1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
5.00 LPA TO 8.00 LPA
Job Description
CEH or equivalent Certification and Proven work experience as a CEH
In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.
Identifying and recording security flaws and breaches.
Knowledge and understanding of SIEM tools.
Manage the incident and related documents like an incident report, incident plan, etc.
Prepare the ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Responsibilities to handle - Company's all cases related to police authorities such as FIR, our Vehicle accident cases, or any other police cases related to our establishment.Labor Commissioner, Municipal Board, Town & Country Planning, Land revenue Department, Forest Department for FCA Act, & MOEF..Liaison with Mining Dept. At District Head ...
1 Opening(s)
8.0 Year(s) To 12.0 Year(s)
28.00 LPA TO 32.00 LPA
Typical Years of Experience • 8-12 yearsEducational Qualification • BE/BSC(Comp/IT) (or equivalent)
Skills: Threat Intel: Cyble, Threat intelligence, Fortirecon & Cloudsek
Role TaskThreat Intelligence & Researcher Keep track of APTs groups (advanced persistent threats), Know APT Groups motivation, their tools & techniques, the malware they write, and C&C (command and control center), identify ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 20.00 LPA
Handle Escalated incident tickets from L1 Team.
Analyse and investigate security events from various sources; Triage security events and incidents, detect anomalies, and report remediation actions.
Manage security incidents through all phases of the incident response process through to
Closure
Using SIEM, Full Packet Capture, Intrusion Detection, Vulnerability Scanning and Malware analysis technologies for ...
1 Opening(s)
9.0 Year(s) To 15.0 Year(s)
20.00 LPA TO 30.00 LPA
Job Description – Network Security Operations
Network Security Management:
Applies advanced subject matter knowledge to solve complex business issues and is regarded as a subject matter expert.
1. Serves as a Network Security expert in Network design & Implementation, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices.2. Ensures ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...