18 Job openings found

1 Opening(s)
3.0 Year(s) To 10.0 Year(s)
14.00 LPA TO 28.00 LPA
1.       Minimum 3-5 years of experience in Security Operations Centre 2.       Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc. 3.       Solid understanding of cyber security, network security, end point security concepts 4.       Good understanding of recent cyber threats, latest attack vectors 5.       Must have experience in any one SIEM (Splunk), EDR and SOAR ...
1 Opening(s)
3.0 Year(s) To 6.0 Year(s)
Not Disclosed by Recruiter
Job Title: OT Network Traffic Analyst – Anomaly Detection Specialist Job Summary:We are seeking a skilled OT Network Traffic Analyst with deep expertise in OperationalTechnology (OT) communication protocols to join our cross-functional security and ML team.The ideal candidate will be responsible for intercepting and analyzing OT network traffic,identifying potential anomalies, and ...
1 Opening(s)
7.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
We are having an urgent opening for the position of Manager/Dy Manager–Cyber Security & IT Compliance for a reputed company in the Kolkata location.   Education : BE/B.Tech/MCA or Master Degree inrelated fieldRelevant Cyber security certificationsReporting structure :Reports to Head of the departmentBackground & Experience: 7-10 years of work experience in implementation and managing Cyber Security in ...
1 Opening(s)
8.0 Year(s) To 12.0 Year(s)
28.00 LPA TO 32.00 LPA
Typical Years of Experience • 8-12 yearsEducational Qualification • BE/BSC(Comp/IT) (or equivalent) Skills: Threat Intel: Cyble, Threat intelligence, Fortirecon & Cloudsek Role TaskThreat Intelligence & Researcher Keep track of APTs groups (advanced persistent threats), Know APT Groups motivation, their tools & techniques, the malware they write, and C&C (command and control center), identify ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...
1 Opening(s)
5.0 Year(s) To 8.0 Year(s)
12.00 LPA TO 15.00 LPA
At least one SIEM solution certifications with one or more SIEM/ Security solutions (i.e., RSA NetWitness, Splunk ES, Elastic ELK, HP ArcSight, IBM QRadar Log Rhythm). • Minimum overall 5 years of experience in handling security related products & services in a reputed organization out of which 3 years’ experience ...
1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
ob Title: SOC (Security Analyst) Job Overview: We are seeking a highly skilled SOC Expert to join our dynamic cybersecurity team. The ideal candidate will play a crucial role in monitoring, detecting, analysing, and responding to security incidents. Candidate requires a deep understanding of security operations and a proactive approach to threat management ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
11.00 LPA TO 16.00 LPA
Job Description:   Ø  Conduct real time cyber-attack simulations as part of the RED team activity. Ø  Perform Cover, overt and specialized Red Team assessment. Ø  Keep one self  updated on the latest IT Security news, exploits, hacks. Ø  Prepare Threat Intelligence reports for newly discovered threat agents, exploits, attacks. Ø  Conduct vulnerability Assessment and Penetration Testing for web applications, Network, Web/ NW ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile