Home
Jobs

277 Nmap Jobs - Page 2

Filter Interviews
Min: 0 years
Max: 25 years
Min: ₹0
Max: ₹10000000
Setup a job Alert
Filter
JobPe aggregates results for easy application access, but you actually apply on the job portal directly.

4.0 years

0 Lacs

Delhi

On-site

GlassDoor logo

Job Description: VAPT lead with experience in vulnerability assessment and penetration testing is preferred The resource should mandatorily have minimum 4 Years experience in VAPT Responsible for planning executing and managing infrastructure level vulnerability assessments and penetration testing activities across the organization s IT landscape Key Responsibilities: Lead and manage end to end Vulnerability Assessment and Penetration Testing VAPT activities across infrastructure components including networks servers endpoints and cloud environments Design and implement VAPT strategies tailored to organizational risk profiles and compliance requirements Conduct thorough assessments to identify security vulnerabilities simulate attack scenarios and evaluate the effectiveness of existing security controls Collaborate with infrastructure network and application teams to validate findings and support remediation efforts Prepare detailed technical reports and executive summaries outlining identified risks impact analysis and recommended mitigation strategies Ensure VAPT activities align with industry standards such as ISO 27001 NIST OWASP and CIS Benchmarks Maintain up to date knowledge of emerging threats tools and techniques in the vulnerability assessment and penetration testing domain Technical Requirements: Proven experience in conducting infrastructure level Vulnerability Assessment and Penetration Testing VAPT across networks servers endpoints and cloud environments Strong hands on expertise with VAPT tools such as Nessus Qualys Nmap Metasploit Burp Suite etc In depth understanding of network protocols system configurations and common vulnerabilities in enterprise IT environments Ability to identify analyze and prioritize security vulnerabilities and provide detailed remediation guidance to technical teams Preferred Skills: Technology->Application Security->Vulnerability Management

Posted 2 days ago

Apply

5.0 - 8.0 years

4 - 8 Lacs

Hyderabad

Work from Office

Naukri logo

1. Conduct vulnerability scan using Prisma's cloud vulnerability scanning features to identify vulnerabilities in cloud resources . 2. Assess and monitor security posture of Kubernetes clusters, including network policies, pod configurations and container runtime security. 3. Leverage Prisma cloud's automated vulnerability risk scoring to evaluate severity of vulnerabilities 4. Work with teams to prioritize vulnerabilities based on severity, exploitability & potential business impact. 5. Ensure organization's cloud infrastructure complies with industry standards 6. Use Prisma cloud to scan Kubernetes clusters and container registries for known vulnerabilities and misconfigurations 7. Create vulnerability reports that detail discovered vulnerabilities, risk analysis and remediation actions.

Posted 2 days ago

Apply

5.0 years

0 Lacs

Delhi, India

On-site

Linkedin logo

Job description As a Security Engineer - VAPT, you will be responsible for conducting comprehensive security assessments, identifying vulnerabilities, and implementing effective remediation strategies. Leveraging your expertise in penetration testing and ethical hacking, you will play a key role in enhancing the security posture of our clients' systems and networks. This position offers an exciting opportunity to work on challenging projects, collaborate with talented professionals, and contribute to the advancement of cybersecurity practices. Key Responsibilities: Perform end-to-end Vulnerability Assessment and Penetration Testing (VAPT) for clients' IT infrastructure, applications, and networks. Conduct thorough security assessments using industry-standard tools and methodologies, including but not limited to, Nmap, Nessus, Metasploit, Burp Suite, and OWASP. Identify and exploit security vulnerabilities to assess the potential impact on clients' systems and data. Prepare detailed assessment reports outlining findings, risk levels, and recommended remediation measures. Collaborate with clients' IT teams to prioritize and address identified security issues in a timely manner. Develop and implement custom scripts or tools to enhance testing capabilities and automate repetitive tasks. Stay abreast of emerging security threats, vulnerabilities, and industry best practices to continually improve testing methodologies. Provide guidance and mentorship to junior security engineers, fostering a culture of knowledge sharing and skill development within the team. Requirements: Bachelor's degree in Computer Science, Information Technology, or related field. 5+ years of experience in cybersecurity, with a focus on Vulnerability Assessment and Penetration Testing. Proficiency in using tools such as Nmap, Nessus, Metasploit, Burp Suite, and OWASP. Hands-on experience with various operating systems, including Windows, Linux, and Unix. Strong understanding of network protocols, web application architecture, and common security vulnerabilities. Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or similar certifications preferred. Excellent analytical skills and attention to detail, with the ability to prioritize and manage multiple tasks effectively. Effective communication skills, both verbal and written, with the ability to convey technical concepts to non-technical stakeholders. Proven track record of delivering high-quality security assessments and actionable recommendations

Posted 2 days ago

Apply

3.0 - 6.0 years

0 Lacs

Pune, Maharashtra, India

On-site

Linkedin logo

Come work at a place where innovation and teamwork come together to support the most exciting missions in the world! The Technical Account Manager (TAM) is responsible for actively driving the sales process with direct and channel customers. The TAM must be able to articulate the Company's technology and product positioning to both business and technical users. He/she must be able to identify all technical and business issues of aligned accounts to ensure customer satisfaction, through all stages of the sales process. Must be able to establish and maintain strong relationships throughout the sales cycle. Responsibilities: Provide product and technical support for assigned accounts. Support, manage and sell to SMB Customers with defined geographic territory. Drive a culture of success through product expertise and positive account management. Provide accurate forecasting on Sales pipeline. Carefully monitor the quality of all services Qualys delivers to the customer by conducting QBRs (Quarterly Business Reviews) and ensuring adoption of technology and discovering upsell opportunity. Engage with channel partners and provide accurate renewal quotes. Raise any necessary alert for the customer’s business or technical situation in a timely manner. Work closely with customers to grow and expand the implementation/integration of Qualys products and services. Act as customer advocate with focus on improving customer contentment. Qualification: The ideal candidate will come from a security and/or networking background while performing an engineering, administration, or support role with 3-6 years of experience. General knowledge of current IT security fields including Firewall, Intrusion Detection Systems IDS, Intrusion Prevention Systems IPS, Vulnerability Management, Network Scanners (Nessus, nmap, Scan alert, ISS Internet Scanner), PCI, Policy Compliance/GRC-IT and Audit Tools is a plus. General knowledge of Desktop and Server operating system configuration, TCP/IP networking hardware, protocols, and LAN configuration, knowledge of LAN and WAN technologies, network design, and web security architectures is a plus. Ability to understand network and security infrastructure elements on advising how best to use Qualys products on cloud platforms. Must have a strong technical background and possess an excellent work ethic with a “make it happen” attitude. Excellent written and verbal communication skills. Works well in small group settings. A strong desire to be a customer-facing, technical solution expert. Extensive use of CRM (preferably salesforce.com) to maintain accurate activity, contact and account information of all customers. Ability to work rotational hours supporting global customers. Preferred Qualification: 3 - 6 years of equivalent experience in consulting or account management. Preferred pre-sales experience in computer networking or information security or public clouds. Candidates from STEM preferred.

