3,677 Cyber Security jobs in India
Cyber Security
Posted today
Job Viewed
Job Description
• Competitive Compensation Depending on Experience
Cyber Security
Posted today
Job Viewed
Job Description
Cyber Security
Requirements
- Qualifications: BE / M.Tech / MSc (IT, Mathematics) / MCA
- Key Responsibilities:
- Develop and implement cybersecurity policies, frameworks, and security best practices.
- Monitor, analyze, and mitigate security threats to ensure a secure IT infrastructure.
- Conduct risk assessments, vulnerability scanning, and penetration testing.
- Ensure compliance with regulatory and industry security standards (ISO 27001, NIST, GDPR, etc.).
- Provide incident response and forensic analysis in the event of security breaches.
- Develop security awareness programs and training sessions for internal teams.
- Collaborate with stakeholders and IT teams to integrate security strategies into business operations.
- Stay updated on emerging cybersecurity technologies and innovations to enhance security resilience.
- Experience & skills:
- Minimum 4 years of experience as a technical consultant in cybersecurity.
- Successfully delivered at least three cybersecurity projects.
- Extensive experience in hardware and software security solutions, network security, and IT infrastructure protection.
- Strong knowledge of security frameworks, compliance standards, and threat intelligence.
- Proven expertise in data protection, software encryption, and cybersecurity risk assessment.
- Ability to develop and maintain internal security logs and provide incident response support.
- Proficiency in providing web-portal security support and troubleshooting.
- Expertise in monitoring security performance metrics and ensuring system integrity.
- Strong understanding of emerging cybersecurity threats, vulnerabilities, and mitigation strategies.
- Exceptional interpersonal and communication skills with the ability to conduct in-house training to enhance cybersecurity awareness.
- Experience with SIEM tools, IDS/IPS, firewalls, and endpoint security solutions.
- Strong understanding of cloud security, encryption protocols, and access management.
- Ability to work in fast-paced and high-security environments.
- Strong problem-solving and analytical skills to address complex security challenges.
- Preferred Certifications:
- Candidates with the following certifications will be given preference:
▪Certified Ethical Hacker (CEH)
▪Certified Information Systems Security Professional (CISSP)
▪Certified Information Security Manager (CISM)
▪CompTIA Security+ or CompTIA Advanced Security Practitioner (CASP)
▪GIAC Security Certifications (GSEC, GCIH, GPEN, etc.)
▪EC-Council Certified Security Analyst (ECSA)
▪Certified Cloud Security Professional (CCSP), ▪ISO 27001 Lead Auditor / Implementer
Cyber Security
Posted today
Job Viewed
Job Description
We are looking for highly motivated and technically skilled individuals to join our Cyber Security – VAPT team. This role offers an opportunity to gain hands-on experience in identifying vulnerabilities, performing penetration tests, and implementing security solutions to protect critical systems and data.
As part of the Cyber Security team, you will be working on real-time security assessments, analyzing threat vectors, and providing actionable insights to enhance an organization’s security posture.
Requirements
• Conduct Vulnerability Assessment & Penetration Testing (VAPT) on web applications, mobile apps, servers, cloud infrastructure, and networks.
• Identify, exploit, and document security vulnerabilities using both automated and manual tools.
• Prepare comprehensive technical reports with clear explanations of findings, risk levels, and mitigation strategies.
• Collaborate with development and infrastructure teams to suggest remediation and patch management.
• Perform risk assessments and help enforce security compliance as per industry standards (OWASP Top 10, ISO 27001, NIST).
• Monitor new cyber threats and assist in creating incident response protocols.
• Use tools like Burp Suite, Nessus, Nmap, Metasploit, Wireshark, Kali Linux, etc.
• Stay updated with emerging threats, vulnerabilities, and mitigation techniques.
• Education: Pass-out or final semester students awaiting results (2023/2024/2025)
• Status: Pursuing students (still in college) are not eligible
• Should have basic knowledge of networking, firewalls, ethical hacking, and cybersecurity tools
• Good understanding of OWASP Top 10, malware analysis, phishing attacks, etc.
• Strong analytical thinking and problem-solving skills
• Willingness to learn and grow in the cybersecurity domain
Requirements
• Should have basic knowledge of networking, firewalls, ethical hacking, and cybersecurity tools • Good understanding of OWASP Top 10, malware analysis, phishing attacks, etc.
Cyber Security
Posted today
Job Viewed
Job Description
• Encryption and security/compliance experience (PCI)
• In-depth understanding and Knowledge of network security capabilities and best-practices (e.g., IPS/IDS, firewalls, proxies, BYOD, SIEM, wireless security)
• Experience with ADFS, Azure Multi-Factor Authentication, Active Directory a plus
• CISSP or other security and cyber-enterprise Architecture methodology certifications a plus but not required
• Experience performing security/vulnerability reviews of network environments.
• Experience with SAML / Single Sign-On tools, techniques, and authentication with SaaS applications
Cyber Security
Posted today
Job Viewed
Job Description
To join our team of cybersecurity professionals. Our mission in KONE Cybersecurity is to keep KONE business cyber resilient. With cybersecurity tooling, including Identity and Access Management we help KONE people as well as our customers and partners to perform at their best, and at the same time keep KONE secure. The platforms that are in scope of IAM are:
When the experience increases, the person in this position is expected also to participate to other initiatives in Enterprise, Product or OT security, depending on the initiatives on-going at that point, and on the person’s background and interests.
The position is based in Pune or Chennai in India, or in Espoo Finland and will report to Head of Access and Tools in Cybersecurity.
Main Responsibilities
We Expect You To Have
OR (to replace any of above requirements)
We offer you
Read more on
Cyber Security
Posted today
Job Viewed
Job Description
We are looking for highly motivated and technically skilled individuals to join our Cyber Security – VAPT team. This role offers an opportunity to gain hands-on experience in identifying vulnerabilities, performing penetration tests, and implementing security solutions to protect critical systems and data.
As part of the Cyber Security team, you will be working on real-time security assessments, analyzing threat vectors, and providing actionable insights to enhance an organization’s security posture.
Requirements
• Conduct Vulnerability Assessment & Penetration Testing (VAPT) on web applications, mobile apps, servers, cloud infrastructure, and networks.
• Identify, exploit, and document security vulnerabilities using both automated and manual tools.
• Prepare comprehensive technical reports with clear explanations of findings, risk levels, and mitigation strategies.
• Collaborate with development and infrastructure teams to suggest remediation and patch management.
• Perform risk assessments and help enforce security compliance as per industry standards (OWASP Top 10, ISO 27001, NIST).
• Monitor new cyber threats and assist in creating incident response protocols.
• Use tools like Burp Suite, Nessus, Nmap, Metasploit, Wireshark, Kali Linux, etc.
• Stay updated with emerging threats, vulnerabilities, and mitigation techniques.
• Education: Pass-out or final semester students awaiting results (2023/2024/2025)
• Status: Pursuing students (still in college) are not eligible
• Should have basic knowledge of networking, firewalls, ethical hacking, and cybersecurity tools
• Good understanding of OWASP Top 10, malware analysis, phishing attacks, etc.
• Strong analytical thinking and problem-solving skills
• Willingness to learn and grow in the cybersecurity domain
Cyber Security
Posted today
Job Viewed
Job Description
• Must have a minimum of 5 years of experience in resiliency, business continuity, or a related field.
• Must have three years of experience overseeing disaster recovery project management and processes.
• 2 years of experience in assessing business impact analyses.
• 3 years of experience in assessing risk analyses.
• 3 years of experience in resiliency planning and plan exercises.
• 2 years of experience in software/system design, software/system documentation, and the software/system development process, including Software/System Development Life Cycle (""SDLC"").
• 2 years of experience conducting cost-benefit analyses.
• 3 years of experience leading program review sessions with various levels of management and technology partners.
Be The First To Know
About the latest Cyber security Jobs in India !
Cyber Security
Posted today
Job Viewed
Job Description
To join our team of cybersecurity professionals. Our mission in KONE Cybersecurity is to keep KONE business cyber resilient. With cybersecurity tooling, including Identity and Access Management we help KONE people as well as our customers and partners to perform at their best, and at the same time keep KONE secure. The platforms that are in scope of IAM are:
When the experience increases, the person in this position is expected also to participate to other initiatives in Enterprise, Product or OT security, depending on the initiatives on-going at that point, and on the person’s background and interests.
The position is based in Pune or Chennai in India, or in Espoo Finland and will report to Head of Access and Tools in Cybersecurity.
Main Responsibilities
We Expect You To Have
OR (to replace any of above requirements)
We offer you
Read more on
Cyber Security
Posted today
Job Viewed
Job Description
• Must have a minimum of 5 years of experience in resiliency, business continuity, or a related field.
• Must have three years of experience overseeing disaster recovery project management and processes.
• 2 years of experience in assessing business impact analyses.
• 3 years of experience in assessing risk analyses.
• 3 years of experience in resiliency planning and plan exercises.
• 2 years of experience in software/system design, software/system documentation, and the software/system development process, including Software/System Development Life Cycle (""SDLC"").
• 2 years of experience conducting cost-benefit analyses.
• 3 years of experience leading program review sessions with various levels of management and technology partners.
Cyber Security
Posted today
Job Viewed
Job Description
Cortex is Hiring: Cyberlife BA with Testing skills (6+ years' Experience)
Location/mode of work: REMOTE
Role Description:
Highly skilled Business Analyst with solid experience in the life insurance domain and
hands-on exposure to DXC's CyberLife platform. The ideal candidate will have a strong
background in gathering business requirements, mapping them to technical
implementations, and driving User Acceptance Testing (UAT) activities.
Required Skills and Qualifications:
* Minimum 6+ years of experience as a Business Analyst in the insurance domain,
with 2+ years working directly with CyberLife.
* Strong knowledge of life insurance products, policy administration processes,
Preferred Qualifications:
1. Experience with tools like JIRA, ALM, or Quality Center for requirements and
testing management.
2. Knowledge of CyberLife de-segmentation logic or data extraction approaches is
a plus.
Key Responsibilities:
* Collaborate with development and Business teams to validate solutions meet
business objectives.
* Conduct gap analysis, process mapping, and impact assessments related to
changes in the CyberLife system.
* Prepare detailed use cases, test scenarios, and acceptance criteria for UAT.
* Lead or support User Acceptance Testing by coordinating with business testers,
executing test scripts, tracking defects, and ensuring timely closure.
* Participate in Agile ceremonies or structured project meetings, providing
updates on requirements, risks, and testing readiness.
* Act as a subject matter expert (SME) on life insurance processes, including policy
lifecycle, billing, claims, underwriting, and benefits.
* Assist in data validation, legacy data mapping, and policy migration efforts when
applicable.
* Translate business needs into functional and non-functional requirements with
clarity and detail
This job is posted by
Aishwarya.K
CORTEX CONSULTANTS,CHENNAI