Home
Jobs

3 Malware Protection Jobs

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

2.0 - 5.0 years

3 - 13 Lacs

Pune, Maharashtra, India

On-site

Foundit logo

Evaluate the cyber security functionalities of product and improve the security posture. Work for fulfilling security compliance requirements for the products. Perform Threat modeling/ Security assessment for products Perform product hardening, to allow only necessary function for products operation. Cybersecurity functionality verification on control system components Participate in Vulnerability handling of the products competencies Good understanding of cybersecurity principles like cyber security architecture, defense in depth, default deny, least privilege, compartmentalization, privileged initiation, AAA, etc. Good understanding of cyber security controls like; IDS/IPS (host and network), hardening, security policies, Malware Protection, Filtering, NGFW, etc. Knowledge in Networking, patch management. Hands on Experience with protocols like HTTP, HTTPS, SSL, SSH, ICMP, DHCP, L2TP, PPTP, DNS, SNMP, RDP, and NTP. Windows and Virtual Machine Administration. Experience with Security tools like NMAP, Nessus, Wireshark, etc. Certifications like MCP/MCITP/MCSE/CEH/CISSP are advantage. Knowledge on security standards like IEC 62443, ISO 27001. Knowledge on protocols like IEC 61850, Goose, Modbus is an added advantage. ,

Posted 1 week ago

Apply

2.0 - 6.0 years

3 - 11 Lacs

Chennai, Tamil Nadu, India

On-site

Foundit logo

Your Responsibilities: Evaluate the cyber security functionalities of product and improve the security posture. Work for fulfilling security compliance requirements for the products. Perform Threat modeling/ Security assessment for products Perform product hardening, to allow only necessary function for products operation. Cybersecurity functionality verification on control system components Participate in Vulnerability handling of the products Your Background: Bachelor s or Post Graduate Degree in Engineering 2 to 6 years of experience in cybersecurity Good understanding of cybersecurity principles like cyber security architecture, defense in depth, default deny, least privilege, compartmentalization, privileged initiation, AAA, etc. Good understanding of cyber security controls like; IDS/IPS (host and network), hardening, security policies, Malware Protection, Filtering, NGFW, etc. Knowledge in Networking, patch management. Hands on Experience with protocols like HTTP, HTTPS, SSL, SSH, ICMP, DHCP, L2TP, PPTP, DNS, SNMP, RDP, and NTP. Windows and Virtual Machine Administration. Experience with Security tools like NMAP, Nessus, Wireshark, etc. Certifications like MCP/MCITP/MCSE/CEH/CISSP are advantage. Knowledge on security standards like IEC 62443, ISO 27001. Knowledge on protocols like IEC 61850, Goose, Modbus is an added advantage.

Posted 1 week ago

Apply

2.0 - 5.0 years

2 - 5 Lacs

Chennai, Tamil Nadu, India

On-site

Foundit logo

Monitor all theendpoint ,Network ,Cloudand application security incidents. As SOC teammember ,perform the basic investigation and all the security incidents and document the evidence. Performing Security controls health & Compliance check. Adhere to shift timings and provide uninterrupted 24/7 monitoring. Properly share shift handovers, updating the next shift on ongoing incidents and activities. Respond to all security incidents withinaSLA period Resolve incidents assigned to the shift promptly and escalate to theSeniorteam when necessary. Work across all categories of incidents withoutlimitingto specific types. Follow the incident handling as per the documentedSOP. Complete and close all assigned task requests within SLA timelines. Attend weekly and monthly team meetings as mandatory. Qualifications OSINT:knowledge about open-source platforms for analyzing URL, IPAddresses ,suspicious files. EmailAnalysis : Operating Systems:Basics of Linux and Windows, kernel concepts, and system differences. Networking:OSI model, TCP/IP, firewalls, VPNs, proxies, IP addressing, and subnetting. SIEM Tools:Basics of SIEM operations, alerts, and dashboards (e.g., Splunk). Authentication & Access Control:MFA, SSO, and password management best practices. Malware Protection:Antivirus strategies, malware analysis, phishing email analysis, and IOC gathering. Trending CyberAttacks :update knowledge about the trending cyber-attacks &itsattackpatterns .

Posted 1 week ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies