Average salary: Rs350,000 /yearly
More statsGet new jobs by email
- Requisition Id: 1693098Suggested
Rs 1 - 6 lakhs p.a.
Key Responsibilities: Lead and execute client engagements ensuring quality delivery and adherence to the engagement letter Ensure compliance with the firm's risk management strategies and activities Understand industry trends and client business processes to identify...Suggested- ...throughout your career to help you on the path to becoming your best professional self. The opportunity : Associate Consultant-National-Forensics-ASU - Forensics - Investigations & Compliance - Pune National : National comprises of sector agnostic teams working across...SuggestedFull timeImmediate start
- ...Hello All, Greetings from Peoplefy! About the Role We are looking for 'Information Security Forensic Analyst'. Location: Yerawada Notice period: Up to 60 days (Preferred) Education: Technical degree Responsibilities Evaluates, tests, recommends...SuggestedLocal area
Rs 2 - 6 lakhs p.a.
...Applicable Specialism Risk Management Level Senior Associate Job Description & Summary At PwC, our people in forensic services focus on identifying and preventing fraudulent activities, conducting investigations, and maintaining compliance with...SuggestedVisa sponsorshipWork visaRs 2 - 7 lakhs p.a.
.../Sector: Not Applicable Specialism: Risk Management Level: Senior Associate Job Description & Summary: At PwC, our forensic services team focuses on identifying and preventing fraudulent activities, conducting investigations, and ensuring compliance with regulatory...SuggestedFlexible hours- ...as the primary technical responder for escalations from our CrowdStrike MDR service. Perform hands-on remediation, containment, and forensic investigation within the GCP environment. Resilience & DRP Execution: Build and maintain the automation scripts used for Disaster...SuggestedRemote jobWorldwideShift work
Rs 0.5 lakh p.a.
...provided and assume them to be accurate and complete. 4. Not an Investigative Audit: This is a process and gap-analysis audit, not a forensic or statutory financial audit. It is not designed to uncover fraud, criminal intent, or hidden systemic malfeasance unless explicitly...SuggestedPermanent employmentLocal area- ...analytics product. Career Page: R&D Country: India REQUIREMENTS Your tool box · Prior experience in network traffic forensics or application traffic analysis. · Deep understanding of network protocols (Ethernet, IP, TCP, UDP, DNS, etc.) · Familiarity with...SuggestedFlexible hours
Rs 6 - 10 lakhs p.a.
...Perform deep-dive investigations into complex security incidents, leveraging advanced forensics techniques (memory, disk, network, malware). Lead incident response activities, including containment, eradication, and recovery efforts. Utilize threat intelligence to contextualize...SuggestedLocal areaShift work- ...resolution of security incidents. What Part Will You Play This role requires in-depth knowledge and hands on experience with network forensics, disk forensics, host forensics (Windows/Linux/Unix/Mac OSx), log forensics, memory forensics, Cyber Kill Chain/Pre-ATT&CK/ATT&CK,...SuggestedLocal areaWorldwide
- ...detect potential violations of laws and regulations as well as internal policies Support Compliance investigations by performing forensic analysis of trade and electronic communications Work together with the Local Business Unit (LBU) Compliance teams to stay up to...SuggestedLocal area
- ...operations Experience with common threat intelligence tools, such as VirusTotal, Shodan, etc. Understanding of security controls, forensics, kill chain analysis, risk assessment and security metrics. Ability to perform initial static and dynamic malware analysis....SuggestedWork at office
- ...patterns and corporate misconduct. You'll start by reviewing alerts flagged by our AI-powered investigation tools, then conduct thorough forensic financial analysis to determine root causes and assess vendor risks. Throughout the day, you'll collaborate with colleagues across...SuggestedFull timeWorldwide
- Job Summary: We are looking for an experienced Security Specialist with deep expertise in Identity and Access Management (IAM) and a broad background across multiple cyber security domains. The ideal candidate will play a key role in designing, implementing, and maintaining...SuggestedHybrid work
- Be the link between threat and defence. At The Missing Link, we don’t just respond to cyber threats, we stay one step ahead. As one of Australia’s most awarded IT providers, now proudly backed by global technology leader Infosys, we have spent more than 28 years helping ...Full timeRemote jobShift workRotating shiftDay shift
- Critical Skills To Possess Education ~ Bachelor's degree in Computer Science, Cybersecurity, Information Technology, or related field ~(or equivalent practical training or certifications). Technical Skills (Foundational Exposure/Knowledge) Basic understanding ...
- MIT Art, Design and Technology University (MIT ADT), Pune , invites applications from visionary creators, practitioners, and academicians for faculty positions in our Creative Cluster . We are looking for individuals who can bridge the gap between traditional heritage and...
- Job Description for Associate Professor and Assistant Professor BFSI 1. Financial Management & Budget Planning Develop and finalize the school's annual budget in alignment with the school objectives. Establish short- and long-term financial objectives, ensuring optimal...Long term contract
- About Symbiosis Skill and Professional University (SSPU): Symbiosis Skill and Professional University (SSPU) is a premier educational institution committed to bridging the skill gap in the country by offering industry-aligned education. As a part of the esteemed Symbiosis ...Internship
- ...and business issues related to cybersecurity threat and vulnerability management, identity management, security operations center, forensics, and data protection. Manage user access provisioning, single sign-on, tap-and-go implementations and access, multi-factor authentication...
- Lead Engineer / Endpoint Security Engineering, VP Position Overview Job Title: Lead Engineer / Endpoint Security Engineering, VP Location: Pune, India Role Description As a Lead Engineer, you will be responsible for driving endpoint security engineering...Flexible hours
- About Us: At Newton School of Technology, in collaboration with Ajeenkya DY Patil University , we're on a mission to reshape the future of technology education in India. Together, we are working to bridge the employability gap by equipping learners with relevant, industry...
- Immediate joiners only!! Project Delivery • Analyse process/program specifications & translate specifications to program codes, conforming to program guidelines and programming best practices • Make changes to configurable items, which include hardware, software, documentation...Immediate start
- Job Title : Cybersecurity AnalystLocation : Pune / HyderabadExperience : 2- 4 yearsEmployment Type : Full-TimeNotice Period : Up to 30 daysRole Overview :We are seeking a proactive Cybersecurity Analyst to help protect our systems, networks, and data from cyber threats. You ...Full time
- Job Title: Cybersecurity Analyst / Security Operations Analyst Experience: 4-8 years Summary: Detail-oriented and proactive Cybersecurity Analyst with strong expertise in Vulnerability Management , Incident Response , and Security Automation . Experienced with...
- About Us RedCompass Labs enables good payments and helps stop the bad. We are experts in ISO20022-based payments, instant payments, cross-border payments, payments interoperability and financial crime. We use the latest Applied AI, micro-services technology and deep payment...Full timeWork at officeWork from homeWorldwide
- Work Level : Individual Core : Responsible, Execution Leadership : Responsive, Decisive Role : Industry Type : Electronic Components/ Semiconductors Function : Cyber Security Key Skills : Cyber Security Education : Graduate Note: This is a requirement...Full time
- Job Role: Cyber Security Specialist Job Location: Pune, MH Work Mode: (WFO) Skills Required: ISO 27001:2005Cyber Security Digital: Risk Regulatory Compliance Analytics Cyber Security - Information Security Risk & Compliance Experience: 10 -14 YRS (Rel 9 yrs) ...
- Key Responsibilities Cybersecurity Governance & Standards - Drive cybersecurity activities in accordance with ISO/SAE 21434 across the full product lifecycle. - Support establishment, rollout, and maintenance of Cybersecurity Management System (CSMS) aligned with...Full time
