24 Job openings found

2 Opening(s)
5.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
Eligibility Criteria: Should have worked as a Level 2 engineers for at least 4 years and as L3 engineer for 2 years. Should at least have 6-7 years of total working experience in Microsoft 365 services. Should be Graduate or Above. Should have extensive working knowledge of Microsoft 365 cloud services. Principal Responsibilities:                                   Responsible for ...
1 Opening(s)
2.0 Year(s) To 10.0 Year(s)
5.00 LPA TO 10.00 LPA
1. Minimum 2 years of experience in Security Operations Centre 2. Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc. 3. Solid understanding of cyber security, network security, end point security concepts 4. Good understanding of recent cyber threats, latest attack vectors 5. Must have experience in any one ...
1 Opening(s)
3.0 Year(s) To 10.0 Year(s)
14.00 LPA TO 28.00 LPA
1.       Minimum 3-5 years of experience in Security Operations Centre 2.       Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc. 3.       Solid understanding of cyber security, network security, end point security concepts 4.       Good understanding of recent cyber threats, latest attack vectors 5.       Must have experience in any one SIEM (Splunk), EDR and SOAR ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
Not Disclosed by Recruiter
We are looking for a detail-oriented and insightful Cyber Crime ContentWriter to join our cybersecurity research and communications team. The idealcandidate will possess a strong command of technical writing and anunderstanding of cybersecurity, cyber crime trends, and digital risk. You willbe responsible for producing high-impact content aimed at educatingprofessionals, decision-makers, ...
1 Opening(s)
3.0 Year(s) To 4.0 Year(s)
Not Disclosed by Recruiter
• Design, develop, and maintain secure web applications using Rust, WebAssembly, HTML, CSS, and JavaScript with a focus on performance and security. • Integrate Rust and WebAssembly into browser-based tools for real-time cybercrime analysis and visualization. • Implement robust authentication, encryption, and data protection features into web solutions. • Collaborate with cybersecurity researchers ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
Not Disclosed by Recruiter
Job Title: OT Network Traffic Analyst – Anomaly Detection Specialist Job Summary:We are seeking a skilled OT Network Traffic Analyst with deep expertise in OperationalTechnology (OT) communication protocols to join our cross-functional security and ML team.The ideal candidate will be responsible for intercepting and analyzing OT network traffic,identifying potential anomalies, and ...
1 Opening(s)
8.0 Year(s) To 10.0 Year(s)
22.00 LPA TO 24.00 LPA
POSITION Cybersecurity OfficerLOCATION Cuffe Parade, Churchgate, Mumbai ESSENTIAL QUALIFICATIONS  Bachelor's degree in Computer Science, Information Security, or related field. CISM certification is mandatory. Additional certifications such as CISSP, CRISC, or CISA are preferred. In-depth knowledge of cybersecurity principles, network security, risk management, and incident handling. Experience with GRC (Governance, Risk & Compliance) tools ...
1 Opening(s)
7.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
We are having an urgent opening for the position of Manager/Dy Manager–Cyber Security & IT Compliance for a reputed company in the Kolkata location.   Education : BE/B.Tech/MCA or Master Degree inrelated fieldRelevant Cyber security certificationsReporting structure :Reports to Head of the departmentBackground & Experience: 7-10 years of work experience in implementation and managing Cyber Security in ...
1 Opening(s)
8.0 Year(s) To 12.0 Year(s)
28.00 LPA TO 32.00 LPA
Typical Years of Experience • 8-12 yearsEducational Qualification • BE/BSC(Comp/IT) (or equivalent) Skills: Threat Intel: Cyble, Threat intelligence, Fortirecon & Cloudsek Role TaskThreat Intelligence & Researcher Keep track of APTs groups (advanced persistent threats), Know APT Groups motivation, their tools & techniques, the malware they write, and C&C (command and control center), identify ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile