - 12 Lacs
Chennai
Remote
Job Description CyberSecOn is looking for a talented and dedicated Cyber Security Analyst who can work remotely. A Cyber Security Analyst is responsible for maintaining the security and integrity of data. The security analyst must possess knowledge of every aspect of information security to protect company assets from evolving threat vectors.The main responsibilities will include: Monitor and investigate security events and alerts from various sources, such as logs, network traffic, threat intelligence, and user reports. Conduct proactive and reactive threat hunting campaigns to uncover hidden or emerging threats on the cloud environment. Perform root cause analysis and incident response to contain and remediate cloud abuse incidents. Document and communicate findings, recommendations, and lessons learned to relevant stakeholders and management. Develop and update cloud abuse detection rules, indicators, and signatures. Research and stay updated on the latest cloud abuse trends, tactics, techniques, and procedures (TTPs) of threat actors. Provide guidance and training to other security teams and cloud users on best practices and standards for cloud security. Manage multiple client environment cyber security infrastructure and applications. Knowledge of ServiceNow, Zoho desk, Jira/Confluence, etc. Perform vulnerability risk reviews using Qualys, Rapid7 and/or Tenable. Responsible for managing and improving the defined patch management & configuration review process and activities. Proactively manage applications, infrastructure security & network risks; ensuring security infrastructure aligns with companys compliance requirements. Skills & Experience: 4 years + years of experience in a security analyst role, preferably in a SOC environment. Good knowledge on security analyst, engineering, and project management experience Experience in client management for security projects. Knowledge and hands-on experience with SIEM technologies such as Microsoft Sentinel, Rapid7 Insight IDR, Wazuh, etc. Create play books and automation on Microsoft sentinel is desirable. Strong experience in Virtualisation, Cloud (Azure, AWS, other service providers) design, configuration, and management. Ability to manage priorities, perform multiple tasks and work under dynamic environment and tight deadlines. Ability to perform vulnerability assessments, penetration testing using manual testing techniques, scripts, commercial and open-source tools. Experience and ability to perform Phishing campaign and/or similar social engineering exercise. Subject matter expert in one or multiple areas as Windows, Unix, Linux OS. Vendor or Security specific certifications is preferred. Demonstrated analytical, conceptual and problem-solving skills. Ability to work effectively with limited supervision on multiple concurrent operational activities. Ability to communicate effectively via email, report, procedures in a professional and succinct manner. Preferred : Candidates who can join immediately or within 15 days.
Posted 3 weeks ago
4.0 - 8.0 years
7 - 17 Lacs
Noida, Delhi
Work from Office
Conduct comprehensive penetration testing of networks, web applications, mobile applications, and other systems to identify security vulnerabilities. Perform vulnerability assessments and provide detailed recommendations for remediation. Knowledge of OT-ICS Security standards, including ISA/IEC 62443, NIST 800-82, NERC-CIP, MITRE ATT&CK etc. Strong knowledge of common security vulnerabilities, attack vectors, threat modelling and exploitation techniques. Proficiency in using penetration testing tools and frameworks such as Nessus, Burp Suite, Nmap, and other ethical hacking tools. Strong understanding of network protocols, network and application security architectures, and common vulnerabilities (e.g., OWASP Top Ten). Prepare detailed reports of findings, including risk analysis and recommended mitigations, and present these findings to stakeholders. Stay current with emerging security threats, vulnerabilities, and technology trends, and apply this knowledge to improve our security posture. Understanding of component/system architectures in IT and OT environments. Understanding and evaluation of security testing methods. Knowledge of typical industrial protocols (e.g., Modbus, Profinet, OPC, DNP3.0, CAN) Excellent communication skills, with the ability to clearly articulate technical findings and recommendations to both technical and non-technical audiences Source code review for control flow and security flaws IEC 62443 Standard plus at least one of: ISO/IEC 27001 IEC 61508 NIST CSF IEC 61162-460:2024 Proficient in developing VAPT documentation and methodologies specifically aligned with IEC 61162-460:2024 for maritime navigation and radiocommunication equipment cybersecurity. Automotive Vehicle Testing Support Skilled in providing cybersecurity testing support for automotive vehicles , including VAPT of ECUs and in-vehicle networks , threat modeling , and ensuring compliance with industry standards like ISO/SAE 21434. Roles and Responsibilities Min. one professional certification such as Certified Ethical Hacker (CEH), ISA/IEC 62443, OSCP or certified Penetration Tester preferred. Min 2–5 years of experience performing security testing on Industrial control system components like IOT devices, PLCs, SCADA, IIOT devices etc. Familiarity with operating systems (Windows, Linux) and their security features. Excellent problem-solving skills and the ability to think critically to identify and address security issues. Strong verbal and written communication skills, with the ability to document and present technical information to both technical and non-technical audiences. Perform and report on penetration testing of systems, including cloud, NIST 800-53 CA-8 security control and using methodologies that may include, NIST SP 800-115, IEC 62243, PTES, and Information Systems Security Assessment Framework (ISSAF). Develop and maintain up-to-date knowledge of security testing tools and techniques. Contribute to the development and maintenance of security testing methodologies and procedures. Team Collaboration and Training Collaborate with other members of the security team to develop and maintain security policies, procedures, and standards
Posted 3 weeks ago
Upload Resume
Drag or click to upload
Your data is secure with us, protected by advanced encryption.
Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.
We have sent an OTP to your contact. Please enter it below to verify.
Accenture
54024 Jobs | Dublin
Wipro
24262 Jobs | Bengaluru
Accenture in India
18733 Jobs | Dublin 2
EY
17079 Jobs | London
Uplers
12548 Jobs | Ahmedabad
IBM
11704 Jobs | Armonk
Amazon
11059 Jobs | Seattle,WA
Bajaj Finserv
10656 Jobs |
Accenture services Pvt Ltd
10587 Jobs |
Oracle
10506 Jobs | Redwood City