55 Job openings found

1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
5.00 LPA TO 6.00 LPA
Key Responsibilities:• Security Design & Implementation: Design, implement, and maintain secure systems, networks, and applications by applying security best practices, industry standards, and regulatory requirements.• Vulnerability Assessment & Penetration Testing: Perform regular vulnerability assessments, conduct penetration testing, and identify potential weaknesses in systems, networks, and applications.• Incident Response & Management: ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
7.20 LPA TO 8.00 LPA
Job Summary:We are seeking a highly skilled IT professional with proven experience in ITcompliance, enterprise systems, and cyber security. The ideal candidate will beresponsible for ensuring that IT infrastructure, policies, and practices meet regulatorystandards while implementing and overseeing robust cyber security measures toprotect the organization from internal and external threats. Key ...
1 Opening(s)
8.0 Year(s) To 12.0 Year(s)
28.00 LPA TO 32.00 LPA
Typical Years of Experience • 8-12 yearsEducational Qualification • BE/BSC(Comp/IT) (or equivalent) Skills: Threat Intel: Cyble, Threat intelligence, Fortirecon & Cloudsek Role TaskThreat Intelligence & Researcher Keep track of APTs groups (advanced persistent threats), Know APT Groups motivation, their tools & techniques, the malware they write, and C&C (command and control center), identify ...
1 Opening(s)
9.0 Year(s) To 15.0 Year(s)
20.00 LPA TO 30.00 LPA
Job Description – Network Security Operations Network Security Management: Applies advanced subject matter knowledge to solve complex business issues and is regarded as a subject matter expert. 1. Serves as a Network Security expert in Network design & Implementation, helping project teams comply with enterprise and IT security policies, industry regulations, and best practices.2. Ensures ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile