Jobs
Interviews

268 Malware Analysis Jobs

Setup a job Alert
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 6.0 years

3 - 8 Lacs

hyderabad, pune, chennai

Work from Office

Android Malware Analyst Location PUN, HYD & CEN ________________________________________ Minimum Qualifications: Bachelor's degree in Computer Science, a related technical field, or equivalent practical experience. 23 years of experience in security assessments, security design reviews, or threat modeling. Experience in malware analysis, reverse engineering, and software development. ________________________________________ Preferred Qualifications: Expertise in threat identification, with the ability to accurately pinpoint malicious code and classify all categories of malicious applications. Experience in Android reverse engineering (APK, DEX), malware analysis, and threat modeling. Understanding of ARM-based architecture. Android application development experience in C/C++ and Java. Experience analysing app behaviour using automated tools and sandbox environments to identify known malicious patterns. Strong technical knowledge of security engineering, computer and network security, authentication, security protocols, and applied cryptography. Experience with automation and scripting, preferably in Python. Ability to classify applications based on predefined Standard Operating Procedures (SOPs) and known threat indicators. ________________________________________ Responsibilities: Perform initial triage and security analysis of a high volume of Android applications. Perform reverse engineering and analyse malware at scale. Document all analysis findings accurately and concisely for reporting purposes. Advocate for security best practices and secure coding. Conduct research to identify potential attack vectors against Android. Collaborate with team members to enhance Android Security and Privacy's understanding of malware and propose methods for detection and mitigation.

Posted 3 hours ago

Apply

6.0 - 10.0 years

17 - 20 Lacs

hyderabad, chennai

Work from Office

The Impact you will have in this role: Qualifications: Minimum of 6 years of related experience Bachelor's degree preferred or equivalent experience Talents Needed for Success:

Posted 19 hours ago

Apply

15.0 - 20.0 years

12 - 16 Lacs

gurugram

Work from Office

About The Role Project Role : Security Delivery Lead Project Role Description : Leads the implementation and delivery of Security Services projects, leveraging our global delivery capability (method, tools, training, assets). Must have skills : Security Threat Hunting Good to have skills : NAMinimum 18 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Delivery Lead, you will be responsible for leading the implementation and delivery of Security Services projects. Your typical day will involve coordinating with various teams to ensure that projects are executed efficiently, utilizing our global delivery capabilities, including methods, tools, training, and assets. You will engage with stakeholders to understand their needs and provide guidance on best practices in security delivery, ensuring that all projects align with organizational goals and standards. Your role will also require you to monitor project progress, address any challenges that arise, and facilitate communication among team members to foster a collaborative environment. Roles & Responsibilities:- Expected to be a Subject Matter Expert with deep knowledge and experience.- Should have influencing and advisory skills.- Engage with multiple teams and responsible for team decisions.- Expected to provide solutions to problems that apply across multiple teams, and provide solutions to business area problems.- Facilitate training sessions and workshops to enhance team capabilities and knowledge in security practices.- Develop and maintain strong relationships with stakeholders to ensure alignment on project objectives and deliverables. Professional & Technical Skills: - Must To Have Skills: Proficiency in Security Threat Hunting.- Strong analytical skills to assess security threats and vulnerabilities.- Experience with incident response and threat intelligence.- Ability to develop and implement security policies and procedures.- Familiarity with security frameworks and compliance standards. Additional Information:- The candidate should have minimum 18 years of experience in Security Threat Hunting.- This position is based at our Gurugram office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 22 hours ago

Apply

15.0 - 20.0 years

13 - 17 Lacs

noida, hyderabad, chennai

Work from Office

Role Overview: We are looking for an experienced Solution Architect specializing in End User Computing (EUC) to join our dynamic IT team. The ideal candidate will have strong hands-on experience with technologies such as Microsoft Intune, Nexthink, VDI management, AI, Automation etc. The candidate will play a critical role in designing, implementing, and optimizing secure, scalable, and efficient end-user environments for a global workforce. You will architect end-to-end digital workplace strategies that support seamless collaboration, enhanced productivity, and exceptional employee experiences, whether users are in-office, remote, or hybrid. This is a vital role that combines deep technical knowledge with a passion for improving user experience, enabling flexible work, and integrating emerging tools like AI, analytics, and automation into the digital environment. Key Responsibilities: Design and implement end-user computing solutions including but not limited to Intune, Nexthink and Virtual Desktop Infrastructure (VDI) etc. Architect and deploy automated workflows to improve EUC operations and management. Provide strategic guidance and technical leadership for EUC-related projects and initiatives. Analyze enterprise trends and future business needs to develop architecture roadmaps, service blueprints, and endpoint standards. Collaborate with cross-functional teams to deliver scalable and secure desktop and device management solutions. Ensure compliance with organizational security policies and standards. Deliver high-quality documentation for architecture designs, configurations, and operational processes. Required Skills & Experience: Minimum 15 years of overall IT experience with at least 5 years in a solution architect role focused on end-user computing. Hands-on expertise with Microsoft Intune and modern device management strategies. Experience using Nexthink for DEX monitoring and analytics. Use tools like Nexthink, Lakeside, SysTrack, or Microsoft Endpoint Analytics to build dashboards and insights. Strong background in VDI environments design, deployment, and support. Proven ability in automation of EUC tasks using scripting and AI-based tools. Strong troubleshooting and analytical skills. Excellent communication and documentation skills.

Posted 22 hours ago

Apply

5.0 - 10.0 years

5 - 15 Lacs

pune

Work from Office

BMC is looking for an Experienced Information Security Engineer to join our amazing global Corporate Cybersecurity team! In this role, you will build out, maintain, and troubleshoot our information security systems, while supporting internal customers. You will have the opportunity to learn multiple tools and technologies across multiple security domains. So, if youre committed to customer services, an awesome team player and enjoy building relationship this is the role for you! Here is how, through this exciting role, YOU will contribute to BMC's and your own success: Deploy and maintain security tools and systems. Develop, analyze, and implement security specifications. Participate in incident response and break/fix situations as needed. Develop documentation to support ongoing security systems operation. Analyze system services, operating systems, networks, and applications from a security perspective discovering security issues that appear under new threat scenarios. Create custom use cases, system alarms, correlation signatures, watch lists and 20 plus custom regex parsers to meet customer's IT security needs. Support onboarding and maintenance of a wide variety of data sources to include various OS, appliance, and application logs. To ensure youre set up for success, you will bring the following skillset & experience: 5+ years of experience in Information Security Engineering Experience in Windows, Unix/Linux, and/or network administration experience. Deep understanding of information security threat landscape, and prior experience with threat modeling, including usage of relevant tools and technologies. Experience in networking protocols and services (FTP, HTTP, SSH, SMB, LDAP) Good problem solving and troubleshooting skills. Excellent interpersonal communication skills, with ability to work as a part of a team, as well as independently. Whilst these are nice to have, our team can help you develop in the following skills: Previous experience in other IT roles (such as System Administrator, Networking Engineer etc.) Experience working with SIEM technologies, threat hunting, and pen-testing tools and technologies, and working with malware analysis. Understanding of basic routing principles and networking fundamentals Knowledge of basic functions of operating systems Bachelors degree or equivalent security-related course CA-DNP

Posted 1 day ago

Apply

4.0 - 9.0 years

15 - 19 Lacs

bengaluru

Work from Office

locationsBangalore, Indiaposted onPosted 10 Days Ago job requisition id30684 FICO (NYSEFICO) is a leading global analytics software company, helping businesses in 100+ countries make better decisions. Join our world-class team today and fulfill your career potential! The Opportunity "This is an opportunity to define, build, and shape the future of FICOs Cybersecurity and Risk Posture. As part of the Threat & Vulnerability Management team, you will collaborate across the business, IT, and client environments to secure our cloud and data center infrastructure. Your contributions will be key to strengthening FICO's defense mechanisms and enhancing our compliance posture. We're looking for a cybersecurity expert passionate about continuous improvement, cloud security, and vulnerability risk reduction. If you're someone who thrives in a fast-paced environment and wants to work on high-impact global security initiatives, this role is for you" - VP, Software Engineering. What Youll Contribute Detect, identify, and analyze vulnerabilities across FICO environment. Assess the risk of vulnerabilities detected to determine true impact. Support stakeholders as a SME to understand technical details of vulnerabilities and steps to carry out remediation. Coordinate with stakeholders to track issues remediation until closure. Act as a SME for new projects in terms of vulnerability management lifecycle. Manage, maintain, and tune tools used to support the VM process. Update yourself with the latest security and technology developments. What Were Seeking Experience in a similar role such as vulnerability management specialist. Experience with Qualys or other security vulnerability detection technology required. Demonstrates subject-matter expert level understanding in multiple IT, Security and Software disciplines. Ability to understand the cause and effect of application vulnerabilities with Operating System Vulnerabilities. Must be able to multi-task and keep track of large amounts of information across disparate systems. Ability to keep making progress and define future strategy/policy with regards to Enterprise. Adherent to continuous monitoring and continuous improvement thought process. Demonstrated technical IT skills, ability to understand and manage different OS flavors, network technologies and topologies. Demonstrated technical security expertise in a variety of cloud platforms (AWS is preferred). Comfortable interfacing with other internal or external organizations regarding problems that must be addressed to enhance security posture. Ability to effectively translate and present solutions in business or management terms. Ability to work effectively in a team environment. Knowledge of Python scripting or other languages is nice to have. Moderate documentation and analytical skills; documenting processes, policies, and standards. Moderate ability to provide end-to-end support to enterprise counterparts, identifying root- cause of complex enterprise initiatives. Moderate trouble shooting skills across complex enterprise applications, server, and endpoint environments. Moderate ability to learn onboard and adapt to new technologies. Basic privileged access management/right management experience, designing solutions based on least privilege. Basic knowledge of malware operation, indicators or threat. Moderate knowledge of current threat landscape Entry Cybersecurity certifications, such as CompTIA Security +, GIAC Security Fundamentals, GIAC Security Essentials, ISC2 Associate, ISACA Cybersecurity Fundamentals are nice to have. Our Offer to You An inclusive culture strongly reflecting our core valuesAct Like an Owner, Delight Our Customers and Earn the Respect of Others. The opportunity to make an impact and develop professionally by leveraging your unique strengths and participating in valuable learning experiences. Highly competitive compensation, benefits and rewards programs that encourage you to bring your best every day and be recognized for doing so. An engaging, people-first work environment offering work/life balance, employee resource groups, and social events to promote interaction and camaraderie. Why Make a Move to FICO At FICO, you can develop your career with a leading organization in one of the fastest-growing fields in technology today Big Data analytics. Youll play a part in our commitment to help businesses use data to improve every choice they make, using advances in artificial intelligence, machine learning, optimization, and much more. FICO makes a real difference in the way businesses operate worldwide Credit Scoring FICO Scores are used by 90 of the top 100 US lenders. Fraud Detection and Security 4 billion payment cards globally are protected by FICO fraud systems. Lending 3/4 of US mortgages are approved using the FICO Score. Global trends toward digital transformation have created tremendous demand for FICOs solutions, placing us among the worlds top 100 software companies by revenue. We help many of the worlds largest banks, insurers, retailers, telecommunications providers and other firms reach a new level of success. Our success is dependent on really talented people just like you who thrive on the collaboration and innovation thats nurtured by a diverse and inclusive environment. Well provide the support you need, while ensuring you have the freedom to develop your skills and grow your career. Join FICO and help change the way business thinks! Learn more about how you can fulfil your potential at FICO promotes a culture of inclusion and seeks to attract a diverse set of candidates for each job opportunity. We are an equal employment opportunity employer and were proud to offer employment and advancement opportunities to all candidates without regard to race, color, ancestry, religion, sex, national origin, pregnancy, sexual orientation, age, citizenship, marital status, disability, gender identity or Veteran status. Research has shown that women and candidates from underrepresented communities may not apply for an opportunity if they dont meet all stated qualifications. While our qualifications are clearly related to role success, each candidates profile is unique and strengths in certain skill and/or experience areas can be equally effective. If you believe you have many, but not necessarily all, of the stated qualifications we encourage you to apply. Information submitted with your application is subject to theFICO Privacy policy at

Posted 1 day ago

Apply

2.0 - 3.0 years

3 - 6 Lacs

hyderabad, pune, chennai

Work from Office

Android Malware Analyst Location PUN, HYD & CEN ________________________________________ Minimum Qualifications: Bachelor's degree in Computer Science, a related technical field, or equivalent practical experience. 2–3 years of experience in security assessments, security design reviews, or threat modeling. Experience in malware analysis, reverse engineering, and software development. ________________________________________ Preferred Qualifications: Expertise in threat identification, with the ability to accurately pinpoint malicious code and classify all categories of malicious applications. Experience in Android reverse engineering (APK, DEX), malware analysis, and threat modeling. Understanding of ARM-based architecture. Android application development experience in C/C++ and Java. Experience analysing app behaviour using automated tools and sandbox environments to identify known malicious patterns. Strong technical knowledge of security engineering, computer and network security, authentication, security protocols, and applied cryptography. Experience with automation and scripting, preferably in Python. Ability to classify applications based on predefined Standard Operating Procedures (SOPs) and known threat indicators. ________________________________________ Responsibilities: Perform initial triage and security analysis of a high volume of Android applications. Perform reverse engineering and analyse malware at scale. Document all analysis findings accurately and concisely for reporting purposes. Advocate for security best practices and secure coding. Conduct research to identify potential attack vectors against Android. Collaborate with team members to enhance Android Security and Privacy's understanding of malware and propose methods for detection and mitigation.

Posted 1 day ago

Apply

5.0 - 10.0 years

13 - 17 Lacs

gurugram

Work from Office

Project Role : Security Architect Project Role Description : Define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Document the implementation of the cloud security controls and transition to cloud security-managed operations. Must have skills : Security Information and Event Management (SIEM) Operations Good to have skills : NAMinimum 3 year(s) of experience is required Educational Qualification : 15 years full time education Summary :As a Security Architect, you will define the cloud security framework and architecture, ensuring it meets the business requirements and performance goals. Your typical day will involve collaborating with various teams to document the implementation of cloud security controls and facilitate the transition to cloud security-managed operations, ensuring that security measures are effectively integrated into the cloud environment and aligned with organizational objectives. Roles & Responsibilities:-Administer a globally distributed and heterogeneous SIEM environment, preferably Securonix/Splunk-Knowledge on Automation app deployment to multiple sites, Monitoring the central infrastructure-Design and customize complex search queries, develop dashboards, data models, reports and optimize their performance-Administration of core SIEM Components (Deployment Server, Indexer)-Understanding of threat models and threat intelligence-Improve detection capabilities by building and enhancing alert rules Professional & Technical Skills: - Exp working in SOC/SIEM-Incident handling, use case management development , risk assessment, playbook recommendation, fine-tunings-SIEM/SOC operations experience for very large enterprises-Knowledge on MITRE/CKC framework-Security Analytical skills and analysis-Should have good customer handling skills-SIEM, Incident Response, Basic understanding of security technologies-User behavior/Malware Analysis, Knowledge on Securonix, Defender, CrowdStrike, FortiSOAR and Splunk Admin Additional Information:- The candidate should have a minimum of 5 years of experience in Infrastructure Security Vulnerability Management Operations.- This position is based at our Noida office.- A 15 years full time education is required. Qualification 15 years full time education

Posted 2 days ago

Apply

7.0 - 12.0 years

22 - 37 Lacs

gurugram

Work from Office

Company Overview Incedo is a US-based consulting, data science and technology services firm with over 3000 people helping clients from our six offices across US, Mexico and India. We help our clients achieve competitive advantage through end-to-end digital transformation. Our uniqueness lies in bringing together strong engineering, data science, and design capabilities coupled with deep domain understanding. We combine services and products to maximize business impact for our clients in telecom, Banking, Wealth Management, product engineering and life science & healthcare industries. Working at Incedo will provide you an opportunity to work with industry leading client organizations, deep technology and domain experts, and global teams. Incedo University, our learning platform, provides ample learning opportunities starting with a structured onboarding program and carrying throughout various stages of your career. A variety of fun activities is also an integral part of our friendly work environment. Our flexible career paths allow you to grow into a program manager, a technical architect or a domain expert based on your skills and interests. Our Mission is to enable our clients to maximize business impact from technology by Harnessing the transformational impact of emerging technologies Bridging the gap between business and technology Role Description Position Description: Incedo is seeking a SOC Analyst (L3/Tier 3/Threat Hunter) to join our rapidly growing cybersecurity team! Role and responsibilities: Participate in a rotating SOC on-call; rotation is based on the number of team members. Provide first-line SOC support with timely triage, routing and analysis of SOC tasks. Researches, develops, and monitors custom visualizations. Researches, analyzes, and writes documents such as cybersecurity briefings for all levels of stakeholders from Tier 1-3 SOC, security engineering, and executives. Tunes and develops SIEM correlation logic for threat detection. Ensures documentation is accurate and complete, meets editorial and government specifications, and adheres to standards for quality, graphics, coverage, format, and style. Develop scripts using Python to automate IR functions, including (but not limited to) IOC ingestion and SIEM integration via REST APIs to minimize repetition of duties and automate tasks. Produce and review aggregated performance metrics. Perform Cyber Threat Assessment and Remediation Analysis Processing, organizing, and analyzing incident indicators retrieved from the client environment and correlating said indicators to various intelligence data. Assisting in the coordination with internal teams as well as in the creation of engagement deliverables for a multitude of activities, including but not limited to Insider Threats, Rule of Engagement (ROE), Threat Hunting, After Action Reports, and other artifacts to support testing, monitoring and protecting the enterprise. Investigate network and host detection and monitoring systems to advise engagement processes.Develop and Execute bash and python scripts to process discrete log files and extract specific incident indicators; develop tools to aid in Tier 1 and Tier 2 functions. Participate in on-call rotation for after-hours security and/or engineering issues. Participate in the increase of effectiveness and efficiency of the SOC, through improvements to each function as well as coordination and communication between support and business functions. Think critically and creatively while analyzing security events, network traffic, and logs to engineer new detection methods. Work directly with Security and SOC leadership on cyber threat intelligence reports to convert intelligence into useful detection. Technical Skills Required Experience / Skills: Minimum of nine (9) years technical experience 7+ years of experience in SOC, security operations, cyber technical analysis, threat hunting, and threat attribution assessment with increasing responsibilities. 3+ years of rule development and tuning experience 1+ years of Incident response Deep understanding of Cyber Threat TTPs, Threat Hunt, and the application of the MITRE Attack Framework Knowledge of security operations and attacker tactics Ability to identify cyber-attacks and develop monitoring logic Experience supporting 24x7x365 SOC operations including but not limited to Alert and notification activities- analysis/triage/response, Review and action on Threat Intel for IOCs and other operationally impactful information, initial review and triage of reported alerts and Incidents. Support alert and notification triage, review/analysis through resolution / close Manage multiple tickets/alerts in parallel, including end-user coordination. Demonstrated ability to evaluate events (through a triage process) and identify appropriate prioritization for response. Solid understanding and experience analyzing security events generated from security tools and devices not limited to QRadar, MS Sentinel, FireEye, Elastic, SourceFire, Malware Bytes, CarbonBlack/Bit9, Splunk, Prisma Cloud/Compute, Cisco IronPort, BlueCoat Experience and solid understanding of Malware analysis Demonstrated proficiencies with one or more toolsets such as QRadar, MS Sentinel, Bit9/CarbonBlack, Endgame, FireEye HX / CM / ETP, Elastic Kibana Experience and ability to use, contribute, develop and follow Standard Operating Procedures (SOPs) Nice-to-have skills In-depth experience with processing and triage of Security Alerts from multiple sources but not limited to: Endpoint security tools, SIEM, email security solutions, CISA, Threat Intel Sources Experience with scripting languages applied to SOC operations; for example, automating investigations with tools, automating IOC reviews, support SOAR development. Experience with bash, python, and Windows PowerShell scripting Demonstrated experience with triage and resolution of SOC tasks, including but not limited to vulnerability announcements, phishing email review, Tier 1 IR support, SIEM/Security Tools - alert analysis. Demonstrated experience and understanding of event timeline analysis and correlation of events between logs sources. Demonstrated experience with the underlying logs generated by operating systems (Linux/Windows), Network Security Devices, and other enterprise tools. Demonstrated proficiencies with an enterprise SIEM or security analytics solution, including the Elastic Stack or Splunk. Solid understanding and experience analyzing security events generated from security tools and devices not limited to: QRadar, MS Sentinel, Carbon Black, FireEye, Palo Alto, Cylance, and OSSEC Experience and solid understanding of Malware analysis Understanding of security incident response processes Qualifications Qualifications : Bachelors degree in computer science, Information Technology, or a related field. Experience of 5 years or 3 years relevant experience. Strong troubleshooting and problem-solving skills. Excellent communication and interpersonal skills. Ability to work independently and as part of a team. Strong organizational and time management skills. Willingness to work after hours and provide on-call support. Company Value

Posted 2 days ago

Apply

9.0 - 12.0 years

3 - 7 Lacs

bengaluru

Work from Office

Your Role Configure and customize FortiSOAR to automate and orchestrate security workflows across enterprise environments. Develop and maintain automation playbooks using Python and scripting languages aligned with security use cases. Integrate various security tools and platforms using APIs, Ansible, and custom scripts to enhance SOC capabilities. Monitor, analyze, and troubleshoot automated security processes to proactively address threats and improve response times. Collaborate with IT and security teams to align FortiSOAR configurations with organizational goals and compliance needs. Your Profile 9 to 12 years of experience in security automation and orchestration using FortiSOAR. Experience in Python and scripting languages with integration of security tools and platforms. Develop, create, and maintain automation playbooks based on security use cases. Integration expertise using APIs, Ansible, and Python for security software and toolsets. Basic understanding of networking and security concepts to support automation workflows. What you will love working at Capgemini Work on enterprise-scale security automation and orchestration using Forti SOAR, Python, and Ansible. Collaborate with global teams to develop and maintain playbooks and integrate security tools via APIs and scripts. Clear career progression paths from engineering roles to security architecture and consulting. Be part of mission-critical projects that enhance threat detection, response automation, and compliance for Fortune 500 clients.

Posted 2 days ago

Apply

4.0 - 8.0 years

0 Lacs

karnataka

On-site

You should have a Diploma / Bachelors / Masters Degree along with a minimum of 4-5 years of experience in a Security Operations Centre (SOC) or incident response team. It is required to possess at least one valid certification among Security+, CEH, CISSP, OSCP, CHFI, ECSA, GCIH, GCIA, GSEC, GCFA, or Cisco Cyber OPS certification. Being flexible to work in 24/7 shifts is a must. Your responsibilities will include 24/7 monitoring, triaging, and analyzing security events and alerts, as well as conducting malware analysis, including reverse engineering. You should have experience in coordinating incident response and troubleshooting across a global organization. It is important to be familiar with core concepts of security incident response and have a strong knowledge of email security threats and controls. Additionally, you should have a good understanding of Threat Intel and Hunting, network fundamentals, common Internet protocols, and experience in analyzing network traffic using tools like Wireshark. Experience in reviewing system and application logs, investigating security issues within Cloud infrastructure, and using SIEM tools such as Splunk, AlienVault, QRadar, ArcSight or similar is essential. Moreover, you should have experience in creating new detection rules and correlation rules, defining use cases for playbooks and runbooks, understanding log types and log parsing, and a strong passion for information security. A good understanding of CIS requirements is also required for this role.,

Posted 5 days ago

Apply

5.0 - 9.0 years

0 Lacs

chennai, tamil nadu

On-site

As a Research and Engineering Scientist at Zoho Corporation, you will be responsible for conducting high-quality research in the field of Computer Science Engineering and Technology. Your role will involve exploring various research areas such as Compilers, Computer Architecture, Programming Languages, Data Structures & Algorithms, Operating Systems, Computer Networking, Data Security, Cryptography & Network Security, Image processing, Malware Analysis, Cloud computing, Software Engineering, Web Technology, Artificial Intelligence (Machine Learning, Deep learning, Generative AI, etc), Machine vision Technology & Intelligence, Design of Mechatronics System, Industrial Automation & Manufacturing Technology, Industrial Robotics, and other emerging technologies. You will need to demonstrate a high level of innovation and motivation to perform independent research while collaborating with teams in research and product development. Excellent self-organization and attention to detail are essential to manage multiple responsibilities and prioritize tasks effectively. Your key duties and responsibilities will include engaging in independent research, drafting technical documents on system design and technology, reviewing technical documents, generating technical specifications, and completing tasks across various project stages. Additionally, you will be expected to support team functioning, possess advanced language and communication skills for documentation and presentations, and continuously update your knowledge and skills to meet responsibilities. We are seeking individuals with expertise in one or more of the aforementioned research areas, preferably with publication experience. Competitive benefits and packages will be offered based on your research experience and skills. Kindly include your recent research publications in your updated resume for consideration.,

Posted 1 week ago

Apply

7.0 - 11.0 years

0 Lacs

pune, maharashtra

On-site

As a Transition Specialist for the Threat Intelligence Platform & Advisory role, your primary responsibility will be to lead the transition processes associated with the Threat Intelligence Platform. Your aim should be to ensure minimal disruption to ongoing operations during this transitional phase. Additionally, you will be expected to provide expert advisory services on threat intelligence strategies and best practices to both internal and external stakeholders. Your role will also involve overseeing the integration of new threat intelligence tools and technologies into the existing infrastructure. Furthermore, you will be required to develop and deliver training programs for team members and clients to enhance their understanding and usage of the threat intelligence platforms. Collaboration is key in this role as you will work closely with cross-functional teams to ensure alignment and effective communication throughout the transition process. It will be essential for you to monitor the performance and effectiveness of the threat intelligence platform, identifying areas for improvement and implementing necessary changes. In addition to the transition management responsibilities, you will be involved in monitoring and analyzing cybersecurity events, incidents, and vulnerability reports from multiple sources. Proactively monitoring and analyzing the cyber threat landscape to assess risk and applicability to the firm will also be a crucial aspect of your role. Working closely with the internal research team, you will identify customer-specific threats and create customer-specific analytical reports based on the identified findings. You will also be responsible for creating regular security trend reports utilizing information from the internal threat repository and collaborating with customer points of contact to understand their threat landscape and deliver customized solutions. Furthermore, you will engage in monitoring, analyzing, and reporting on cybersecurity events, intrusion events, security incidents, and other threat indications, while following best practices of operational security to safeguard sources and methods. Engaging with external communities to share and contribute to threat intelligence exchange activities will also be part of your responsibilities. To excel in this role, you should have hands-on experience with tools such as Rapid7, Recorded Future, Cyble, Zerofox, and Anomaly. Proficiency in threat intelligence tools and platforms, along with a strong understanding of cybersecurity principles and cyber threat intelligence, will be vital. Your ability to create high-quality security analysis reports, understand and analyze various threat vectors effectively, and have knowledge of cyber threats, malware, APTs, and exploits will be essential. Familiarity with the DarkNet, DeepWeb, open-source, social media, and other sources of cyber-criminal activity is preferred. A willingness to learn new technologies and skills, experience in a SOC environment, any background in threat hunting, and programming/scripting knowledge will be advantageous. The desired experience for this role is 7 to 10 years.,

Posted 1 week ago

Apply

2.0 - 6.0 years

0 Lacs

delhi

On-site

You will be part of a Series A Funded New Age Information Security & Data Analytics Company that is globally recognized for delivering innovative security solutions based on cutting-edge technologies like Artificial Intelligence, Predictive Intelligence, and Facial Biometrics. With over 100 trusted customers in India and a growing list of clientele, we are at the forefront of cyber excellence and are committed to taking a big leap forward. As a Business Analyst, you will be responsible for conducting forensic examinations of digital devices and networks to uncover evidence related to cybercrimes, security breaches, and other digital incidents. Your role will involve investigating and analyzing digital evidence to support legal proceedings, incident response efforts, and security operations. Your key responsibilities will include: - Performing forensic analysis of digital devices such as computers, mobile phones, servers, and network logs. - Conducting in-depth analysis of business processes, systems, and workflows to identify inefficiencies and areas for enhancement. - Staying updated on industry trends, best practices, and emerging technologies in cybersecurity and data analytics. - Collecting and preserving digital evidence using industry-standard forensic tools and techniques. - Conducting examinations of digital media to identify, extract, and analyze relevant data like files, emails, chat logs, and internet history. - Analyzing malware and other malicious artifacts to determine their impact and origin. - Documenting forensic findings and preparing detailed reports for legal proceedings and incident response activities. - Collaborating with internal teams, law enforcement agencies, and external partners to provide expert guidance and support during investigations. - Staying informed about the latest developments in digital forensics, cyber threats, and forensic tools and methodologies. - Providing expert testimony in court and other legal proceedings as required. Requirements: - Bachelor's degree in Digital Forensics, Cybersecurity, or a related field. Advanced degree or certifications. - Excellent communication skills. - Minimum of 2 years of experience. - Proven experience in digital forensics with a strong understanding of forensic principles, techniques, and tools. - Knowledge of forensic software and tools like EnCase, FTK, X-Ways Forensics, Autopsy, and Volatility. - Solid understanding of computer networks, operating systems, file systems, and data storage technologies. - Experience in analyzing various types of digital evidence including file systems, memory dumps, network traffic, and cloud data. - Excellent analytical and problem-solving skills with attention to detail. - Strong written and verbal communication skills with the ability to convey technical concepts clearly and concisely. Note: Immediate joiners will be preferred.,

Posted 1 week ago

Apply

4.0 - 8.0 years

0 Lacs

chandigarh

On-site

As a Senior Information Security Specialist at our organization, you will be responsible for investigating and responding to alerts raised by the Security Operations Center (SOC). You will play a key role in coordinating security incidents and serving as part of the 24-hour on-call Security Incident Response Team. Additionally, you will be tasked with monitoring and investigating security alerts from SIEM systems, handling malware, and performing malware analysis. Your role will also involve correlating information from various security tools during incident investigations and analyzing threat intelligence feeds to identify relevant threats. You will be expected to enter identified vulnerabilities into the vulnerability management process and execute vulnerability management processes. Furthermore, you will configure IT security tools such as Microsoft Defender, Sentinel, and Intune. Monitoring the security email inbox, responding to received notifications and requests, and collaborating with teams to enhance security education and awareness across the organization will also be part of your responsibilities. To excel in this role, you should have proficiency in coordinating all phases of security incident response, including identification, containment, eradication, recovery, and post-incident analysis. You should be skilled in analyzing logs from SIEM systems, firewalls, and network devices to identify malicious activity. Possessing relevant certifications such as GCIH, ECIH, or equivalent will be advantageous. Candidates with experience working in a SOC and sound knowledge of Microsoft and AWS security tools will be preferred. Familiarity with tools such as Dynamic Application Scanning Tools (DAST), network scanners, open-source forensic tools, Microsoft/AWS security tools, anti-malware scanners, and web application firewalls is also desirable for this role.,

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

vadodara, gujarat

On-site

The primary responsibility of this role will be to monitor security events and alerts utilizing Security Information and Event Management (SIEM) tools, Intrusion Detection/Prevention Systems (IDS/IPS), and other security monitoring platforms. You will be responsible for investigating and analyzing security incidents to identify the root cause, impact, and recommended remediation actions. Additionally, you will conduct in-depth analysis of security logs, network traffic, and other relevant data sources to detect and respond to potential threats. As part of your duties, you will be expected to perform real-time incident response activities, including containment, eradication, and recovery, following established procedures and guidelines. Collaboration with the SOC analysts will be essential, providing guidance and support in investigating and escalating security incidents. It will also be crucial to stay informed about the latest security threats, vulnerabilities, and industry best practices to enhance incident detection and response capabilities. You will play a key role in the development and implementation of SOC processes and procedures, including incident response plans, playbooks, and escalation protocols. Timely and accurate reporting on security incidents, including trend analysis and pattern identification to support proactive security measures, will be a significant part of your responsibilities. Furthermore, you will be involved in monitoring and maintaining endpoint security solutions to detect and prevent malware threats. Investigating and responding to malware incidents, delivering detailed reports, scheduling and managing phishing simulation campaigns to raise employee awareness, and analyzing campaign results to identify users at risk and recommend targeted training programs will all fall under your purview. Additionally, you will assist in coordinating Vulnerability Assessment and Penetration Testing (VAPT) with internal teams and external vendors, tracking vulnerabilities, ensuring timely remediation, and documenting progress. You will also be responsible for conducting Proof of Concept (POC) evaluations for various security solutions to assess their effectiveness and suitability, documenting POC findings, and preparing recommendation reports for stakeholders. Lastly, your role will involve contributing to the design and delivery of cybersecurity awareness programs to educate employees on security best practices.,

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

delhi

On-site

As a Security Researcher at HackHalt - Community, your primary focus will be on combating cybercrime through prevention, education, detection, and rapid response. You will play a crucial role in empowering individuals and organizations with robust security solutions to create a resilient digital environment. Your responsibilities will include conducting application security assessments, performing malware analysis, engaging in reverse engineering, and carrying out advanced security research. In this full-time hybrid role based in New Delhi, with flexibility for remote work, you will be at the forefront of developing cutting-edge security technologies to proactively identify and mitigate threats. Your day-to-day tasks will involve developing new methodologies to detect and prevent cyber threats, collaborating closely with the IT and security teams, and sharing intelligence with law enforcement and industry partners. To excel in this role, you should possess strong Application Security and Cybersecurity skills, along with experience in Malware Analysis and Reverse Engineering. Your extensive knowledge in Security Research, coupled with your analytical and problem-solving skills, will be essential in effectively addressing cybersecurity challenges. Moreover, your excellent written and verbal communication skills will enable you to collaborate efficiently with various stakeholders. The ideal candidate for this position should be able to work both independently and as part of a team, demonstrating a Bachelor's degree in Computer Science, Information Security, or a related field. Possessing relevant certifications such as CISSP, CEH, or equivalent will be considered a plus, showcasing your commitment to continuous learning and professional development. Join us at HackHalt - Community and be part of a dedicated team working towards a safer digital landscape.,

Posted 1 week ago

Apply

5.0 - 9.0 years

0 Lacs

karnataka

On-site

You should have a Bachelor's degree in Computer Science, a related technical field, or equivalent practical experience. Additionally, a minimum of 5 years of experience with security assessments, security design reviews, or threat modeling is required. Previous experience in Malware, Reverse Engineering, and Software Development is also essential. Preferred qualifications include expertise in Android reverse engineering (DEX, ARM), malware analysis, threat modeling, incident/emergency response, OS hardening, vulnerability management, pen testing, or cryptographic concepts. Experience in Android application development using C++, Java, or Kotlin is highly valued. A solid technical foundation in security engineering, computer and network security, authentication, security protocols, and applied cryptography is preferred. As a Security Engineer, you will be part of the team responsible for maintaining a secure operating environment for Google's users and developers. Your responsibilities will include working with network equipment, monitoring systems for attacks and intrusions, and collaborating with software engineers to identify and address security vulnerabilities. The Platforms and Devices team focuses on Google's computing software platforms (desktop, mobile, applications) and first-party devices and services. This team works on developing new technologies to enhance user experiences and interactions with computing devices. Key responsibilities of this role include performing reverse engineering to detect malware at scale, promoting security best practices within the Google Play and Android ecosystem, researching potential attack vectors against Android, and collaborating with team members to enhance Android Security and Privacy's understanding of malware detection and mitigation techniques. Proficiency in Python, SQL, and Code Analysis is also desired.,

Posted 1 week ago

Apply

3.0 - 7.0 years

0 Lacs

hyderabad, telangana

On-site

You will be joining RSM, a leading provider of professional services to the middle market globally, with a focus on instilling confidence in a world of change and enabling clients and employees to achieve their full potential. The exceptional team at RSM creates an inclusive culture that values talent and provides a compelling experience for clients. As an associate in Risk Consulting in Hyderabad, Telangana, you will play a key role in supporting ongoing security operations for RSM clients across various industries and locations. Your responsibilities will include investigating security incidents using tools such as SIEM, automation, and cybersecurity technologies like ServiceNow, Stellar Cyber, Hyas Insight, and DNS Protect. You will analyze and escalate critical security incidents, improve existing processes, and challenge procedures in an agile and fast-paced information security environment. Additionally, you will process IDS alerts, perform vulnerability scans, conduct malware analysis, and handle incident intake and reporting of cyber events and threat intelligence. To excel in this role, you should have a minimum B.A. or B.S. degree in computer science, information technology, or a related field, along with 3-5 years of experience in a security operations center or threat intelligence capacity. Possessing a security industry certification such as CYSA+, Security+, CISSP, or SANS GIAC is preferred. A strong understanding of security standards, compliance frameworks, and best practices, including SSAE 16, SOC 2, SOC3, OWASP Top 10, and NIST, is essential. You should also have a curious mindset, basic knowledge of cloud technologies, and experience with operating systems like Windows and Linux. At RSM, we offer a competitive benefits and compensation package, along with flexibility in your schedule to help you balance work and personal life. If you are passionate about cybersecurity and enjoy working in a collaborative team environment, this opportunity to join RSM's Risk Consulting team in Hyderabad, Telangana, may be the perfect fit for you. Apply now to be a part of a dynamic and inclusive organization where your skills and expertise will be valued and nurtured.,

Posted 2 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

karnataka

On-site

NTT DATA is looking for a Crowdstrike Security Analysis Advisor to join their team in Bengaluru, Karnataka, India. As an Information Security Advisor, you will play a crucial role in validating the antivirus strategy for all elements of the IT environment, ensuring compliance with security policies and procedures. Your responsibilities will include installing and testing supported devices, implementing approved changes based on customer requirements, and maintaining system health and status. Key Responsibilities: - Design, architect, and implement services related to antivirus technologies - Implement and manage antivirus projects, including installation, configuration, and troubleshooting of various antivirus suites - Administer ePO server and Distributed Repositories - Configure tasks, policies, and scheduled scans based on client requirements - Monitor and remediate servers/workstations for virus infections and threats - Analyze Defender event logs and conduct vulnerability assessments - Communicate technical information effectively with clients and internal teams - Participate in knowledge sharing and develop customer solutions - Maintain knowledge of security policies and execute general controls as assigned Requirements: - 3-4 years of experience with MS Defender, Purview, Vectra administrator, and monitoring - Other vendor certifications like MS Defender, Purview, Vectra, and Sentinel One are preferred NTT DATA is a global innovator of business and technology services, serving 75% of the Fortune Global 100. With experts in over 50 countries, NTT DATA is committed to helping clients innovate, optimize, and transform for long-term success. Join NTT DATA to be part of a leading provider of digital and AI infrastructure, shaping the digital future confidently and sustainably. Visit us at us.nttdata.com.,

