6 Job openings found

1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Description:We are looking for an experienced Malware Analyst to join our Threat Research and IncidentResponse unit. This role involves analyzing advanced malware across Windows, Android, and Linuxecosystems and building detection capabilities to strengthen defensive infrastructure. Responsibilities:• Analyze malware samples using static and dynamic analysis.• Document malware behavior, capabilities, persistence methods, and ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Description:We are hiring an experienced Threat Intelligence Analyst to join our cyber threat monitoring andincident response team. This role focuses on collecting, analyzing, and disseminating intelligencefrom surface, deep, and dark web sources to inform proactive defense strategies.Responsibilities:• Monitor APT groups, malware campaigns, and cybercriminal activities across the internetand dark web.• ...
1 Opening(s)
3.0 Year(s) To 9.0 Year(s)
1.00 LPA TO 8.00 LPA
We are looking for fullstack core PHP Developer responsible for maintaining and adding newfeatures in a huge ERP project. Your primary focus will be the development of all business logic,definition, and maintenance of the central database, and ensuring high performance andresponsiveness of the system.Requirements:• 3 - 5 years of working ...
1 Opening(s)
5.0 Year(s) To 7.0 Year(s)
22.00 LPA TO 30.00 LPA
A day in the life - · Perform Penetration Testing for networks (internal & external), applications, APIs & cloud assets along with Red & Purple Team assessments · Vulnerability identification and analysis · Collaborate with team members and stakeholders to define project scopes, review test results, and determine remediation steps · Draft reports ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
12.00 LPA TO 14.00 LPA
A day in the life -   · Perform Penetration Testing for networks (internal & external), applications, APIs & cloud assets along with Red & Purple Team assessments · Vulnerability identification and analysis · Collaborate with team members and stakeholders to define project scopes, review test results, and determine remediation steps · Draft reports and ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile