15 Job openings found

1 Opening(s)
3.0 Year(s) To 10.0 Year(s)
14.00 LPA TO 28.00 LPA
1.       Minimum 3-5 years of experience in Security Operations Centre 2.       Experience across SOC domains use case creation, incident management, threat hunting, threat intelligence etc. 3.       Solid understanding of cyber security, network security, end point security concepts 4.       Good understanding of recent cyber threats, latest attack vectors 5.       Must have experience in any one SIEM (Splunk), EDR and SOAR ...
1 Opening(s)
7.0 Year(s) To 10.0 Year(s)
Not Disclosed by Recruiter
We are having an urgent opening for the position of Manager/Dy Manager–Cyber Security & IT Compliance for a reputed company in the Kolkata location.   Education : BE/B.Tech/MCA or Master Degree inrelated fieldRelevant Cyber security certificationsReporting structure :Reports to Head of the departmentBackground & Experience: 7-10 years of work experience in implementation and managing Cyber Security in ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
6.00 LPA TO 12.00 LPA
Threat intelligence is evidence-based information, including context, mechanisms, and indicators of compromise, implications and actionable advice, about existing or emerging hazards to assets. Threat intelligence allows IT professionals to make decisions and take action accordingly. Positions in this function are involved in the body of technologies, processes, and practices designed ...
1 Opening(s)
4.0 Year(s) To 8.0 Year(s)
Not Disclosed by Recruiter
ob Title: SOC (Security Analyst) Job Overview: We are seeking a highly skilled SOC Expert to join our dynamic cybersecurity team. The ideal candidate will play a crucial role in monitoring, detecting, analysing, and responding to security incidents. Candidate requires a deep understanding of security operations and a proactive approach to threat management ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
11.00 LPA TO 16.00 LPA
Job Description:   Ø  Conduct real time cyber-attack simulations as part of the RED team activity. Ø  Perform Cover, overt and specialized Red Team assessment. Ø  Keep one self  updated on the latest IT Security news, exploits, hacks. Ø  Prepare Threat Intelligence reports for newly discovered threat agents, exploits, attacks. Ø  Conduct vulnerability Assessment and Penetration Testing for web applications, Network, Web/ NW ...

Drop Your CV

We will consider your Profile for future Jobs

Submit Profile