Posted 2 weeks ago

Apply

5.0 - 9.0 years

0 Lacs

pune, maharashtra

On-site

The ideal candidate for this position will succeed if they possess both knowledge and technical depth about the company and the industry. This is crucial as they are expected to play a central role in the decision-making process, collaborating with various individuals from different teams as needed. Additionally, they will be responsible for supervising specific personnel. Responsibilities - Manage and mentor a team of SOC analysts (Tier 1-3) across multiple shifts - Oversee threat hunting, incident response, and security monitoring operations - Develop and refine SOC procedures, playbooks, and escalation processes Qualifications - Bachelor's degree or equivalent experience - Proficiency in Malware Analysis, Threat Hunting, Triage, Incident Response, SIEM, and SOAR - Strong leadership skills,

Posted 3 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

haryana

On-site

We are looking for a certified ethical hacker to assist in enhancing the security of our network against potential threats. Your main responsibility will involve evaluating our company's network, servers, and overall infrastructure to discover any vulnerabilities that may exist. As a certified ethical hacker, you must possess the knowledge and expertise in utilizing various network and security tools, along with a high-level comprehension of computer and network security principles. This includes a deep understanding of encryption and cryptography. Responsibilities Your duties as a certified professional ethical hacker will encompass the following: - Conducting ethical hacking and penetration testing - Performing vulnerability assessments - Analyzing malware - Collaborating with other penetration testers and information security analysts - Ensuring web application security - Executing social engineering tactics - Enhancing database security - Implementing reverse engineering techniques - Safeguarding network security - Conducting threat modeling and risk assessment Job Qualifications and Skill Sets The qualifications necessary for a certified ethical hacker are as follows: - A Bachelor's degree in computer science, information technology security, or a related field - Security certifications such as Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH) - Demonstrated proficiency in penetration tests, vulnerability assessment, and security monitoring - Knowledge of the OSI model, TCP/IP, HTTP, SSL, and wireless networking - Experience with common network infrastructure and security tools - Familiarity with web applications, including HTTP and SQL injection attacks - Understanding of security testing methodologies as per the EC-Council standards - Ability to thrive in a fast-paced work environment,

Posted 3 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

noida, uttar pradesh

On-site

Vserv Academy is a leading provider of industry-recognized IT, hardware, computer networking, cloud infrastructure, and cybersecurity training modules in Noida. Our training programs cater to students and professionals seeking to join the IT industry and develop specialized skills. With courses ranging from computer hardware repair to advanced computer networking and cybersecurity, Vserv Academy ensures top-notch training for a skilled workforce. Our cybersecurity training module, designed by industry leaders with over 20 years of experience, focuses on data center management and security. This is a 3-month on-site role for a Cyber Security Trainer Freelancer at Vserv Academy in Noida. The role involves conducting cybersecurity training sessions, educating students and professionals on application security, network security, information security, and malware analysis. The trainer will work closely with industry experts to deliver high-quality training programs and help learners develop essential cybersecurity skills. The ideal candidate for this role should possess Cybersecurity and Information Security skills, Network Security and Application Security knowledge, Experience in Malware Analysis, a Strong understanding of cybersecurity principles, Relevant certifications in cybersecurity, Excellent communication and presentation skills, Ability to adapt training methods to different audiences, and Experience in the IT industry or cybersecurity training.,

Posted 3 weeks ago

Apply

3.0 - 7.0 years

0 Lacs

delhi

On-site

As an integral part of Aptitech Education, located in New Delhi, you will hold the position of a Cyber Security Trainer, dedicated to enhancing the skills and knowledge of individuals seeking to excel in the field of cybersecurity. Your primary responsibilities will revolve around conducting training sessions, designing curriculum, executing assessments, and offering guidance on various aspects including Application Security, Cybersecurity, Network Security, Information Security, and Malware Analysis. To excel in this role, you are expected to possess a profound understanding and practical experience in Application Security, Cybersecurity, and Information Security. Proficiency in Network Security and Malware Analysis is crucial, alongside a track record in formulating educational content tailored for cybersecurity training. Your expertise should be underscored by recognized certifications like CISSP, CEH, or CompTIA Security+, complemented by a Bachelor's or Master's degree in Computer Science, Information Technology, or a related field. Your commitment to upholding the highest standards of integrity and confidentiality is paramount, as you engage in conducting assessments and delivering constructive feedback to learners. Effective communication skills, both verbal and written, are vital for engaging with students and facilitating their learning journey. Furthermore, your role will extend to mentoring students to align their current capabilities with future skill requirements, ensuring their preparedness for the professional landscape. Join Aptitech Education in empowering aspiring professionals to realize their career aspirations through comprehensive training and skill development in the realm of cybersecurity.,

Posted 3 weeks ago

Apply

6.0 - 10.0 years

5 - 15 Lacs

Noida

Work from Office

Role & responsibilities • Security Incident monitoring & Security Incidents analysis. • Good experience in using SIEM tools. • Knowledge on Threat analysis, evolving Threat landscape. • Knowledge on Event logging and event analysis. • Knowledge on Corporate security products like firewalls, IPS, Web/content Filtering tools, Compliance tools, ITIL process. • Knowledge on Vulnerabilities and threats. • Knowledge on Packet Analysis and Forensic Analysis. • React to attacks observed during incidence monitoring. • Good knowledge about common security attacks, targeted attacks. • Define and act to common security incidents and reporting to stakeholders. • Contributing to continue monitoring and improvement of security posture of the organization.

Posted 3 weeks ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies