Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
Job Location | Pune |
Education | Not Mentioned |
Salary | Not Disclosed |
Industry | IT - Software |
Functional Area | R&D / Product Design,General / Other Software |
EmploymentType | Full-time |
Web exploitation Network exploitation Vulnerability and Exploit research Hardware exploitation and penetration testing Reverse engineering of binaries and proprietary protocols Radio/wireless security analysis and exploitation along with GNURadio experience SCADA/ICS Security Blockchain security DevSecOps AWS/Azure cloud security Big Data Security Job requirements: Researching and coming up with new exploitation techniques Security assessment of products/services in your area of expertise Writing a proof of concept tools Submitting and Showcasing your research at conferences Documenting new attack techniques and research Are passionate about your area of expertise and self-driven Have the knack of finding security bugs in everything you touch Love working for the end result and not the effort put in Like automating stuff Like writing tools Are comfortable working in a dynamic and fast-paced work environment Have good written and verbal communication skills and ability to express your thoughts clearly Have the ability to work independently and meet project schedule and deadlines No bar on educational qualification You must have a proven track record in security You should have authored a security tool/plugin or Spoken at security conferences where papers are selected through CFP Written research papers, books, blogs, articles etc An active member of any security community or group Working on something on your own in your field apart from official work Written and submitted exploits in ExploitDB, Securityfocus and other available forums Regularly participate in CTFs and bug bounties ,
Keyskills :
testingprotocolsazurewebpenetration testingcloud computingbig dataawsreverse engineeringtool