Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Hyderabad Jobs |
Banglore Jobs |
Chennai Jobs |
Delhi Jobs |
Ahmedabad Jobs |
Mumbai Jobs |
Pune Jobs |
Vijayawada Jobs |
Gurgaon Jobs |
Noida Jobs |
Oil & Gas Jobs |
Banking Jobs |
Construction Jobs |
Top Management Jobs |
IT - Software Jobs |
Medical Healthcare Jobs |
Purchase / Logistics Jobs |
Sales |
Ajax Jobs |
Designing Jobs |
ASP .NET Jobs |
Java Jobs |
MySQL Jobs |
Sap hr Jobs |
Software Testing Jobs |
Html Jobs |
. Experience: Qualifications:
Functional Purpose Conducts forensic analyses of digital and other multimedia evidence utilizing appropriate scientific methodologies, forensic techniques, and quality assurance practices in support o...
opensource computerscience qualityassurance it ace xry draw ence chfi oxygen encase search science hardware security analysis criminal nf mationsecurity xways ensicAssistant Manager Information Security Location : Mumbai Position Title : Assistant Manager Information Security Department : Risk Locations : Mumbai Candidate Requirement
Primary responsibility of the candidate would be to perform Vulnerability Assessment & Penetration Testing of Mobile and Web Application on regular basis, identification of bugs which can be exploited...
shell scriptweb application risk monitoringnetwork security runtime analysispenetration testing vulnerability assessmentPrimary responsibility of the candidate would be to perform Vulnerability Assessment & Penetration Testing of Mobile and Web Application on regular basis, identification of bugs which can be exploited...
shell scriptweb application risk monitoringnetwork security runtime analysispenetration testing vulnerability assessmentPrimary responsibility of the candidate would be to perform Vulnerability Assessment & Penetration Testing of Mobile and Web Application on regular basis, identification of bugs which can be exploited...
shell scriptweb application risk monitoringnetwork security runtime analysispenetration testing vulnerability assessmentCompany Description JAGSAR Learnings Department. A Global Enterprise Learning Solutions Company with over a decade of dedicated Experienced Professionals. Job Description Will be responsible for c...
conducting training resentationdevelopment presentationskillsPrimary responsibility of the candidate would be to perform Vulnerability Assessment & Penetration Testing of Mobile and Web Application on regular basis, identification of bugs which can be exploited...
shell scriptweb application risk monitoringnetwork security runtime analysispenetration testing vulnerability assessmentPrimary responsibility of the candidate would be to perform Vulnerability Assessment & Penetration Testing of Mobile and Web Application on regular basis, identification of bugs which can be exploited...
shell scriptweb application risk monitoringnetwork security runtime analysispenetration testing vulnerability assessmentFunctional Purpose Conducts forensic analyses of digital and other multimedia evidence utilizing appropriate scientific methodologies, forensic techniques, and quality assurance practices in support o...
opensource cyberforensics computerscience qualityassurance informationsecurity it ace xry draw ence chfi cyber oxygen encase search tableau science hardware security waysFunctional Purpose Conducts forensic analyses of digital and other multimedia evidence utilizing appropriate scientific methodologies, forensic techniques, and quality assurance practices in support o...
ence chfi oxygen search tableau science security ace xry draw cyber encase xways hardware
. Experience: Qualifications:
We have Urgent Requirements Ethical Hacking Trainer .
responsibilities and Duties
1. Strong Communication with Verbal Skill Set
2. Energetic, Enthusiastic and Positive...
Bachelor of Engineering/Information Technology M.Tech (Information Security) B. Tech (Information Technology) Pursuing Master s in Computer Application (MCA) Master s in science cyber law and Info...
password recoveryfraud investigation behavioral traininginformation security computer applicationregulatory compliance forensic iBachelor of Engineering/Information Technology M.Tech (Information Security) B. Tech (Information Technology) Pursuing Master s in Computer Application (MCA) Master s in science cyber law and Info...
