1 Opening(s)
15.0 Year(s) To 20.0 Year(s)
50.00 LPA TO 60.00 LPA
Responsibilities
Operational:
Understanding business processes and assessing the criticality of the technological solutions being used to carry out business functions.
Review business Level processes and new initiatives for Cyber security requirements and help in incorporating industry best practices.
Continuously monitor and assess execution of security policy and validate necessary controls are in place.
Support security ...
1 Opening(s)
15.0 Year(s) To 20.0 Year(s)
70.00 LPA TO 80.00 LPA
Responsibilities
Operational:
Understanding business processes and assessing the criticality of the technological solutions being used to carry out business functions.
Review business Level processes and new initiatives for Cyber security requirements and help in incorporating industry best practices.
Continuously monitor and assess execution of security policy and validate necessary controls are in place.
Support security ...
1 Opening(s)
10.0 Year(s) To 20.0 Year(s)
35.00 LPA TO 35.00 LPA
Responsibilities
Operational:
Understanding business processes and assessing the criticality of the technological solutions being used to carry out business functions.
Review business Level processes and new initiatives for Cyber security requirements and help in incorporating industry best practices.
Continuously monitor and assess execution of security policy and validate necessary controls are in place.
Support security ...
1 Opening(s)
2.0 Year(s) To 5.0 Year(s)
11.00 LPA TO 16.00 LPA
Job Description:
Ø Conduct real time cyber-attack simulations as part of the RED team activity.
Ø Perform Cover, overt and specialized Red Team assessment.
Ø Keep one self updated on the latest IT Security news, exploits, hacks.
Ø Prepare Threat Intelligence reports for newly discovered threat agents, exploits, attacks.
Ø Conduct vulnerability Assessment and Penetration Testing for web applications, Network, Web/ NW ...
1 Opening(s)
3.0 Year(s) To 7.0 Year(s)
5.00 LPA TO 8.00 LPA
Job Description
CEH or equivalent Certification and Proven work experience as a CEH
In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.
Identifying and recording security flaws and breaches.
Knowledge and understanding of SIEM tools.
Manage the incident and related documents like an incident report, incident plan, etc.
Prepare the ...