Average salary: Rs692,421 /yearly
More statsSearch Results: 4,365 vacancies
...Excellence awards for Data Security Posture Management (DSPM) and Best Data Security Company.
We are looking to hire a Cloud Security Threat Researcher to be a key contributor to our team, technology, and product.
About this Role:
Research and analyze threats related to...
...About the Role:
The Cyber Threat Hunter will have an opportunity to lead threat hunting missions to support our global research and client threat intelligence teams.
He/She will track emerging threats and threat actors and Advanced Persistent Threat groups, evaluate,...
...human resources and operational oversight, you’ll have the opportunity to optimize processes and implement game-changing policies.
A Threat Detection and Automation Engineer is responsible for collaborat i ng with cross-functional teams to develop and implement...
...vulnerabilities and exception process.
• Work with Development/DevOps team to close the vulnerabilities, security misconfigurations and Runtime Threats found in the in CI/CD pipeline, Cloud and Production Environment
• Conduct Pentest for Kubernetes clusters to find security issues...
...Dear Candidates,
We are hiring for the position of Threat Hunter at LTI Mindtree
:
Mandatory Skills
1. Experience in Threat... ...effective detection, analysis, and containment of attacks, as well as researching potential IOCs and linking to intelligence
9. Draft, edit, and...
...work together effectively, this role requires you to be located in India.
About your team
At Atlassian, we are seeking a skilled Threat Detection Engineer to join our team in India. This role offers the opportunity to work on cutting-edge threat detection mechanisms to...
...or disability.
Envision yourself at Barracuda
We at Barracuda are at the forefront of protecting our customers from email-borne threats and data leaks. As an Analyst you will be having an opportunity to work with a core team of Threat Analysts who are specialized in stopping...
Location : Whitefield, Bengaluru.No of year's experience required : 3 to 6 years. Job Role : Perform application threat modelling based on STRIDE/DREAD model, use C4 data model architecture to identify the trust boundaries and security gaps to create application risk profile...
...solutions and controls
Advanced in one or more programming languages or applications
Advanced knowledge of cybersecurity architecture, threat modeling, and technical processes with considerable, in-depth knowledge in one or more technical disciplines (e.g., public cloud,...
...solutions and controls
Advanced in one or more programming languages or applications
Advanced knowledge of cybersecurity architecture, threat modeling, and technical processes with considerable, in-depth knowledge in one or more technical disciplines (e.g., public cloud,...
...Review past incidents and identify attack trends
• Operationalize intelligence data for improved detection
• Hunt for cyber-related threats from various threat intelligence sources
• Identify and monitor the Tactics, Techniques, and Procedures (TTPs) employed by cyber...
...information and technology risks.
Preferred Knowledge
Cyber Threat Intelligence Analyst will be catering a pivotal role in CTI team... ...process incoming malware analysis reports, APT threat actors research, zero-day vulnerabilities advisory disclosure and provide...
...Operations group.
Key Responsibilities
Analyze and investigate activity on company devices that could represent an insider threat
Work cross-functionally with the Security and People teams to develop solutions for analyzing security events at scale and protecting...
...intelligence, empowering businesses to stay ahead of new and unknown fraud threats. We are trusted by global unicorns like inDrive, Alibaba, Swiggy... ...trust for the world.
Responsibilities
As a Security Researcher (JavaScript), you will focus on researching advanced Web...
..., and competitive landscapes.
~ Conduct extensive secondary research using web sources, annual reports, industry reports, and analyst... ...quantitative data to identify market trends, opportunities, and potential threats.
~ Present findings and insights clearly using MS PowerPoint...
...preferences and competitive landscapes.
~ Conduct extensive secondary research using web sources annual reports industry reports and analyst... ...data to identify market trends opportunities and potential threats.
~ Present findings and insights clearly using MS PowerPoint...
...Description
Join our dynamic team as a Sr. Manager Market Research
We are seeking a skilled and strategic Market Research... ...competitor activities, and market dynamics to identify opportunities and threats.
- Design and conduct primary and secondary market research...
...the architects of the future. Transforming our business to deliver on that future is at the heart of our Design mission. As an IBM Z Researcher / UX Designer, you will assume ownership of design deliverables on your product, either as an individual contributor or leader of a...
...experience insights/requirements.
Influence decisions tied to the business strategy and processes of your products.
Establish and own research goals for your Product (aligned with business strategy) and measure progress towards those goals.
Participate in portfolio...
...We are looking for an organized, flexible Clinical Research Associate to oversee clinical trials. The Clinical Research Associate will develop and outline trial protocols, establish trial sites, train site staff, and manage Investigational Product (IP) and trial materials....