password recoveryfraud investigation behavioral traininginformation security computer applicationregulatory compliance forensic iBachelor of Engineering/Information Technology M.Tech (Information Security) B. Tech (Information Technology) Pursuing Master s in Computer Application (MCA) Master s in science cyber law and Info...
password recoveryfraud investigation behavioral traininginformation security computer applicationregulatory compliance forensic iBachelor of Engineering/Information Technology M.Tech (Information Security) B. Tech (Information Technology) Pursuing Master s in Computer Application (MCA) Master s in science cyber law and Info...
password recoveryfraud investigation behavioral traininginformation security computer applicationregulatory compliance forensic iBachelor of Engineering/Information Technology M.Tech (Information Security) B. Tech (Information Technology) Pursuing Master s in Computer Application (MCA) Master s in science cyber law and Info...
password recoveryfraud investigation behavioral traininginformation security computer applicationregulatory compliance forensic iThis role evaluates, integrates, manages, and optimizes next-generation endpoint protection solutions and strategies, performs security assessments, analyzes vulnerabilities and threats, and coordinat...
applicationsecurity networking activedirectory changemanagement compliance informationsecurityawareness ccnpsecurity securitytools webapplication computerscience networksecurity highproficiency operatingsystems securityawareness incidentmanaFunctional Purpose Conducts forensic analyses of digital and other multimedia evidence utilizing appropriate scientific methodologies, forensic techniques, and quality assurance practices in support o...
opensource computerscience qualityassurance it ace xry draw ence chfi oxygen encase search science hardware security analysis criminal nf mationsecurity xways ensicResponsible for planning for new product/service roll out or enhancement of existing offerings, operations and maintenance in Managed Hosting, Data Centre, Managed Security Services, Infrastructure Ma...
managed security servicesdata center music makingcyber security business unitsknowledge base managed hostingservice delivery
Security analysts are ultimately responsible for ensuring that the companys digital assets are protected from unauthorized access.
Key Responsibilities:
Company Description JAGSAR Learnings Department. A Global Enterprise Learning Solutions Company with over a decade of dedicated Experienced Professionals. Job Description Will be responsible for c...
conducting training resentationdevelopment presentationskillsPosted Date : He/she will be expected to be a part of IT function#s transformational journey in moving towards a function that systematically enables business objectives, and drives the identification...
cyber securitypacket capture private sectordata collection cyber forensicsmalware analysis technical processuser requirementsIT is accountable for the end-to-end delivery of technology solutions, information and data related services to Reliance#s businesses and functions. We are also accountable for driving innovation and ...
digital mediamobile phones cyber securitypacket capture private sectordata collection cyber forensicsmalware analysisPre-Sales (Senior Engineer Network & Cyber Security) Job Title : Senior Engineer Department : Pre-Sales Company : Express Systems Limited Employment Type : Full-time & Permanent Job Location : Dhaka S...
troubleshootingethical hacking solution designemerging technologies technical presentationsFunctional Purpose Conducts forensic analyses of digital and other multimedia evidence utilizing appropriate scientific methodologies, forensic techniques, and quality assurance practices in support o...
opensource computerscience qualityassurance it ace xry draw ence chfi oxygen encase search science hardware security analysis criminal nf mationsecurity xways ensic2 4 years Qualifications: BE- Computer Science, MCA, M. Tech / Masters in Information Security, or Forensics Analysis. Skill Sets: Strong team player Should have good hands on different forensic...
networking siem ids nformationsecurity customerrelations windowsregistry linuxinternals problemsolving dataanalytics computerscience shellscript malwareanalysis technicaltraining pcidss opensourceskills: Cyber Security Location: Hyderabad Role: SOC Analyst Experience:1 - 2 Years Employment Type: Contract to Hire (C2H) Eligibility: Any Graduate Vision for the Program: This team...
firewalls networkingtroubleshooting ciscosecurity information event managementsecurity operations centerThe candidate should have excellent communication skills and interpersonal skills with relevant experience in delivering security testing and ethical hacking modules like CEH, CHFI, ECSA. The candidat...
java soft skillscustomer service communication skillsethical hacking security testinginterpersonal skills2 4 years Qualifications: BE- Computer Science, MCA, M. Tech / Masters in Information Security, or Forensics Analysis. Skill Sets: Strong team player Should have good hands on different forensic...
networking siem ids nformationsecurity customerrelations windowsregistry linuxinternals problemsolving dataanalytics computerscience shellscript malwareanalysis technicaltraining pcidss opensourceJob Description The candidate should have excellent communication skills and interpersonal skills with relevant experience in delivering security testing and ethical hacking modules like CEH , CHFI , ...
java soft skillscustomer service communication skillsethical hacking security testinginterpersonal skillsFunctional Purpose Conducts forensic analyses of digital and other multimedia evidence utilizing appropriate scientific methodologies, forensic techniques, and quality assurance practices in support o...
opensource computerscience qualityassurance it ace xry draw ence chfi oxygen encase search science hardware security analysis criminal nf mationsecurity xways ensicResponsible for planning for new product/service roll out or enhancement of existing offerings, operations and maintenance in Managed Hosting, Data Centre, Managed Security Services, Infrastructure Ma...
managed security servicesdata center music makingcyber security business unitsknowledge base managed hostingservice deliveryResponsible for planning for new product/service roll out or enhancement of existing offerings, operations and maintenance in Managed Hosting, Data Centre, Managed Security Services, Infrastructure Ma...
tcpslaetmsiemdivResponsible for planning for new product/service roll out or enhancement of existing offerings, operations and maintenance in Managed Hosting, Data Centre, Managed Security Services, Infrastructure Ma...
dnsslaetmsiemddosdivInviting applications for the role of Lead Consultant - Cyber Security Responsibilities Triaging potentially malicious alerts to determine severity and criticality of the alert. Responding to al...
sapenvironmentdeliverycustomerrelationssaleskalilinuxpostingcybersecuritycloudsecuritycustomerfocusprotocolanalysissecurityoperationsintrusiondetectionetwkmonitingJob description
The Senior Cyber Security Incident Handler will implement mitigation measures in response to general or specific attempted compromises on the respective networks.
Inviting applications for the role of Asst. Manager, Cyber Defense Center (CDC) InfoSec. In this role as Security Intelligence Framework Administrator to manage overall tools framework...
ITSecurityTACACSVPNSIEMHTMLPythonshellscriptecurityIntelligenceFramewQRadarSIEMQRMQVMQRIFQflowSymantecCASBcyberdefensemonitingJinjaWith a startup spirit and 80,000+ curious and courageous minds, we have the expertise to go deep with the world s biggest brands and we have fun doing it. Now, we re calling all you rule-breakers and ...
cehawsdnsvpnipsidscomdlphtmldivqrmIn this role as CDC Incident Response Senior Analyst, you will be responsible to support threat monitoring, detection, event analysis, incident response/reporting, forensics and threat hunting program...
reportingoperationsauditsourcesalesmanagementvirtualizationintelligenceswitchessecurityresearchusinessinformationdevelopmentservicecustomerJobs Responsibilities : Monitor computer networks for security issues. Investigate security breaches and other cyber security incidents. Install security measures and operate software to protect ...
Information Security Management Network Penetration Testing Ceh SIEM ISO 27001 IT SecurityIn this role as CDC Incident Response Analyst, you will be responsible to support threat monitoring, detection, event analysis and incident response/reporting (24*7 environment). The CDC Analyst must ...
reportingsalesmanagementsystemscontrollersintelligenceriskmarketingusinesspreventionofficeproblemsolvinglossdevelopment
Qual: BTech/ BE/ MCA/ MTech/ (computer science, Cyber Security, Information Security Specialist) Exp: 3 - 5 years
© 2019 Hireejobs All Rights Reserved