1,417 Certified Ethical Hacker jobs in India
Certified Ethical Hacker
Posted today
Job Viewed
Job Description
Responsibilities:
Certified Ethical Hacker Requirements:
Certified Ethical Hacker (CEH)
Posted 8 days ago
Job Viewed
Job Description
Location : Onsite – Dwarka, Delhi
Job Type : Full-Time
Experience : 1+ years in Cybersecurity
Certification Required : EC-Council Certified Ethical Hacker (CEH v11 or higher)
We are a cybersecurity-focused organization committed to delivering proactive security services and protecting our clients from evolving digital threats. We work across industries to provide high-impact assessments, advisory, and compliance support.
We are seeking a passionate and certified Ethical Hacker to join our team in Dwarka (Onsite) . The ideal candidate will have at least 1 year of hands-on cybersecurity experience and a valid CEH certification . You will be responsible for identifying system vulnerabilities, conducting penetration tests, and helping our clients enhance their security posture.
- Perform penetration testing on web, mobile, network, and cloud environments
- Identify, exploit, and document vulnerabilities in systems and applications
- Conduct vulnerability assessments using industry-standard tools
- Simulate cyberattacks and red team exercises as required
- Assist in incident response and forensic investigations
- Prepare clear, detailed, and actionable reports
- Keep up with current security trends, exploits, and threat intelligence
- Collaborate with internal teams to help fix discovered vulnerabilities
- EC-Council Certified Ethical Hacker (CEH v11 or higher)
- Minimum 1 year of experience in cybersecurity or ethical hacking roles
- Familiarity with tools like Burp Suite, Metasploit, Nmap, Nessus, Wireshark, etc.
- Basic understanding of OWASP Top 10, network protocols, and system hardening
- Ability to write or understand scripts (e.g., Bash, Python, PowerShell)
- Strong analytical and problem-solving skills
- Good communication and documentation skills
- Exposure to red teaming or bug bounty programs
- Knowledge of secure coding practices
- Familiarity with SIEM tools, DevSecOps, or cloud security (AWS/Azure)
- Onsite role with strong mentorship and growth opportunities
- Exposure to real-world security assessments and client projects
- A collaborative and skilled cybersecurity team
- Opportunity to contribute to cutting-edge engagements
Certified Ethical Hacker (CEH)
Posted 6 days ago
Job Viewed
Job Description
Job Type : Full-Time
Experience : 1+ years in Cybersecurity
Certification Required : EC-Council Certified Ethical Hacker (CEH v11 or higher)
About Us
We are a cybersecurity-focused organization committed to delivering proactive security services and protecting our clients from evolving digital threats. We work across industries to provide high-impact assessments, advisory, and compliance support.
Job Summary
We are seeking a passionate and certified Ethical Hacker to join our team in Dwarka (Onsite) . The ideal candidate will have at least 1 year of hands-on cybersecurity experience and a valid CEH certification . You will be responsible for identifying system vulnerabilities, conducting penetration tests, and helping our clients enhance their security posture.
Key Responsibilities
Perform penetration testing on web, mobile, network, and cloud environments
Identify, exploit, and document vulnerabilities in systems and applications
Conduct vulnerability assessments using industry-standard tools
Simulate cyberattacks and red team exercises as required
Assist in incident response and forensic investigations
Prepare clear, detailed, and actionable reports
Keep up with current security trends, exploits, and threat intelligence
Collaborate with internal teams to help fix discovered vulnerabilities
Required Skills & Qualifications
EC-Council Certified Ethical Hacker (CEH v11 or higher)
Minimum 1 year of experience in cybersecurity or ethical hacking roles
Familiarity with tools like Burp Suite, Metasploit, Nmap, Nessus, Wireshark, etc.
Basic understanding of OWASP Top 10, network protocols, and system hardening
Ability to write or understand scripts (e.g., Bash, Python, PowerShell)
Strong analytical and problem-solving skills
Good communication and documentation skills
Preferred (Nice to Have)
Exposure to red teaming or bug bounty programs
Knowledge of secure coding practices
Familiarity with SIEM tools, DevSecOps, or cloud security (AWS/Azure)
What We Offer
Onsite role with strong mentorship and growth opportunities
Exposure to real-world security assessments and client projects
A collaborative and skilled cybersecurity team
Opportunity to contribute to cutting-edge engagements
Certified Ethical Hacker (CEH)
Posted today
Job Viewed
Job Description
Location : Onsite – Dwarka, Delhi
Job Type : Full-Time
Experience : 1+ years in Cybersecurity
Certification Required : EC-Council Certified Ethical Hacker (CEH v11 or higher)
We are a cybersecurity-focused organization committed to delivering proactive security services and protecting our clients from evolving digital threats. We work across industries to provide high-impact assessments, advisory, and compliance support.
