Get new jobs by email
- ...risk posed by third parties and protects S&P Global brands against possible attacks against our information assets by threat actors via backdoor created by our vendors. Primary responsibilities will include assessing Cybersecurity Business Continuity controls for S&P third...SuggestedFull timeContract workSide jobUS shiftFlexible hours
- ...Processing & Standardization: Work with BCC Postal Standardization tools to clean and standardize address data (handle junk items, backdoor entries, address field normalization). Perform data enrichment processes including zip code validation and standardization. Run...Suggested
- ...Assessment across networks, applications, endpoints, and cloud environments. Develop and deploy custom attack tools and payloads (e.g., backdoors, phishing kits, webshells). Use frameworks like MITRE ATT&CK to guide threat simulation strategies. Emulate advanced...Suggested
- ...security. Safeguard live AI inference environments and deployed models against active runtime threats including model extraction evasion backdoor activation and prompt-based attacks. Implement layered runtime defenses such as input/output sanitization anomaly detection rate...SuggestedFull time
- ...the security features provided by device and system vendors. You will establish strong controls over any medium that is used as a backdoor into the SCADA network implement internal and external intrusion detection systems in the SCADA network. You will perform technical...SuggestedFull timeRemote job
- ...feelings We might not accept everyone who applies — we're looking for specific expertise and authentic voice This isn't a backdoor to promote your company, product, or service. If that's your goal, please don't apply. --- INTERESTED If you're still reading...SuggestedFull timePart time
- ...malicious samples, and insecure preprocessing scripts, Assess ML/LLM models for adversarial attacks, model inversion, poisoning, and backdoors, Apply frameworks like OWASP LLM Top 10 for generative AI risk coverage, Under LLM, Test for prompt injection, jailbreaking,...Suggested
- ...implement the security features provided by device and system vendors. You will establish strong controls over any medium that is used as a backdoor into the SCADA network, implement internal and external intrusion detection systems in the SCM network. You will perform technical...SuggestedFull timeContract workLocal areaRemote job
Rs 3 - 10 lakhs p.a.
...Implement the security features provided by device and system vendors. Establish strong controls over any medium that is used as a backdoor into the DCS / SCADA / HMI network. Implement internal and external intrusion detection systems in the DCS / SCADA / HMI network....Suggested
