1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
Not Disclosed by Recruiter
Description:We are seeking a technically strong and curious Cyber Security Researcher to joinour Security Operations Center (SOC) team. This role involves researchingevolving cybersecurity techniques, tools, and standards, and translating thoseinsights into technical solutions, PoCs, and operational enhancements.You will collaborate with Product Managers, SOC Analysts, and Developmentteams to support the design ...
1 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Description:We are seeking an experienced and detail-oriented Product Manager to play apivotal role in shaping our Security Operations Center (SOC) solutions.This role focuses on understanding market needs, gathering requirements, andcollaborating closely with cross-functional teams to ensure the successful executionof product roadmaps. The ideal candidate will bring a mix of technical ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
Not Disclosed by Recruiter
Job Title: OT Network Traffic Analyst – Anomaly Detection Specialist
Job Summary:We are seeking a skilled OT Network Traffic Analyst with deep expertise in OperationalTechnology (OT) communication protocols to join our cross-functional security and ML team.The ideal candidate will be responsible for intercepting and analyzing OT network traffic,identifying potential anomalies, and ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
Not Disclosed by Recruiter
Job Title: OT Protocol and Device SpecialistJob Summary:We are looking for a talented and driven Industrial Network & Security Engineer to join ourOT SOC development team. In this role, you will be responsible for designing, securing, andmaintaining the IT-OT network infrastructure, configuring detection systems like Zeek andSuricata, and ensuring the ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Description:We are looking for an experienced and creative Red Team Operator to conduct full-scope adversarysimulations and emulate APT-style attacks. You will test organizational defenses and deliver tacticalinsights to enhance cybersecurity resilience.Responsibilities:• Plan and execute adversary emulation based on TTPs from the MITRE ATT&CK framework.• Develop custom payloads and simulate attacks ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Description:We are hiring an experienced Threat Intelligence Analyst to join our cyber threat monitoring andincident response team. This role focuses on collecting, analyzing, and disseminating intelligencefrom surface, deep, and dark web sources to inform proactive defense strategies.Responsibilities:• Monitor APT groups, malware campaigns, and cybercriminal activities across the internetand dark web.• ...
1 Opening(s)
13.0 Year(s) To 20.0 Year(s)
0.00 LPA TO 80.00 LPA
Candidates from international Payment gateway fintech product companies.
Communication Skills - Excellent
Stability index : Number of Job changes : max 2 between 2019 – 2025
Work location : Bangalore only
Job Description:
We are seeking an experienced Cyber Security Operations and GRC Manager to join our team at, a leader in blockchain technology and solutions. The ideal ...
1 Opening(s)
6.0 Year(s) To 12.0 Year(s)
Not Disclosed by Recruiter
Overview: We are seeking a highly skilled and experienced Senior Palo Alto Engineer with expertise in Prisma, Cortex, and Panorama platforms. The ideal candidate will possess deep technical knowledge and practical experience in designing, deploying, and managing Palo Alto Networks security solutions. A PCNSC (Palo Alto Networks Certified Network Security Consultant) ...
1 Opening(s)
3.0 Year(s) To 12.0 Year(s)
7.00 LPA TO 15.00 LPA
Leading a team that performs Security Control Validation, Red Team, Breached & AttackSimulation, Penetration Testing and VAPT assessments. Ensuring that Security Assessments for existing applications/systems are performed as perpolicy, track the compliance status, following up with application/system owners for closures ofthe security findings. Releasing dashboards and reports periodically to management ...
1 Opening(s)
7.0 Year(s) To 15.0 Year(s)
15.00 LPA TO 26.00 LPA
Minimum 7 years of experience in conducting hypothesis based threat hunting using SIEM logs (preferably Splunk)
Good knowledge of recent cyber trends/attacks, MITRE framework
Good understanding of network, end point based attacks
Must have experience in developing hypothesis using DNS, Proxy, EDR logs
Must have experience in drafting hunting reports and communicating to senior ...