1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
Not Disclosed by Recruiter
Job Title: OT Network Traffic Analyst – Anomaly Detection Specialist
Job Summary:We are seeking a skilled OT Network Traffic Analyst with deep expertise in OperationalTechnology (OT) communication protocols to join our cross-functional security and ML team.The ideal candidate will be responsible for intercepting and analyzing OT network traffic,identifying potential anomalies, and ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
Not Disclosed by Recruiter
Job Title: OT Protocol and Device SpecialistJob Summary:We are looking for a talented and driven Industrial Network & Security Engineer to join ourOT SOC development team. In this role, you will be responsible for designing, securing, andmaintaining the IT-OT network infrastructure, configuring detection systems like Zeek andSuricata, and ensuring the ...
1 Opening(s)
8.0 Year(s) To 10.0 Year(s)
22.00 LPA TO 24.00 LPA
POSITION Cybersecurity OfficerLOCATION Cuffe Parade, Churchgate, Mumbai
ESSENTIAL QUALIFICATIONS
Bachelor's degree in Computer Science, Information Security, or related field. CISM certification is mandatory. Additional certifications such as CISSP, CRISC, or CISA are preferred. In-depth knowledge of cybersecurity principles, network security, risk management, and incident handling. Experience with GRC (Governance, Risk & Compliance) tools ...
1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
Not Disclosed by Recruiter
Description:We are seeking a technically strong and curious Cyber Security Researcher to joinour Security Operations Center (SOC) team. This role involves researchingevolving cybersecurity techniques, tools, and standards, and translating thoseinsights into technical solutions, PoCs, and operational enhancements.You will collaborate with Product Managers, SOC Analysts, and Developmentteams to support the design ...
1 Opening(s)
8.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Lead in CybersecurityRequirements:
• BE/M.Tech/MSc (IT, Math)/MCA
• Minimum 8 Years
• Should have successfully delivered at least 3 projects in Cybersecurity
• Should have good knowledge in opensource and open stack
• Proficient in Cybersecurity Technologies
• Have an in-depth understanding of OWASP testing methodology, Dynamic and Static Application Security Testing, re-engineering, automation, ASP.NET/JAVA, IDS/IPS ...
1 Opening(s)
5.0 Year(s) To 7.0 Year(s)
Not Disclosed by Recruiter
Purpose: The Data Protection and Privacy Specialist will be instrumental in ensuring the organization's compliance with the Personal Data Protection Law (PDPL) and other relevant data protection regulations. The Specialist will be responsible for conducting reviews/assessments, developing and implementing privacy training programs, developing policies/procedures, managing data subject rights, conducting data ...
1 Opening(s)
12.0 Year(s) To 15.0 Year(s)
Not Disclosed by Recruiter
Qualification: BE.Btech (any)/ M.Tech (any) / MSc (IT, Math & Physics) /MCA
Certification (anyone) : CEH: Certified Ethical Hacker (CEH), CISM: Certified Information Security Manager (CISM), CompTIA Security, CompTIA Advanced Security Practitioner (CASP), CISSP (Certified Information Systems Security Professional), ECSA: EC-Council Certified Security Analyst, SSCP: Systems Security Certified Practitioner, GIAC Certified Incident Handler (CIH)
Minimum 12 Years Have an ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Description:We are seeking an experienced and detail-oriented Product Manager to play apivotal role in shaping our Security Operations Center (SOC) solutions.This role focuses on understanding market needs, gathering requirements, andcollaborating closely with cross-functional teams to ensure the successful executionof product roadmaps. The ideal candidate will bring a mix of technical ...
5 Opening(s)
2.0 Year(s) To 5.0 Year(s)
3.00 LPA TO 8.00 LPA
Security Monitoring & Alert Triage:
Continuously monitor security alerts generated by various security tools (SIEM, EDR, IDS/IPS, firewalls, etc.) for suspicious activities, anomalies, and potential security breaches.
Perform initial triage and analysis of security events, correlating data from multiple sources to determine the severity and legitimacy of alerts.
Prioritize alerts based on risk ...
1 Opening(s)
3.0 Year(s) To 10.0 Year(s)
10.00 LPA TO 18.00 LPA
Perform assessment of IT and cybersecurity policies, standards and otherdocumentation Identify gaps in policy, process and standard implementation Conduct discussions, take leadership and drive closure of identified open issuesin assessments Liaise with IT, Infra and business teams as required to drive Information andcybersecurity projects Release periodic dashboards\reports
Experience required for ...