Get new jobs by email
  •  ...risk posed by third parties and protects S&P Global brands against possible attacks against our information assets by threat actors via backdoor created by our vendors. Primary responsibilities will include assessing Cybersecurity Business Continuity controls for S&P third... 
    Suggested
    Full time
    Contract work
    Side job
    US shift
    Flexible hours

    S&P Global

    Gurgaon
    a month ago
  •  ...Processing & Standardization: Work with BCC Postal Standardization tools to clean and standardize address data (handle junk items, backdoor entries, address field normalization). Perform data enrichment processes including zip code validation and standardization. Run... 
    Suggested

    eClerx

    Coimbatore
    12 days ago
  •  ...Assessment across networks, applications, endpoints, and cloud environments. Develop and deploy custom attack tools and payloads (e.g., backdoors, phishing kits, webshells). Use frameworks like MITRE ATT&CK to guide threat simulation strategies. Emulate advanced... 
    Suggested

    HDB Financial Services Ltd.

    Mumbai
    7 days ago
  •  ...security. Safeguard live AI inference environments and deployed models against active runtime threats including model extraction evasion backdoor activation and prompt-based attacks. Implement layered runtime defenses such as input/output sanitization anomaly detection rate... 
    Suggested
    Full time

    Bajaj Finance Limited

    Pune
    15 days ago
  •  ...the security features provided by device and system vendors. You will establish strong controls over any medium that is used as a backdoor into the SCADA network implement internal and external intrusion detection systems in the SCADA network. You will perform technical... 
    Suggested
    Full time
    Remote job

    Hitachi

    Chennai
    26 days ago
  •  ...feelings We might not accept everyone who applies — we're looking for specific expertise and authentic voice This isn't a backdoor to promote your company, product, or service. If that's your goal, please don't apply. --- INTERESTED If you're still reading... 
    Suggested
    Full time
    Part time

    Eynthra Solution LLP

    Surat
    5 days ago
  •  ...malicious samples, and insecure preprocessing scripts, Assess ML/LLM models for adversarial attacks, model inversion, poisoning, and backdoors, Apply frameworks like OWASP LLM Top 10 for generative AI risk coverage, Under LLM, Test for prompt injection, jailbreaking,... 
    Suggested

    YASH Technologies

    Bangalore
    3 days ago
  •  ...implement the security features provided by device and system vendors. You will establish strong controls over any medium that is used as a backdoor into the SCADA network, implement internal and external intrusion detection systems in the SCM network. You will perform technical... 
    Suggested
    Full time
    Contract work
    Local area
    Remote job

    Hitachi Energy

    Chennai
    1 day ago
  • Rs 3 - 10 lakhs p.a.

     ...Implement the security features provided by device and system vendors. Establish strong controls over any medium that is used as a backdoor into the DCS / SCADA / HMI network. Implement internal and external intrusion detection systems in the DCS / SCADA / HMI network.... 
    Suggested

    Hitachi Energy

    Chennai
    a month ago