Average salary: Rs1,378,800 /yearly
More stats ...Assessment space.
About the Role
Designation : Cyber Security Engineer
Responsibility of / Expectations from the Role... ...provide technical solutions to security vulnerabilities
Research new attack vectors
Should be able to look to automate...
...Monitor cloud networks and systems for security issues.
Investigate security breaches... ...deploy Information Security monitoring and research tools.
Participate in security audits... ...Response tools and management.
Information/Cyber security certifications are a plus...
...rectify & recommend specific improvement measures that help in the security posture of the organization by protecting the sensitive... ...coordination & audit assistance
# Liaise with stakeholders in relation to cyber security issues and provide future recommendations
# Maintain...
...to help drive adoption and understanding of PAM across the enterprise.
? Assist with the management of PAM-related audit or other security findings.
Qualifications:
The requirements listed are representative of the knowledge, skill, and/or ability required:
? Extensive...
...management on performance of the delivery
What you will need to have:
A Bachelors degree with 17+ years of experience in Cyber Security domain.
Must be able develop project plan and track the plan using MS Project and must have experience in Agile methodology and...
...correct tools / systems towards execution of successful pen-test- Conduct pen-test on variety of Automotive systems / ECUs- Perform security assessment of different hardware modules and identify vulnerabilities- Handle multiple hardware & software tools, required for testing...
Summary :We are seeking a seasoned Security Architect with a passion for building secure and resilient cloud and OT environments. You will leverage your extensive experience in security best practices, cloud technologies, and regulatory compliance to design, implement, and manage...
*Strong expertise in designing solutions using Okta toolset, enabling single sign on services for both cloud and on prem applications
*1-3 years of Experience working with F5 tools with specific experience protecting application using F5 Access Policy Manager (APM) module ...
...Dew Software, a trusted leader in the Digital Transformation space, is seeking a skilled Cyber Security Splunk Engineer to join their dynamic team. With a commitment to innovative solutions, Dew Software collaborates with Fortune 500 companies to help them achieve their strategic...
Job Description : - 5 - 8 years of experience (relevant experience min 4 years in cyber security)-Will be performing application vulnerability assessments, API assessments and mobile application penetration tests.- Will perform secure source code reviews of software applications...
...Role Purpose
The purpose of this role is to design the organisation’s computer and network security infrastructure and protect its systems and sensitive information from cyber threats.
Do
# Design and develop enterprise cyber security strategy and architecture...
...Engineering and Related Attacks
12. Experience in OWASP Testing ASVS, MASVS Checklist (2-3 years)
13. Penetration testing – API, Thick Client, Web, mobile (IOS and Android)(3-6 years)
14. Good Knowledge in Threat modelling
15. Certification in Security - Is good...
A Global Cyber Security Solutions provider is looking for Cybersecurity Analyst( Notice Period less than 60 days only should apply)Key responsibilities :- Plan and execute red team operations and penetration testing against a wide range of digital assets and infrastructure to...
Job Description : We are seeking a highly skilled and experienced API Security Penetration Tester to join our cybersecurity team. The ideal candidate will have 3-4 years of hands-on experience conducting penetration testing on APIs and a strong background in cybersecurity. In...
...cybersecurity. In this role, you will be responsible for implementing, configuring, and managing Rapid7 products to enhance our organization's security posture.Responsibilities : - Implement and configure Rapid7 products, including InsightVM, InsightIDR, Metasploit, InsightAppSec, and...
...relationship through all phases of the sales cycle - Provide a consultative solutions sales process to prospects - Must have experience on Cyber security, Networking, Security Solution, Firewall. - Good communication Skills and flexibility to work on client side. - Developing strong...
...potential cybersecurity threats and vulnerabilities within the organization. Incident Handling : - Respond promptly and effectively to security incidents and breaches, ensuring minimal damage and swift resolution.- Policy and Procedure Development: Develop and maintain...
Rs 20 - 30 lakhs p.a.
...Position: Network Security Expertise
Experience : 5+ years
Location: Balewadi, Pune
Job Description:
Requirements:... ...that would be a less preferred alternative
Managing Network and Cyber security projects to remediation of bugs in network, security, and...
...matter expert or stakeholder, has previously supported information security audits in any of the following frameworks or regulations : PCI... ...departmental business planning and solution design- Uses expert level Cyber Security knowledge base to complete tasks- Intrinsic...
Rs 5 - 12 lakhs p.a.
...Experience: o 4+ years experience in Automotive Cyber security SW development. Skills and competencies:
Must Have:
? Automotive Embedded Software Development experience
? Domain Knowledge of Cyber Security Implementation for automotive ECU
? Knowledge of Software Signing...
...As an Asset Identity/Discovery Research and Signature development Engineer, you will be part... .../discovery signatures in the Qualys Security products. This opening is your opportunity... ...Security domain or MS in computer science or cyber security.
Excellent proficiency with...
...Hi Candidate ,
Tech M is hiring for security Consultant .
• Proficient in Incident Management and Response • Experience in security... ...is preferred. • In-depth knowledge of security concepts such as cyber-attacks and techniques, threat vectors, risk management, incident...
...We're looking for a Security Analyst
This role is Office Based
Security Analyst, IT Security and Compliance
Job Brief:
We... ...IT Security and Compliance team. The ideal candidate will have a cyber security mindset, encompassing various domains of cybersecurity....
...Key Skills:
Cyber Security
Data Privacy
Governance, Risk Management & Compliance
Technology Risk
Working experience with Cyber Security and data privacy industry standards and controls
PCI DSS, Soc, NIST, ISO, GDPR
Audit (Risk & Compliance based, Standards...
...Hexagon Security Analysts L1 Job Description Security Analysts L1:
Hexagon is seeking... ...organization you will report to the Director of Cyber Security
Responsibilities:
As... ...definition and finetuning.
Conduct research regarding the latest methods, tools, and...
Rs 2.4 lakh p.a.
...at the forefront of innovation. We empower businesses with advanced data solutions that drive growth and success.
Job Title: Web Researcher
Deliverables:
• Conduct Contact discovery of provided accounts.
• Find cloud technology of provided organizations & their...
...delivering compelling and persuasive solutions rooted in our expertise.
Role Description
This is a full-time on-site role for a Research Analyst at Intentsync located in Pune. As a Research Analyst, your day-to-day tasks will include conducting data mining, analyzing...
...most important organizational assets in today’s businesses. As a Security Consultant, you will be a key advisor for IBM’s clients, analyzing... ...Expertise
Overall experience of at least 6+ years in Cyber security Incident response and Management
Hands-on experience...
...Job Description
What We Do
Managing cyber risk, together – Today the modern enterprise is an Enterprise of Things. We are on a mission to secure the Enterprise of Things with active defense by identifying, segmenting, and enforcing compliance of every connected thing...
...bridging the information and access gap between citizens and social security schemes (both government and private) using tech and a network... ...theres a lot to be done every day.
Your Role
Undertake research activities to understand government schemes across Indian states...