We are seeking a passionate and certified Ethical Hacker to join our team in Dwarka (Onsite) . The ideal candidate will have at least 1 year of hands-on cybersecurity experience and a valid CEH certification . You will be responsible for identifying system vulnerabilities, conducting penetration tests, and helping our clients enhance their security posture.
- Perform penetration testing on web, mobile, network, and cloud environments
- Identify, exploit, and document vulnerabilities in systems and applications
- Conduct vulnerability assessments using industry-standard tools
- Simulate cyberattacks and red team exercises as required
- Assist in incident response and forensic investigations
- Prepare clear, detailed, and actionable reports
- Keep up with current security trends, exploits, and threat intelligence
- Collaborate with internal teams to help fix discovered vulnerabilities
- EC-Council Certified Ethical Hacker (CEH v11 or higher)
- Minimum 1 year of experience in cybersecurity or ethical hacking roles
- Familiarity with tools like Burp Suite, Metasploit, Nmap, Nessus, Wireshark, etc.
- Basic understanding of OWASP Top 10, network protocols, and system hardening
- Ability to write or understand scripts (e.g., Bash, Python, PowerShell)
- Strong analytical and problem-solving skills
- Good communication and documentation skills
- Exposure to red teaming or bug bounty programs
- Knowledge of secure coding practices
- Familiarity with SIEM tools, DevSecOps, or cloud security (AWS/Azure)
- Onsite role with strong mentorship and growth opportunities
- Exposure to real-world security assessments and client projects
- A collaborative and skilled cybersecurity team
- Opportunity to contribute to cutting-edge engagements
Certified Ethical Hacker Trainer
Posted today
Job Viewed
Job Description
- Certified Ethical Hacker (CEH) Trainer
Fresher with knowledge / Experienced
Location:
- Bareilly On Site
Accommodation is available Only Room Not Food
if interested you can send us your resume
Qualification:
- B.TECH M.TECH B.C.A M.C.A
**Job Type**:
- Full-time
**Salary**:
- ₹10,698.00 - ₹5,000.00 per month
Pay: 871.42 - ,000.00 per month
Work Location: In person
Information Security Specialist
Posted 3 days ago
Job Viewed
Job Description
Information Security Specialist (RFPs and Vendor Assessments)
At ORO Labs, we’re reshaping the future of procurement. Founded in California in 2020, we’re a fast-growing SaaS startup making procurement intuitive, integrated, and intelligent. Our platform supports Fortune 200 clients across North America and Europe, and we are now excited to be expanding our operations to serve leading enterprises across Australia. We help them streamline purchasing, mitigate supplier risk, and improve compliance—all while unlocking value from their existing tech investments. With teams across the U.S., Europe, and India, and now expanding into Australia, we thrive on collaboration, agility, and innovation.
Overview:
The Information Security Specialist will report to the CTO and work closely with the compliance team to support the organization’s security goals, primarily focusing on responding to RFPs, vendor assessments, and customer inquiries related to security practices.
This role ensures the company’s security posture is clearly communicated in sales processes and annual vendor assessments.
The Information Security Specialist will play a vital role in building customer trust by addressing
security-related questions and maintaining transparency in security processes.
Key Responsibilities:
RFP and Vendor Assessment Management: Lead the response process for RFPs and vendor
assessments, ensuring the company’s security posture aligns with customer expectations and
requirements.
Customer Engagement: Act as the primary point of contact for customer inquiries around
security, explaining security processes and addressing customer concerns during the sales and
assessment processes.
Policy and Process-Driven Approach: Apply a policy-driven approach in all engagements,
maintaining alignment with industry standards and best practices.
Compliance Support: Collaborate with the compliance team to ensure adherence to security
frameworks and regulatory requirements such as ISO 27001 and SOC 2.
Audit Support: Assist in internal and external security audits, ensuring the organization meets
compliance and security standards.
Skills and Qualifications:
Experience: 5+ years in information security, with direct experience managing RFPs and
completing vendor security questionnaires.
Technical Expertise: Knowledgeable in information security concepts, protocols, and compliance frameworks such as ISO 27001 and SOC 2.
Communication Skills: Able to clearly articulate technical security information to non-technical
stakeholders and customers.
Project Management: Skilled in prioritizing and managing multiple projects simultaneously,
ensuring timely and organized responses to RFPs and assessments.
Attention to Detail: Strong attention to detail and commitment to accuracy in all security
responses.
Education:
Bachelor’s degree in Information Security, Computer Science, or a related field preferred but not
Information Security Specialist
Posted 8 days ago
Job Viewed
Job Description
Role: L3-Information Security
- Job Description:
- Primary Responsibility would be to manage the organizational practices for the following:
- Vulnerability Assessment
- Infrastructure(Cloud/Traditional DC) Penetration Testing
- Configuration Review
- Red Teaming
- Should be able to lead the team for delivery of Vulnerability Management operations.
- Conduct penetration testing as per the calendar activities and on demand request for Infrastructure Vulnerability Assessment.
- Conduct Vulnerability Assessment and Penetration Testing on Cloud Environment (AWS, GCP, Azure).
- Conduct configuration review as per the calendar activities and on demand request for server, database, network components.
- Identify and propose work – around for critical vulnerabilities.
- Explain vulnerabilities to System owners and provide recommendations for mitigation
- Monitor progress of vulnerability mitigations and maintain track of remediation
- Provide advisory support to internal IT team for closure of identified vulnerability during the security testing
- Coordinate fixing of identified and accepted vulnerabilities with Airtel Payments Bank and Security Vendors.
- Stay abreast of newer trends in tools and technologies used for application security
- Develop POCs to demonstrate security issues
- Qualification:
- B.Tech, B.E, MCA or equivalent from a Recognized university
- At least 8 years of experience in similar role
- Certifications Preferred: OSCP, EC-council LPT.
- Hands on experience with popular security tools – Nessus, Metasploit, KALI Linux.
- Working knowledge of CIS Security benchmarks
- Has practical experience in auditing various OS , DB , Network and Security technologies
Be The First To Know
About the latest Certified ethical hacker Jobs in India !
Information Security Specialist
Posted 3 days ago
Job Viewed
Job Description
At ORO Labs, we’re reshaping the future of procurement. Founded in California in 2020, we’re a fast-growing SaaS startup making procurement intuitive, integrated, and intelligent. Our platform supports Fortune 200 clients across North America and Europe, and we are now excited to be expanding our operations to serve leading enterprises across Australia. We help them streamline purchasing, mitigate supplier risk, and improve compliance—all while unlocking value from their existing tech investments. With teams across the U.S., Europe, and India, and now expanding into Australia, we thrive on collaboration, agility, and innovation.
Overview:
The Information Security Specialist will report to the CTO and work closely with the compliance team to support the organization’s security goals, primarily focusing on responding to RFPs, vendor assessments, and customer inquiries related to security practices.
This role ensures the company’s security posture is clearly communicated in sales processes and annual vendor assessments.
The Information Security Specialist will play a vital role in building customer trust by addressing
security-related questions and maintaining transparency in security processes.
Key Responsibilities:
RFP and Vendor Assessment Management: Lead the response process for RFPs and vendor
assessments, ensuring the company’s security posture aligns with customer expectations and
requirements.
Customer Engagement: Act as the primary point of contact for customer inquiries around
security, explaining security processes and addressing customer concerns during the sales and
assessment processes.
Policy and Process-Driven Approach: Apply a policy-driven approach in all engagements,
maintaining alignment with industry standards and best practices.
Compliance Support: Collaborate with the compliance team to ensure adherence to security
frameworks and regulatory requirements such as ISO 27001 and SOC 2.
Audit Support: Assist in internal and external security audits, ensuring the organization meets
compliance and security standards.
Skills and Qualifications:
Experience: 5+ years in information security, with direct experience managing RFPs and
completing vendor security questionnaires.
Technical Expertise: Knowledgeable in information security concepts, protocols, and compliance frameworks such as ISO 27001 and SOC 2.
Communication Skills: Able to clearly articulate technical security information to non-technical
stakeholders and customers.
Project Management: Skilled in prioritizing and managing multiple projects simultaneously,
ensuring timely and organized responses to RFPs and assessments.
Attention to Detail: Strong attention to detail and commitment to accuracy in all security
responses.
Education:
Bachelor’s degree in Information Security, Computer Science, or a related field preferred but not
Information Security Specialist
Posted 6 days ago
Job Viewed
Job Description
Job Description:
Primary Responsibility would be to manage the organizational practices for the following:
Vulnerability Assessment
Infrastructure(Cloud/Traditional DC) Penetration Testing
Configuration Review
Red Teaming
Should be able to lead the team for delivery of Vulnerability Management operations.
Conduct penetration testing as per the calendar activities and on demand request for Infrastructure Vulnerability Assessment.
Conduct Vulnerability Assessment and Penetration Testing on Cloud Environment (AWS, GCP, Azure).
Conduct configuration review as per the calendar activities and on demand request for server, database, network components.
Identify and propose work – around for critical vulnerabilities.
Explain vulnerabilities to System owners and provide recommendations for mitigation
Monitor progress of vulnerability mitigations and maintain track of remediation
Provide advisory support to internal IT team for closure of identified vulnerability during the security testing
Coordinate fixing of identified and accepted vulnerabilities with Airtel Payments Bank and Security Vendors.
Stay abreast of newer trends in tools and technologies used for application security
Develop POCs to demonstrate security issues
Qualification:
B.Tech, B.E, MCA or equivalent from a Recognized university
At least 8 years of experience in similar role
Certifications Preferred: OSCP, EC-council LPT.
Hands on experience with popular security tools – Nessus, Metasploit, KALI Linux.
Working knowledge of CIS Security benchmarks
Has practical experience in auditing various OS , DB , Network and Security technologies
Information Security Specialist
Posted today
Job Viewed
Job Description
Information Security Specialist (RFPs and Vendor Assessments)
At ORO Labs, we’re reshaping the future of procurement. Founded in California in 2020, we’re a fast-growing SaaS startup making procurement intuitive, integrated, and intelligent. Our platform supports Fortune 200 clients across North America and Europe, and we are now excited to be expanding our operations to serve leading enterprises across Australia. We help them streamline purchasing, mitigate supplier risk, and improve compliance—all while unlocking value from their existing tech investments. With teams across the U.S., Europe, and India, and now expanding into Australia, we thrive on collaboration, agility, and innovation.
Overview:
The Information Security Specialist will report to the CTO and work closely with the compliance team to support the organization’s security goals, primarily focusing on responding to RFPs, vendor assessments, and customer inquiries related to security practices.
This role ensures the company’s security posture is clearly communicated in sales processes and annual vendor assessments.
The Information Security Specialist will play a vital role in building customer trust by addressing
security-related questions and maintaining transparency in security processes.
Key Responsibilities:
RFP and Vendor Assessment Management: Lead the response process for RFPs and vendor
assessments, ensuring the company’s security posture aligns with customer expectations and
requirements.
Customer Engagement: Act as the primary point of contact for customer inquiries around
security, explaining security processes and addressing customer concerns during the sales and
assessment processes.
Policy and Process-Driven Approach: Apply a policy-driven approach in all engagements,
maintaining alignment with industry standards and best practices.
Compliance Support: Collaborate with the compliance team to ensure adherence to security
frameworks and regulatory requirements such as ISO 27001 and SOC 2.
Audit Support: Assist in internal and external security audits, ensuring the organization meets
compliance and security standards.
Skills and Qualifications:
Experience: 5+ years in information security, with direct experience managing RFPs and
completing vendor security questionnaires.
Technical Expertise: Knowledgeable in information security concepts, protocols, and compliance frameworks such as ISO 27001 and SOC 2.
Communication Skills: Able to clearly articulate technical security information to non-technical
stakeholders and customers.
Project Management: Skilled in prioritizing and managing multiple projects simultaneously,
ensuring timely and organized responses to RFPs and assessments.
Attention to Detail: Strong attention to detail and commitment to accuracy in all security
responses.
Education:
Bachelor’s degree in Information Security, Computer Science, or a related field preferred but not