1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Description:We are looking for an experienced and creative Red Team Operator to conduct full-scope adversarysimulations and emulate APT-style attacks. You will test organizational defenses and deliver tacticalinsights to enhance cybersecurity resilience.Responsibilities:• Plan and execute adversary emulation based on TTPs from the MITRE ATT&CK framework.• Develop custom payloads and simulate attacks ...
1 Opening(s)
3.0 Year(s) To 12.0 Year(s)
7.00 LPA TO 15.00 LPA
Leading a team that performs Security Control Validation, Red Team, Breached & AttackSimulation, Penetration Testing and VAPT assessments. Ensuring that Security Assessments for existing applications/systems are performed as perpolicy, track the compliance status, following up with application/system owners for closures ofthe security findings. Releasing dashboards and reports periodically to management ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Description:We are looking for an experienced Malware Analyst to join our Threat Research and IncidentResponse unit. This role involves analyzing advanced malware across Windows, Android, and Linuxecosystems and building detection capabilities to strengthen defensive infrastructure.
Responsibilities:• Analyze malware samples using static and dynamic analysis.• Document malware behavior, capabilities, persistence methods, and ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Description:We are hiring an experienced Threat Intelligence Analyst to join our cyber threat monitoring andincident response team. This role focuses on collecting, analyzing, and disseminating intelligencefrom surface, deep, and dark web sources to inform proactive defense strategies.Responsibilities:• Monitor APT groups, malware campaigns, and cybercriminal activities across the internetand dark web.• ...
1 Opening(s)
3.0 Year(s) To 5.0 Year(s)
Not Disclosed by Recruiter
Responsibilities:• Perform in-depth security research on iOS and macOS systems, including the XNU kernel andsandbox mechanisms.• Reverse engineer Apple binaries and firmware components such as Mach-O, dyld, andKEXTs.• Develop jailbreak techniques, kernel exploits, and system-level bypasses.• Contribute to the creation of internal tools for fuzzing, debugging, and exploit validation oniOS/macOS ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
11.00 LPA TO 16.00 LPA
Job Description:
Ø Conduct real time cyber-attack simulations as part of the RED team activity.
Ø Perform Cover, overt and specialized Red Team assessment.
Ø Keep one self updated on the latest IT Security news, exploits, hacks.
Ø Prepare Threat Intelligence reports for newly discovered threat agents, exploits, attacks.
Ø Conduct vulnerability Assessment and Penetration Testing for web applications, Network, Web/ NW ...