Posted 2 days ago

Apply

6.0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Experience Required: - 6 to 8 Years Location:- Noida Role Overview- We are seeking a skilled and driven Sr. Security Engineer with a strong background in penetration testing (web, mobile, and network) and an understanding of security compliance standards such as SOC 2, ISO 27001, and GDPR. The ideal candidate will have hands-on experience identifying and exploiting vulnerabilities, preparing technical and compliance reports, and guiding clients or internal teams on remediation and governance. Key Responsibilities- • Conduct penetration testing of web applications, mobile apps (iOS/Android), and internal/external networks. • Perform vulnerability assessments and risk evaluations across client environments. • Create detailed technical and executive reports with prioritized remediation strategies. • Assist in SOC 2 readiness assessments, ISO 27001 implementation, and GDPR compliance checks. • Collaborate with cross-functional teams for remedial activities to improve the security posture. • Stay updated with the latest exploits, tools, and compliance updates. Required Qualifications- • 6-8 years of experience in cybersecurity with a focus on penetration testing and compliance. • Proficiency in tools like Burp Suite, Nmap, Metasploit, Nessus, MobSF, and manual testing techniques. • Strong knowledge of OWASP Top 10, secure coding practices, network protocols, and common attack vectors. • Understanding of SOC 2, ISO 27001, GDPR, and associated implementation or audit processes. Certifications (Preferred)- • CEH (Certified Ethical Hacker) • ISO/IEC 27001 Lead Auditor / Lead Implementer • Other relevant certs: e.g., CompTIA Security+, eWPT, eCPPT, GPEN Nice-to-Have Skills- • Familiarity with DevSecOps pipelines, source code reviews, or CI/CD security integration. • Client-facing consulting experience or report presentation skills. • Cyber Security vibe is a must.

Posted 3 days ago

Apply

0 years

0 Lacs

Pune, Maharashtra, India

Remote

Linkedin logo

Technical Skills Required: Mandatory: • Good knowledge in Networking and troubleshooting tools- DNS, DHCP, TLS, SSL, security Protocols, Routing, Packet data analysing, Prior experience in working with Wireshark, Nmap, http analyser, Debug view etc. • Knowledge in VAPT analysis & Security • knowledge about security software such as DLP, firewalls (End point security are add on) Product and Application Support a) Good experience in product and application support with sound knowledge of networking and IT Infrastructure b) Must have worked on supporting any enterprise security applications like zero trust, Identity Management solution, Multifactor Authentication Solution c) Any support experience in Virtualization products coming from Citrix, Microsoft, Dell, etc. d) Should have worked with any reverse proxy solutions e) Should understand how key web servers can be troubleshooted like Apache, NGINX, TOMCAT, IIS, etc. f) OWASP Application Security Guidelines g) How typically big enterprise support product installation and upgrades are managed and how the patch management is done h) Knowledge of Power-shell scripting, Linux shell scripting, and Python Infra Support a) Excellent knowledge in Windows Server operating systems & Roles - Active directory, Group policies, Remote Desktop services, IIS, FSMO roles. b) Process data analyzing, Windows sys- internals tools knowledge will be add on. Batch and PowerShell scripting will be desirable c) Work experience in Client-side operating systems - Windows 7,8,10 are must d) Very good Working knowledge in Linux & Mac operating systems Support Management and Tools knowledge a) Good knowledge of L1 and L2 Ticket tracking tools b) Good Knowledge of Service level management tools c) Should be able to manage escalations and the agreed and provided SLA for various clients d) Should be able to provide reports for any escalations, Root cause Analysis (RCA) , Productivity reports e) Must make sure escalations are managed at root level and there is zero repeat escalations f) Excellent knowledge on Server Operating systems (Win 2016/19/22, Linux flavors) g) Proficient in Networking - DNS, DHCP, basic routing concepts, network monitoring commands & tools, h) Good knowledge in IT Infrastructure & Security concepts -Storage, File servers, SSL certificates, VPNs gateways, VAPT analysis, UTMS etc i) Good knowledge in Azure Cloud, conceptual understanding in Desktop as service, working experience in Azure Virtual Desktop / equivalent products Role and Responsibilities: • To provide solutions, not workarounds • Good listener to customer, provide on time deliveries; Involve appropriate authorities when escalations are required • Make sure Support deliveries are under SLAs • Provide Solution documents, KB articles & RCAs and make sure team members are following the process • Proactively involve in escalations and make sure customer commitments are met • Coordinate with Product Management team for bug fixes, new feature escalations & development related items and make sure on time resolution • Good with Statistical data, analyze priorities and involve in the product improvement discussions • work as a leader of special or Ongoing requirements • Use appropriate judgement during critical environments. • Reproduce customer issues and if required, analyse the root cause; Check and verify any viable solutions available other than development – such as creating scripts, simple solutions etc.

Posted 3 days ago

Apply

0 years

0 Lacs

Delhi Cantonment, Delhi, India

On-site

Linkedin logo

Proven experience in conducting infrastructure-level Vulnerability Assessment and Penetration Testing (VAPT) across networks, servers, endpoints, and cloud environments. Strong hands-on expertise with VAPT tools such as Nessus, Qualys, Nmap, Metasploit, Burp Suite etc. In-depth understanding of network protocols, system configurations, and common vulnerabilities in enterprise IT environments. Ability to identify, analyze, and prioritize security vulnerabilities, and provide detailed remediation guidance to technical teams. Lead and manage end-to-end Vulnerability Assessment and Penetration Testing (VAPT) activities across infrastructure components including networks, servers, endpoints, and cloud environments. Design and implement VAPT strategies tailored to organizational risk profiles and compliance requirements. Conduct thorough assessments to identify security vulnerabilities, simulate attack scenarios, and evaluate the effectiveness of existing security controls. Collaborate with infrastructure, network, and application teams to validate findings and support remediation efforts. Prepare detailed technical reports and executive summaries outlining identified risks, impact analysis, and recommended mitigation strategies. Ensure VAPT activities align with industry standards such as ISO 27001, NIST, OWASP, and CIS Benchmarks. Maintain up-to-date knowledge of emerging threats, tools, and techniques in the vulnerability assessment and penetration testing domain.

Posted 3 days ago

Apply

0 years

0 Lacs

Noida, Uttar Pradesh, India

On-site

Linkedin logo

Employment Type: Contract to hire City: Noida State: Description: Summary: A highly skilled and experienced Technical Security Auditor with deep expertise in vulnerability scanning, and network security assessment. Possesses a strong understanding security auditing methodology. Committed to providing comprehensive and actionable security assessments to help organizations strengthen their defenses. Key Skills: ● Security Auditing: Expertise in conducting technical security audits across various systems, networks, and applications. ● Log Management: Responsible for implementing, and optimizing logging infrastructure to ensure efficient, relevant, and high-quality data ingestion into our Security Information and Event Management (SIEM). ● Vulnerability Scanning: Advanced proficiency in using vulnerability scanning tools (e.g., Nessus, Qualys, OpenVAS) to identify security weaknesses. ● Network Scanning: Deep understanding of network scanning techniques and tools (e.g., Nmap, etc) for network discovery and vulnerability identification. ● Exploit Development: Knowledge of exploit development methodologies and techniques for identifying and exploiting vulnerabilities. ● Risk Assessment: Ability to assess and evaluate security risks and prioritize remediation efforts. ● Network Security: Knowledge of network protocols, firewalls, intrusion detection/prevention systems (IDS/IPS), and VPNs. ● Operating Systems and Applications: Familiarity with various operating systems (Windows, Linux, macOS) and applications. ● Cloud Security: Experience with penetration testing and vulnerability scanning in cloud environments (e.g., AWS, Azure, GCP). ● Scripting and Automation: Proficiency in scripting languages (e.g., Python, PowerShell) for automating security testing tasks. ● Documentation and Reporting: Excellent documentation and reporting skills, with the ability to clearly communicate audit findings and recommendations. ● Communication and Collaboration: Strong communication, interpersonal, and collaboration skills. Ability to work effectively with technical and non-technical stakeholders. Experience: ● Assisted in the development and implementation of security policies and procedures. ● Conducted numerous penetration tests and vulnerability assessments for various organizations, identifying critical vulnerabilities and security gaps. ● Worked with IT and security teams to remediate audit findings. ● Utilized a wide range of penetration testing tools and techniques to exploit vulnerabilities and assess security posture. ● Performed network scanning and analysis to identify network devices, and services. ● Developed and executed comprehensive penetration testing plans and reports. ● Provided expert guidance and training to clients on security best practices and remediation strategies. Education: ● Bachelor’s degree in computer science, Cybersecurity, or a related field. ● Relevant industry certifications (e.g., OSCP, GPEN, GXPN, CISSP, CEH).

Posted 3 days ago

Apply

12.0 - 17.0 years

10 - 15 Lacs

Bengaluru

Work from Office

Naukri logo

Job Summary Experienced Vulnerability Management and penetration testing Governance lead will manage a team to oversee the identification, assessment, and remediation of security vulnerabilities across enterprise systems. This role will focus on establishing a proactive security posture, ensuring compliance with industry standards, and driving governance initiatives to mitigate risks effectively along with strong leadership and project management skills. Vulnerability Assessment: Lead regular vulnerability scans and penetration testing across infrastructure, cloud environments and outside-In. Security Baseline: Lead development and implementation of Security Baseline using CIS Benchmarks by determining the systems, applications, and network devices to be secured (e.g., Windows, Linux, Cloud, Docker, Kubernetes). Risk Analysis & Prioritization: Evaluate identified vulnerabilities based on severity, exploitability, and potential business impact. Remediation Planning: Collaborate with IT, security, engineering and entity teams to ensure timely remediation of high-risk vulnerabilities. Governance & Compliance: Develop and enforce security governance frameworks in line with industry standards (e.g., NIST, CIS, ISO 27001, PCI-DSS). Threat Intelligence Integration Leverage global threat intelligence feeds to stay ahead of emerging security threats and vulnerabilities. Security Policy Development: Define policies and best practices for vulnerability management, reporting, and remediation. Automation & Continuous Monitoring: Implement automated vulnerability scanning tools and ensure ongoing security assessments. Incident Response Support: Provide technical guidance in vulnerability-related security incidents and audits. Reporting & Metrics: Establish key risk indicators and provide executive reports on vulnerability trends and remediation progress. Experience: 12+ years in cybersecurity, vulnerability management, or Penetration testing roles. Technical Expertise: Hands-on experience with vulnerability scanning tools (e.g., Qualys, Tenable, Rapid7, Nessus, OpenVAS), penetration testing and threat intelligence platforms. Penetration Testing & Ethical Hacking Experience with tools like Metasploit, Burp Suite, Nmap, and Wireshark for real-world security assessments. Security Framework Knowledge: Strong understanding of NIST, CIS benchmarks, OWASP Top 10, and CVSS scoring models. Compliance Awareness: Familiarity with regulatory standards affecting security risk management. Leadership & Communication: Ability to coordinate with multiple stakeholders, drive security improvements, and articulate risks effectively. Certifications such as CISSP, CISM, CEH, OSCP or equivalent. Experience in cloud vulnerability management (AWS, Azure, GCP). Knowledge of DevSecOps practices and security automation. Reinvent your world.We are building a modern Wipro. We are an end-to-end digital transformation partner with the boldest ambitions. To realize them, we need people inspired by reinvention. Of yourself, your career, and your skills. We want to see the constant evolution of our business and our industry. It has always been in our DNA - as the world around us changes, so do we. Join a business powered by purpose and a place that empowers you to design your own reinvention. Come to Wipro. Realize your ambitions. Applications from people with disabilities are explicitly welcome.

Posted 3 days ago

Apply

2.0 - 5.0 years

12 - 15 Lacs

Jaipur

Work from Office

Naukri logo

Sankara Eye Foundation is looking for Consultant Vitreo Retina & Paediatric Ophthalmology to join our dynamic team and embark on a rewarding career journey Diagnose and treat retina disorders in children and adults Perform surgical interventions and follow-up care Guide patients on visual rehabilitation Lead research and training initiatives

Posted 3 days ago

Apply

4.0 - 9.0 years

7 - 8 Lacs

Bengaluru

Work from Office

Naukri logo

No of years experience 4+ Years Detailed job description - Skill Set: 4+ years of experience in UI development using reactjs with deep understanding of react hooks, session, cookies, state management Deep insight on UI performance, security, cross site scripting, large data handling Using GraphQL for API query Mandatory Skills React JS Work Location Bangalore, Mysore

Posted 3 days ago

Apply

0.0 years

1 - 2 Lacs

India

On-site

GlassDoor logo

Job Title: Cyber Security Trainer (CEH | VAPT | WPT) Location: Delhi Job Type: Full-time Experience: 0–5 years (Freshers & Experienced Candidates Welcome) Salary: Competitive — based on experience and skills Job Overview: CyberON Technologies is looking for a passionate Cyber Security Trainer to deliver training in Certified Ethical Hacking (CEH), Vulnerability Assessment & Penetration Testing (VAPT), and Web Penetration Testing (WPT). This role offers the chance to inspire and mentor the next generation of ethical hackers and cybersecurity professionals. Key Responsibilities: Deliver engaging training sessions (online/offline) on CEH, VAPT, and WPT Design course content, labs, and practical exercises Prepare study material, practice tests, and real-world scenarios Assess student progress and provide feedback Stay updated with the latest cybersecurity trends and tools Provide mentorship and conduct doubt-clearing sessions Help students prepare for certifications like CEH Required Skills and Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field (preferred, not mandatory) Good understanding of network security, web security, ethical hacking, penetration testing Knowledge of CEH, OWASP Top 10, Kali Linux, Metasploit, Burp Suite, Nmap, Wireshark Strong communication and presentation skills Ability to simplify technical concepts CEH or equivalent certification (preferred for experienced candidates) Preferred (for experienced candidates): 1+ years of experience in cybersecurity training or a cybersecurity role Hands-on experience with VAPT tools and methodologies Experience with security assessments or bug bounty programs Freshers encouraged to apply if: You have a strong interest in cybersecurity (through online courses, self-learning, or personal projects) You can explain technical concepts confidently You want to build a career in training and mentoring Why Join CyberON Technologies? Opportunity to shape future cybersecurity professionals Supportive, growth-oriented work environment Flexible working hours Access to the latest cybersecurity tools, labs, and continuous learning To Apply: Send your resume and a brief statement of interest to: hr@cyberon.in Shortlisted candidates will be invited for a technical evaluation and demo session. Job Types: Full-time, Permanent, Fresher Pay: ₹10,000.00 - ₹20,000.00 per month Benefits: Flexible schedule Schedule: Day shift Work Location: In person

Posted 3 days ago

Apply

1.0 years

2 - 4 Lacs

Delhi

On-site

GlassDoor logo

Instructor & Facilitator Deliver comprehensive training on topics covered in the OSCP syllabus (e.g., buffer overflows, privilege escalation, exploitation techniques). Explain offensive security concepts in a structured, practical, and easy-to-understand manner. Facilitate hands-on lab sessions and live demonstrations. Curriculum Designer / Content Developer Develop or customize OSCP-aligned training content. Update materials regularly to reflect changes in penetration testing tools and techniques. Create practice labs, CTF-style challenges, and mock exams. Mentor & Coach Provide one-on-one mentorship and guidance to students. Assist students in building their methodology, documentation, and report writing skills. Support students in time management, stress handling, and exam preparation strategies. Technical Expert Stay current with the latest vulnerabilities, exploits, and cybersecurity trends. Use real-world case studies and tools like Metasploit, Nmap, Burp Suite, and manual exploitation methods. Ensure students understand both automated and manual penetration testing approaches. Assessment & Feedback Provider Assess student performance during labs and mock tests. Offer constructive feedback to help students improve. Identify and support struggling learners. Lab & Infrastructure Support Set up and maintain penetration testing labs. Ensure all tools, VMs, and vulnerable systems are functional and up to date. Provide technical assistance to students facing lab environment issues. Soft Skills & Reporting Guidance Teach students how to document findings in a professional pentest report format (aligned with OSCP requirements). Help students develop communication skills for presenting findings to stakeholders. Ethical & Legal Guidance Reinforce ethical hacking practices and legal boundaries. Emphasize responsible disclosure and client safety protocols. Website: www.craw.in Required Qualifications: OSCP certification (mandatory). CRTP certification, CRTO certification. 1+ years of experience in penetration testing or ethical hacking. Strong knowledge of networking, Linux, Windows, web/app vulnerabilities, and exploit development. Familiarity with tools like Nmap, Burp Suite, Metasploit, Netcat, Python, etc. Prior experience as a trainer/instructor is a plus. Excellent verbal and written communication skills. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹40,000.00 per month Benefits: Paid sick time Paid time off Schedule: Day shift Morning shift Rotational shift Ability to commute/relocate: New Delhi, Delhi - 110030, Delhi: Reliably commute or planning to relocate before starting work (Preferred)

Posted 3 days ago

Apply

2.0 years

0 Lacs

India

On-site

GlassDoor logo

Job Title: Cyber Security Trainer Location: Hyderabad, Telangana Experience Required: Minimum 2 years in cybersecurity training or industry roles Employment Type: Full-Time, Onsite Job Summary: We are looking for a passionate and skilled Cyber Security Trainer to join our team in Hyderabad. The ideal candidate will have strong hands-on experience in cybersecurity operations, tools, and frameworks, along with a flair for training and mentoring aspiring security professionals. You will be responsible for delivering interactive, practical, and industry-relevant cybersecurity training sessions. Key Responsibilities: Curriculum Design & Updates: Design, develop, and continuously update training modules covering network security, ethical hacking, cryptography, threat intelligence, digital forensics, secure coding practices, vulnerability assessment, and incident response strategies . Training Delivery: Conduct engaging, hands-on classroom and lab sessions with live demonstrations, simulations, and practical exercises using tools like Kali Linux, Nmap, Wireshark, Metasploit , and other security utilities. Assessments & Practical Labs: Design and manage quizzes, hands-on exercises, simulated cyber-attack scenarios, and real-world case studies to assess learners' knowledge and skills. Provide constructive feedback and personalized guidance. Industry-Relevant Content: Stay up to date with latest cybersecurity threats, tools, defense techniques, and frameworks , integrating them into the training curriculum and aligning with certification requirements like CEH, CISSP, Security+ . Mentorship & Career Support: Mentor students on technical queries, career preparation, mock interviews, and skill-building exercises throughout the program. Stakeholder Collaboration: Coordinate with curriculum teams, enterprise clients, and internal technical staff to adapt training content for various audiences, including specialized non-technical cybersecurity awareness programs. Required Qualifications & Skills: Bachelor's degree in Computer Science, Information Technology , or a related field. Minimum 2 years of practical experience in cybersecurity operations (such as penetration testing, network security, incident response) along with training, mentoring, or technical instructional experience. Technical Expertise In: Cybersecurity Tools: Kali Linux, Wireshark, Nmap, Metasploit, vulnerability assessment tools Core Concepts: Network architecture, encryption, secure coding, ethical hacking, incident response workflows Familiarity with digital forensics, log analysis, SIEM platforms, security framework compliance (ISO 27001, NIST) Excellent content design, presentation, and instructional delivery skills Strong student engagement, mentoring, and troubleshooting abilities

Posted 3 days ago

Apply

0.0 - 5.0 years

0 - 0 Lacs

Laxmi Nagar, Delhi, Delhi

On-site

Indeed logo

Job Title: Cyber Security Trainer (CEH | VAPT | WPT) Location: Delhi Job Type: Full-time Experience: 0–5 years (Freshers & Experienced Candidates Welcome) Salary: Competitive — based on experience and skills Job Overview: CyberON Technologies is looking for a passionate Cyber Security Trainer to deliver training in Certified Ethical Hacking (CEH), Vulnerability Assessment & Penetration Testing (VAPT), and Web Penetration Testing (WPT). This role offers the chance to inspire and mentor the next generation of ethical hackers and cybersecurity professionals. Key Responsibilities: Deliver engaging training sessions (online/offline) on CEH, VAPT, and WPT Design course content, labs, and practical exercises Prepare study material, practice tests, and real-world scenarios Assess student progress and provide feedback Stay updated with the latest cybersecurity trends and tools Provide mentorship and conduct doubt-clearing sessions Help students prepare for certifications like CEH Required Skills and Qualifications: Bachelor’s degree in Computer Science, Information Security, or related field (preferred, not mandatory) Good understanding of network security, web security, ethical hacking, penetration testing Knowledge of CEH, OWASP Top 10, Kali Linux, Metasploit, Burp Suite, Nmap, Wireshark Strong communication and presentation skills Ability to simplify technical concepts CEH or equivalent certification (preferred for experienced candidates) Preferred (for experienced candidates): 1+ years of experience in cybersecurity training or a cybersecurity role Hands-on experience with VAPT tools and methodologies Experience with security assessments or bug bounty programs Freshers encouraged to apply if: You have a strong interest in cybersecurity (through online courses, self-learning, or personal projects) You can explain technical concepts confidently You want to build a career in training and mentoring Why Join CyberON Technologies? Opportunity to shape future cybersecurity professionals Supportive, growth-oriented work environment Flexible working hours Access to the latest cybersecurity tools, labs, and continuous learning To Apply: Send your resume and a brief statement of interest to: hr@cyberon.in Shortlisted candidates will be invited for a technical evaluation and demo session. Job Types: Full-time, Permanent, Fresher Pay: ₹10,000.00 - ₹15,000.00 per month Benefits: Flexible schedule Schedule: Day shift Work Location: In person

Posted 4 days ago

Apply

0.0 years

0 - 0 Lacs

Delhi, Delhi

On-site

Indeed logo

Instructor & Facilitator Deliver comprehensive training on topics covered in the OSCP syllabus (e.g., buffer overflows, privilege escalation, exploitation techniques). Explain offensive security concepts in a structured, practical, and easy-to-understand manner. Facilitate hands-on lab sessions and live demonstrations. Curriculum Designer / Content Developer Develop or customize OSCP-aligned training content. Update materials regularly to reflect changes in penetration testing tools and techniques. Create practice labs, CTF-style challenges, and mock exams. Mentor & Coach Provide one-on-one mentorship and guidance to students. Assist students in building their methodology, documentation, and report writing skills. Support students in time management, stress handling, and exam preparation strategies. Technical Expert Stay current with the latest vulnerabilities, exploits, and cybersecurity trends. Use real-world case studies and tools like Metasploit, Nmap, Burp Suite, and manual exploitation methods. Ensure students understand both automated and manual penetration testing approaches. Assessment & Feedback Provider Assess student performance during labs and mock tests. Offer constructive feedback to help students improve. Identify and support struggling learners. Lab & Infrastructure Support Set up and maintain penetration testing labs. Ensure all tools, VMs, and vulnerable systems are functional and up to date. Provide technical assistance to students facing lab environment issues. Soft Skills & Reporting Guidance Teach students how to document findings in a professional pentest report format (aligned with OSCP requirements). Help students develop communication skills for presenting findings to stakeholders. Ethical & Legal Guidance Reinforce ethical hacking practices and legal boundaries. Emphasize responsible disclosure and client safety protocols. Website: www.craw.in Required Qualifications: OSCP certification (mandatory). CRTP certification, CRTO certification. 1+ years of experience in penetration testing or ethical hacking. Strong knowledge of networking, Linux, Windows, web/app vulnerabilities, and exploit development. Familiarity with tools like Nmap, Burp Suite, Metasploit, Netcat, Python, etc. Prior experience as a trainer/instructor is a plus. Excellent verbal and written communication skills. Job Types: Full-time, Permanent Pay: ₹20,000.00 - ₹40,000.00 per month Benefits: Paid sick time Paid time off Schedule: Day shift Morning shift Rotational shift Ability to commute/relocate: New Delhi, Delhi - 110030, Delhi: Reliably commute or planning to relocate before starting work (Preferred)

Posted 4 days ago

Apply

0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

About Pennant Technologies Pennant Technologies is an agile, innovative financial technology company that powers the lending operations of global banks and financial institutions - HDFC, Bajaj FinServ, LIC HFL, Godrej HFL, RAK Bank, QNB to name a few. Its suite of future ready lending products and solutions offer banks composable features and scalable capabilities to deliver differentiated loan origination, servicing and collections experiences for their customers. Trusted by leading banks and financial institutions in Asia, Pennants award-winning lending platform has managed more than 10 million loans and facilitates 50 million loan transactions per year. Pennant is HQ in Hyderabad and have offices and/ business operations in India, ME, Saudi, Australia, Philippines and UK. We are aggressively expanding across the geographies and adding to our 370+ workforce, spread across multiple locations. Pennant is looking for experienced security analyst to support Security Operations. Identified candidate will be member of the Pennant Information Security Team, as a Senior Security Analyst with Pen Testing expertise, Will focus on information security core areas such as Security operations & Pen Testing This position is based out of Hyderabad, expected to work during India business hours from office, 5 days a week. Key Responsibilities Conduct internal and external penetration tests on networks, wireless, web applications, APIs, Data Centre and SaaS/cloud environments Assist in day-to-day security operations and security events as they occur, helping to respond to alerts from multiple security tools (Sophos, Fortinet, Staff Cop, Microsoft Azure etc) Strong desire to understand the what as well as the why and the how of security incidents, includes detection & monitoring, perform deep analysis / triage, provide incident response Document and present findings with risk-based recommendations Maintain up-to-date knowledge of threats, attack techniques, and security trends Use and customize tools like Kali Linux, Metasploit, Burp Suite, Nmap, and custom Skills : Ability to quickly monitor & correlate logs from multiple security tools Working knowledge of security test analysis and enterprise level mitigation strategies Understanding of the OWASP Top 10, MITRE ATT&CK framework, and various security frameworks Working knowledge of operating systems and networking technologies Knowledge of cyber threats, defences, motivations and Qualifications : Bachelors degree in computer science, Information Technology, or a related field Solid foundational knowledge of security concepts (ref:hirist.tech)

Posted 4 days ago

Apply

5.0 - 10.0 years

6 - 12 Lacs

Mumbai Suburban, Navi Mumbai, Mumbai (All Areas)

Work from Office

Naukri logo

Vulnerability Assessment & Penetration Testing & configuration review for network, web app, mobile app & thick-client app Configuration reviews for OS ,DB, Firewall, routers, Switches Prepare Threat Intelligence reports Cyber-attack simulations Required Candidate profile Vulnerability Assessment Penetration Testing (PT) Web App Security Knowledge of security assessment tools e.g, Nessus, Acunetix, Appscan, nmap, etc Knowledge of OS -Linux/ UNIX Perks and benefits +++ 10% Perf Bonus + Mediclaim + 30% Company Bonus

Posted 4 days ago

Apply

10.0 - 14.0 years

8 - 13 Lacs

Bengaluru

Work from Office

Naukri logo

Skill required: Tech for Operations - Security Governance Designation: Security Delivery Associate Manager Qualifications: BE/Master of Engineering Years of Experience: 10 to 14 years About Accenture Combining unmatched experience and specialized skills across more than 40 industries, we offer Strategy and Consulting, Technology and Operations services, and Accenture Song all powered by the worlds largest network of Advanced Technology and Intelligent Operations centers. Our 699,000 people deliver on the promise of technology and human ingenuity every day, serving clients in more than 120 countries. Visit us at www.accenture.com What would you do You will be part of the Technology for Operations team that acts as a trusted advisor and partner to Accenture Operations. The team provides innovative and secure technologies to help clients build an intelligent operating model, driving exceptional results. We work closely with the sales, offering and delivery teams to identify and build innovative solutions.The Tech For Operations (TFO) team provides innovative and secure technologies to help clients build an intelligent operating model, driving exceptional results. Works closely with the sales, offering and delivery teams to identify and build innovative solutions. Major sub deals include AHO(Application Hosting Operations), ISMT (Infrastructure Management), Intelligent AutomationA process of establishing and maintaining a security governance framework. Support management structure and processes to provide assurance that information security strategies are aligned with and support business objectives are consistent with applicable laws and regulations through adherence to policies and internal controls, and provide assignment of responsibility, metrics, reporting all in an effort to manage the risk and compliance requirements. What are we looking for Commitment to qualityExperience in research and developmentNegotiation skillsProblem-solving skillsRisk managementThe role demands Indepth knowledge in application security area. Candidate should have hands on experience in SAST, DAST, Penetration testing. DevSecOps and Software composition analysis are other areas where the candidate should have experience in.The role also demands capability of scripting using Python and other related required knowledge of database and networking.Certifications like CISSP, CCSP, CISM, CEH, ECSA etc. will be added advantage. Roles and Responsibilities: In this role you are required to do analysis and solving of moderately complex problems Typically creates new solutions, leveraging and, where needed, adapting existing methods and procedures The person requires understanding of the strategic direction set by senior management as it relates to team goals Primary upward interaction is with direct supervisor or team leads Generally interacts with peers and/or management levels at a client and/or within Accenture The person should require minimal guidance when determining methods and procedures on new assignments Decisions often impact the team in which they reside and occasionally impact other teams Individual would manage medium-small sized teams and/or work efforts (if in an individual contributor role) at a client or within Accenture Please note that this role may require you to work in rotational shifts Qualification BE,Master of Engineering

Posted 4 days ago

Apply

4.0 years

0 Lacs

Gurugram, Haryana, India

On-site

Linkedin logo

Job Title: VAPT Consultant Location: Gurgaon, Delhi NCR (Work from Office) Experience: 4+ Years Certifications: OSCP - Mandatory Joining: Immediate joiners preferred Job Description: We are seeking a highly skilled and motivated VAPT Consultant with a strong background in Vulnerability Assessment and Penetration Testing. The ideal candidate must hold an OSCP certification and possess hands-on experience in identifying and mitigating security vulnerabilities in networks, web applications, and infrastructure. Key Responsibilities: Perform Vulnerability Assessments and Penetration Testing (Web, Mobile, Network, APIs, Cloud, etc.) Simulate real-world attacks to identify and exploit vulnerabilities Prepare detailed technical reports , risk ratings, and remediation recommendations Collaborate with development and infrastructure teams to close security gaps Stay updated with the latest vulnerabilities, hacking techniques, and threat vectors Assist in security audits , threat modeling, and risk assessments Contribute to red team/blue team security exercises and internal security knowledge building Required Skills: Minimum 4 years of hands-on VAPT experience OSCP Certification is mandatory Strong knowledge of OWASP Top 10, MITRE ATT&CK framework Proficient in using tools like Burp Suite, Nmap, Nessus, Metasploit, Kali Linux, Wireshark, etc. Experience in scripting (Python, Bash, or PowerShell) is an added advantage Understanding of network protocols, firewalls, and security controls Excellent analytical, communication, and reporting skills Preferred Qualifications: Experience with cloud security assessments (AWS, Azure, GCP) Exposure to red teaming or purple teaming engagements Ability to clearly communicate findings to both technical and non-technical stakeholders

Posted 4 days ago

Apply

15.0 years

0 Lacs

Hyderabad, Telangana, India

On-site

Linkedin logo

Job Description: About the Company: Join AT&T and reimagine the communications and technologies that connect the world. Our Chief Security Office ensures that our assets are safeguarded through truthful transparency, enforce accountability and master cybersecurity to stay ahead of threats. Bring your bold ideas and fearless risk-taking to redefine connectivity and transform how the world shares stories and experiences that matter. When you step into a career with AT&T, you won’t just imagine the future-you’ll create it. About the Job: As part of the AT&T Governance Enforcement, Assessment and Testing, Third Party Risk, and Emerging Technology Cyber Organization (GATE), you will lead and support the Assessment and Testing Team by designing and executing Red team engagements to simulate advanced attack scenarios, identify vulnerabilities, and assess security measures. The functional leader in this role will be responsible for leading and managing a team of 10+ experienced Red Team professionals in AT&T India. The leader in this role oversees, manages and supports day-to-day operations, including various projects, tasks and initiatives. Continuously collaborates with US and India Cyber Security leadership teams and other stakeholders on engineering and operational matters. In this role, you will lead and participate in sophisticated Red Team exercises aimed at uncovering vulnerabilities across our networks, systems, applications, and processes. As an innovative thinker, you will go beyond standard vulnerability assessments, developing and utilizing unique tools and techniques to identify and exploit security gaps. Your functional responsibilities will include leading comprehensive Red Team exercises to identify vulnerabilities in diverse environments such as cloud-hosted and web-based applications, API interfaces, databases, big data environments, networks, computer systems, mobile applications, Software Defined Networks, and IoT devices and systems. You will design and develop custom tools and methodologies to enhance our security testing capabilities and employ creative tactics to uncover weaknesses, including poor user practices and weak security methods. Working collaboratively with other Red Team members and Security Analysts, you will identify and exploit security issues, characterize cyber-attack vectors, and discover related vulnerabilities, providing actionable recommendations for remediation. In addition, you will be required to stay abreast of the latest vulnerabilities and exploit techniques, continuously adapting your tools and methodologies to address emerging threats and evolving security landscapes. Your role will also involve documenting and communicating security findings in both written and verbal formats, using your insights to inform leadership, drive security strategies, notify affected customers, and advise network operations and other business units on security issues and recommended solutions. Experience Level: 15+ years. Location: Hyderabad Responsibilities Include: Functionally lead and manage a team of 10+ experienced Red Team professionals in AT&T India Lead and perform formal and informal targeted “Hunts” to identify vulnerabilities. Actively building and participating in Red Team exercises. Design and execute red team engagements, simulating advanced attack scenarios to identify vulnerabilities and assess the effectiveness of security measures. Conduct penetration tests on networks, applications, and physical security controls. Employing tactics to uncover security holes in user practices and procedures. Develop and execute red team strategies and methodologies to uncover potential security gaps. Analyze and report on findings from red team exercises, including detailed recommendations for remediation. Providing feedback and verification as security issues are fixed. Stay current with the latest security threats, attack techniques, and industry trends. Communicate complex security concepts to both technical and non-technical stakeholders. Collaborate with other security teams to improve overall security practices and incident response capabilities. Be proactive and demonstrate the ability to analyze issues, generate ideas, and initiate action while achieving results. Effectively manages multiple tasks / projects with close attention to detail and meets short turnarounds and deadlines. Collaborate with leadership teams, provide subject matter expertise and insights. Support and guide team members in providing high-quality and actionable intelligence products / deliverables. Support, guide and mentor team members in technical and functional matters The expert in this role will perform analysis of complex security issues and corresponding activities to help mitigate risk. Includes forward looking research, planning and strategy to strengthen our stance against future cyber security threats and attacks, and enhancing our mitigation techniques, processes, and technology solutions. Required skills: At least 15+ years of experience in penetration testing and red team operations, At least 10+ years leading and managing diverse technical teams Expert level understanding of Transmission Control Protocol / Internet Protocol (TCP/IP) protocols, devices, security mechanisms and how they operate. Strong understanding of network security threats including APT, botnets, Distributed Denial of Service (DDoS) attacks, worms, and network exploits. Expert knowledge of attack vectors, exploitation techniques, and vulnerability assessment methodologies. Experience with industry-standard penetration testing tools and frameworks. Experience with network probing/testing/analysis tools (Nessus, nmap, burp, wireshark, etc.) Deep technical knowledge of Windows, UNIX and Linux operating systems as both an expert user and system administrator Programming skills that will be used to construct, modify, and execute testing tools including shell (ksh, bash), [g]awk, Python, PERL, regex, .NET Programming, Java, C, C++, C#, PowerShell, curl, Web application development (PHP, ASP.NET, etc.) Comprehensive knowledge of software security testing principles, practices, and tools, experience of vulnerability assessments in a complex environment. Experience or familiarity with vulnerability analysis, computer forensics tools, cryptography principles Excellent teamwork skills for collaboration on analysis techniques, implementation, and reporting. Must be able to work both independently as well as effectively in teams of individuals with a variety of skills and backgrounds. Excellent written and verbal communication skills and have demonstrated ability to present material to senior officials. Highly self-motivated requiring little direction. Demonstrates creative/out-of-the-box thinking and good problem-solving skills. Demonstrates strong ethical behavior. Sense of urgency and attention to detail Flexible to provide coverage in US morning hours on a need-basis, and as required Desirable skills: Strong knowledge of an enterprise architecture Ability to obtain a strong and ongoing understanding of the technical details involved in current APT threats and exploits involving various operating systems, applications and networking protocols. Knowledge of tactics, techniques, and procedures associated with malicious insider activity, organized crime/fraud groups and both state and non-state sponsored threat actors. Understanding of cloud-based architectures and highly distributed big data architectures Experience with application security testing tools, such as the Metasploit framework and Burp Suite One or more of these certifications CEH: Certified Ethical Hacker CPT: Certified Penetration Tester CEPT: Certified Expert Penetration Tester GPEN: GIAC Certified Penetration Tester OSCP: Offensive Security Certified Professional BS/MS degree in Computer Science, Cyber Security, Engineering, or related technical field Prior experience with Telecom sector. Additional information (if any): Need to be flexible to provide coverage in US morning hours. Weekly Hours: 40 Time Type: Regular Location: IND:AP:Hyderabad / Atria Building, Plot 17 - Adm: Atria Building, Plot No 17 It is the policy of AT&T to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, AT&T will provide reasonable accommodations for qualified individuals with disabilities. AT&T is a fair chance employer and does not initiate a background check until an offer is made.

Posted 4 days ago

Apply

6.0 years

0 Lacs

Bengaluru, Karnataka, India

On-site

Linkedin logo

Job Title: Penetration Tester/ Red Team Ops/ VAPT Location: Bangalore, India (Onsite) About ColorTokens At ColorTokens , we empower businesses to stay operational and resilient in an increasingly complex cybersecurity landscape. Breaches happen—but with our cutting-edge ColorTokens Xshield™ platform , companies can minimize the impact of breaches by preventing the lateral spread of ransomware and advanced malware. We enable organizations to continue operating while breaches are contained, ensuring critical assets remain protected. Our innovative platform provides unparalleled visibility into traffic patterns between workloads, OT/IoT/IoMT devices, and users, allowing businesses to enforce granular micro-perimeters, swiftly isolate key assets, and respond to breaches with agility. Recognized as a Leader in the Forrester Wave™: Microsegmentation Solutions (Q3 2024) , ColorTokens safeguards global enterprises and delivers significant savings by preventing costly disruptions. Join us in transforming cybersecurity. Learn more at www.colortokens.com. Our culture We foster an environment that values customer focus, innovation, collaboration, mutual respect, and informed decision-making. We believe in alignment and empowerment so you can own and drive initiatives autonomously. Self-starters and high-motivated individuals will enjoy the rewarding experience of solving complex challenges that protect some of world’s impactful organizations – be it a children’s hospital, or a city, or the defense department of an entire country. Job Description Skills Required: Red Team Operations Certified, Red Team Ops Certified, OSCP, Offensive Security Certified Professional, MITRE ATT&CK, OPSEC, Operational Security Key Responsibilities: Plan and execute red team exercises simulating real-world threat actor behaviors. Conduct comprehensive penetration tests on internal and external networks, applications (web, mobile, APIs), and cloud environments. Identify and exploit security flaws to assess the effectiveness of preventive and detective controls. Develop custom tools, scripts, and techniques to aid in assessments and evade detection. Collaborate with blue teams to improve detection and response capabilities. Prepare detailed reports outlining findings, proof-of-concepts, and recommended mitigations. Stay current on emerging threats, offensive tactics, tools, and vulnerabilities. Assist with purple teaming and adversary emulation exercises. Requirements: Bachelor's degree in Cybersecurity, Computer Science, or related field (or equivalent experience). 6+ years of hands-on experience in red teaming, offensive security, Infrastructure web application, API, Cloud Pen testing. Proficient in tools such as Cobalt Strike, Metasploit, Nessus, Burp Suite, Nmap, Active directory assessment, and custom scripting (Python, PowerShell, Bash). Strong understanding of MITRE ATT&CK framework, threat and adversary emulation. Knowledge of Windows and Linux internals, Active Directory, and cloud platforms (AWS/Azure/GCP). Familiarity with social engineering tactics and phishing and physically security (a plus). Having experience in creating documentations for services Certifications (Preferred):OSCP (mandatory)CRTP , OSCE, OSEP, CRTE, GPEN, GXPN, or equivalent.

Posted 5 days ago

Apply

8.0 - 13.0 years

30 - 35 Lacs

Pune

Work from Office

Naukri logo

We are seeking an experienced, strategic, and hands-on Manager - Product Security to lead a growing team of penetration testers supporting BMCs IZOT product line. This team focuses on offensive security assessments across mainframe-based solutions and modern application ecosystems. In this leadership role, you will manage a team of skilled professionals performing deep security testing, red teaming, vulnerability analysis, and secure architecture reviews. Youll be responsible for setting strategic goals, driving security initiatives, and ensuring secure-by-design practices are embedded across product development lifecycles. This position requires a solid blend of technical expertise in offensive security, deep understanding of mainframe and modern application architectures, and strong leadership to influence and drive results across cross-functional teams. To ensure youre set up for success, you will bring the following skillset & experience: Bachelor's or master's degree in computer science, Information Security, or related field. 8+ years in cybersecurity roles, with 3+ years in technical leadership or management capacity. Proven experience leading or performing penetration testing on both mainframe and modern platforms. Demonstrated experience conducting red team-style assessments or advanced threat emulation on mainframe and modern systems. Proficient in tools such as: Mainframe utilities: REXX, ISPF, JCL Security tools: Nmap, Burp Suite, Wireshark, custom scripts Proficient in scripting and automation skills (Python, REXX, Bash, or similar). Experience delivering technical and executive-level security reports. Strong communication and leadership skills, with a proven ability to lead technical teams or projects. Experience producing board-level reports and presenting findings to senior stakeholders. Exposure to hybrid environments (mainframe to cloud integrations, modernization efforts). Familiarity with modern enterprise integration methods (REST, SOAP, MQ, FTP) that interface with mainframe services.

Posted 5 days ago

Apply

0.0 - 1.0 years

0 - 0 Lacs

Noida Sector 62, Noida, Uttar Pradesh

On-site

Indeed logo

Roles and Responsibility human resources number : 9315611995 1.Monitor computer networks for security issues. 2. Investigate security breaches and other cyber security incidents. 3. Knowledge of Infrastructure, including firewalls and data encryption programs. 4. Fix detected vulnerabilities to maintain a high-security standard. 5. Stay current on IT security trends and news. 6. Perform penetration testing 7. Hands-on practice on Kali Linux & other tools, curl, Nikto, Nmap, Metasploit, Burp, ZAP 8. Help colleagues install security software and understand information security management. 9. Research security enhancements and make recommendations to management. 10. Stay up-to-date on information technology trends and security standards. 11. Analyzing security breaches to identify the root cause 12. Network Security (multi-vendor) experience 13. Knowledge of scripting languages (Perl, Python, HTML, Java, Shell) 14. Hands-on experience in dynamic analysis, container testing, fuzzing, OWASP top 10 and vulnerability scanning 15. Knowledge of SQL Injection, XSS, Click Jacking, CSRF & SSRF 16. if have any certificate ( CEH, ethical hacking , cisco) Job Types: Full-time, Fresher Pay: ₹16,500.00 - ₹18,000.00 per month Benefits: Paid sick time Paid time off Schedule: Day shift Monday to Friday Supplemental Pay: Performance bonus Education: Master's (Required) Experience: total work: 1 year (Preferred) Location: Noida Sector 62, Noida, Uttar Pradesh (Required) Shift availability: Day Shift (Required) Work Location: In person

Posted 5 days ago

Apply

0 years

0 Lacs

India

Remote

Linkedin logo

Cybersecurity Intern (Remote | 3 Months) Company: INLIGHN TECH Location: Remote Duration: 3 Months Stipend (Top Performers): ₹15,000 Perks: Certificate | Letter of Recommendation | Hands-on Training About INLIGHN TECH INLIGHN TECH empowers students and recent graduates through hands-on, project-based internships. Our Cybersecurity Internship is designed to build foundational and practical skills in securing digital systems and identifying vulnerabilities through real-world challenges. Role Overview As a Cybersecurity Intern , you’ll gain hands-on experience in ethical hacking, threat detection, and vulnerability assessment. You'll work on projects that simulate real security threats, helping you build the skills necessary for a successful cybersecurity career. Key Responsibilities Analyze system vulnerabilities and potential threats Assist in penetration testing and ethical hacking tasks Monitor network traffic and detect suspicious activity Research latest cybersecurity threats and prevention techniques Document findings and recommend security improvements Collaborate with peers on security-related projects Requirements Currently pursuing or recently completed a degree in Computer Science, Cybersecurity, IT, or a related field Basic knowledge of networking, Linux, and cybersecurity fundamentals Familiar with tools like Wireshark, Nmap, Burp Suite, or Metasploit Strong problem-solving and critical thinking skills Passion for cybersecurity and willingness to learn What You’ll Gain Hands-on experience in real-world cybersecurity tasks Internship Completion Certificate Letter of Recommendation for top performers Opportunity to work on live security projects Potential pathway to a full-time role

Posted 5 days ago

Apply
cta

Start Your Job Search Today

Browse through a variety of job opportunities tailored to your skills and preferences. Filter by location, experience, salary, and more to find your perfect fit.

Job Application AI Bot

Job Application AI Bot

Apply to 20+ Portals in one click

Download Now

Download the Mobile App

Instantly access job listings, apply easily, and track applications.

Featured Companies