15 Job openings found

1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
6.00 LPA TO 7.00 LPA
Pre-Screening Questions for Cybersecurity Expert: 1. Have you directly handled any regulatory cybersecurity audits or inspections by SEBI or NSE/BSE? If yes, briefly mention the scope and outcome. 2. List the key cybersecurity controls you have implemented to comply with SEBI’s Cybersecurity & Cyber Resilience Framework (CSCRF) for stockbrokers. 3. Have you led ...
1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
ob Title: SOC (Security Analyst) Job Overview: We are seeking a highly skilled SOC Expert to join our dynamic cybersecurity team. The ideal candidate will play a crucial role in monitoring, detecting, analysing, and responding to security incidents. Candidate requires a deep understanding of security operations and a proactive approach to threat management ...
1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
5.00 LPA TO 8.00 LPA
Job Description CEH or equivalent Certification and Proven work experience as a CEH   In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.   Identifying and recording security flaws and breaches.   Knowledge and understanding of SIEM tools.   Manage the incident and related documents like an incident report, incident plan, etc.   Prepare the ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 20.00 LPA
Handle Escalated incident tickets from L1 Team. Analyse and investigate security events from various sources; Triage security events and incidents, detect anomalies, and report remediation actions. Manage security incidents through all phases of the incident response process through to Closure Using SIEM, Full Packet Capture, Intrusion Detection, Vulnerability Scanning and Malware analysis technologies for ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile