Average salary: Rs187,671 /yearly
More statsGet new jobs by email
- ...of Microsoft Purview, our enterprise data governance and protection platform. You will be instrumental in preventing IT-based crime, hacking, and unauthorized modifications, disclosures, or destruction of sensitive information. This role sits within Data Security Pillar,...Suggested
- ...Detection and Response (MTTD & MTTR). Mandatory skill sets: Mandatory (Any-one): - Certified SOC Analyst (EC-Council) Computer Hacking Forensic Investigator (EC-Council) Certified Ethical Hacker (EC-Council) CompTIA Security CompTIA CySA (Cybersecurity Analyst) GIAC...SuggestedFull timeVisa sponsorshipWork visa
- ...stakeholder management and presentation skills Nice To Have Experience with automation, AI-based optimization tools Knowledge of programmatic and emerging ad platforms (LinkedIn, YouTube Shorts, etc.) Passion for industry trends, experimentation and growth hacking...Suggested
- ...strategies, utilizing tools like web analytics and healthcare business intelligence. Our expertise extends to strategy development, growth hacking, UI/UX design, content production, and social media management. By combining innovation and data-driven insights, we help healthcare...Suggested
- ...Hyperledger, other blockchains; cryptographic programming, authentication, identity management, cybersecurity software, cryptanalysis, ethical hacking, and vulnerability analysis Exposure to R&D culture with a focus on disruptive ideas, brainstorming, MVP specification, quick...Suggested
- ...skillset. ~ Penetration testing experience is essential; prior participation in bug bounty programs is a plus. ~ Proficiency with hacking tools and penetration testing frameworks (e.g., Metasploit, Burp Suite, Nmap, Wireshark). ~ Expertise in web application security...Suggested
- ...Network Security and Intrusion Detection Cryptography and Secure Communications Cybersecurity Risk Management Ethical Hacking and Penetration Testing Information Security Governance and Compliance Secure Software Development # Design comprehensive syllabi...SuggestedFull timeInternship
- ...projects level and communicate the deviations to the respective team leads and ensure adherence. Code reviews - provide guidance to avoid hacks, code smells etc. Well versed with the Enterprise Architecture and promotes team to adopt the patterns and implementation in...SuggestedFull timeFlexible hours
- ...analysis tools ~ Exposure to binary analysis tools such as IDA Pro WinDbg BinWalk Valgrind PIN Panda and S2E ~ Working knowledge of hacking tools and techniques such as memory corruption exploits rootkits protocol poisoning browser-based attacks DNS poisoning MetaSploit...SuggestedFull time
- ...Conduct regular Secure Code and Architecture Review SAST and DAST Latest technology security API Microservices RPA IOT etc. Ethical Hacking and Red Teaming Activity Assess Third Party Partner vulnerabilities and security risk Remediations Closures Tracking Reporting...SuggestedFull time
- ...cryptographic technologies such as Ethereum or Hyperledger, including authentication, identity management, cybersecurity, cryptanalysis, ethical hacking, and vulnerability analysis Exposure to an R&D-focused environment with a strong problem-solving mindset and openness to...Suggested
- ...architectures. Ability to help write concise reports based on complex data with accuracy, brevity, and speed. Understanding of Ethical Hacking from the perspective of a Blue-team member; the countermeasures and mitigation controls which can be implemented to minimise the...SuggestedPermanent employment
- ...using Infrastructure as Code (IaC). Job Description Summary Information Security is responsible for preventing IT-based crime, hacking, intentional or inadvertent modification, disclosure, or destruction to the organization's information systems and IT assets and...Suggested
