4,071 Cybersecurity Analysts jobs in India

Vulnerability Assessment

₹500000 - ₹1500000 Y National Payments Corporation of India (NPCI)

Posted today

Job Viewed

Tap Again To Close

Job Description

Roles & Responsibilities -

  • Coordinate with GRC teams to ensure security controls related to vulnerability and configuration management are implemented and monitored effectively.
  • Develop and maintain policy and process documentation to support audit readiness and regulatory inspections.
  • Support internal and external audits by providing evidence of VA/CA processes, results, and risk treatment plans.
  • Track and document remediation activities related to audit and compliance findings.
  • Ensure VA and CA programs align with organizational compliance requirements (ISO 27001, PCI-DSS, NIST, etc.)
  • Proficiency in VA tools (Qualys, Tenable, Nessus, Rapid7).
  • Hands-on with container security scanning tools (e.g., Trivy, Aqua, Sysdig Secure).
  • In-depth knowledge of Docker, Kubernetes, container lifecycle, and orchestration security.
  • Solid understanding of configuration assessment tools (e.g., CIS-CAT, SCAP).
  • Strong grasp of OS internals (Linux, Windows), networking, and cloud platforms (AWS/Azure/GCP).
  • Familiarity with DevSecOps concepts and CI/CD integration.
  • Good scripting knowledge (Python, Bash, or PowerShell).
  • Excellent analytical, documentation, and presentation skills.
  • Bachelors degree in Computer Science, Information Security, or equivalent.
  • Preferred certifications: CEH, OSCP, CISSP, Kubernetes Security Specialist (CKS), or CompTIA Security+
This advertiser has chosen not to accept applicants from your region.

TRO – Vulnerability Assessment ~ Analyst

Hyderabad, Andhra Pradesh ₹1200000 - ₹2800000 Y CyberWark LLC

Posted today

Job Viewed

Tap Again To Close

Job Description

TRO – Vulnerability Assessment ~ Analyst (L2)

**Job Summary: ** We are looking for a dedicated and proactive Vulnerability Assessment Analyst I to join our cybersecurity team. In this role, you will be instrumental in identifying and assessing vulnerabilities across our IT infrastructure. Additionally, you will leverage basic coding skills to develop automation solutions that enhances overall workflow efficiency of vulnerability management processes.

**Key Responsibilities: ** - Conduct initial vulnerability scans and assessments on a range of systems, networks, and applications using industry-standard vulnerability assessment tools (e.g., Tenable, Nessus. Qualys) -

  • Analyze vulnerability scans results to validate findings, identifying false positives, and aid in prioritizing vulnerabilities based on severity, potential impact, and risk to the organization, supporting effective remediation efforts. -
  • Design and implement automation scripts to streamline key processes, including report generation, threat intelligence data ingestion, vulnerability data enrichment and triage. -
  • Collaborate with senior team members to triage, document, and communicate vulnerabilities to the relevant stakeholders. -
  • Support in the development and maintenance of standard operating procedures (SOPs) for vulnerability scanning and reporting processes. -
  • Assist in creation of reports and dashboards to deliver insights into the organization's security posture, highlighting vulnerability trends and risk levels. -
  • Communicate with cross-functional teams to coordinate and drive remediation efforts, ensuring timely resolution of vulnerabilities. -
  • Stay up to date with the latest cybersecurity threats, trends, and emerging technologies in vulnerability management.

**Requirements: ** -

  • Bachelor's degree in computer science, Cybersecurity, or related field (or equivalent experience). -
  • Fundamental understanding of networking concepts and operating systems, including Windows and Linux, as well as familiarity with network devices, such as switches, routers, and firewalls. -
  • Experience with vulnerability assessment tools (e.g., Tenable, Nessus, Qualys). - Familiarity with cybersecurity frameworks (e.g., NIST, CIS, ISO/IEC
  • Basic programming/scripting skills (e.g., Python, PowerShell, Bash) to support automation tasks. -
  • Strong analytical and problem-solving skills. -
  • Ability to work both independently and collaboratively in a team-oriented environment. -
  • Excellent written and verbal communication skills.

**Preferred Qualifications: **

  • Relevant certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), or equivalent is a plus.
  • Hands-on experience in scripting and automation for cybersecurity tasks

Job Types: Full-time, Permanent

Pay: ₹1,200, ₹2,800,000.00 per year

Benefits:

  • Health insurance

Application Question(s):

  • What is your current CTC and expected CTC?

Experience:

  • total work: 6 years (Required)

Location:

  • Hyderabad, Telangana (Required)

Work Location: In person

This advertiser has chosen not to accept applicants from your region.

Vulnerability Assessment Penetration Testing

Ahmedabad, Gujarat ₹400000 - ₹1200000 Y Talentco

Posted today

Job Viewed

Tap Again To Close

Job Description

Strong expertise in OWASP Top 10, NIST, and ISO 27001 frameworks.

Advanced knowledge of scripting languages (e.g., Python, Bash, PowerShell) for automation and tool development, with cloud security for platforms such as AWS, Azure, or Google Cloud.

This advertiser has chosen not to accept applicants from your region.

Vulnerability Assessment and Penetration Testing

Mumbai, Maharashtra Talent Corner HR Services Private Limited

Posted today

Job Viewed

Tap Again To Close

Job Description

**Job Title
- VAPT Executive **(Vulnerability Assessment and Penetration Testing)

**Industry-Global Compliance Services provider**

**Job location
- Mumbai**

**CTC- 4 to 6 lpa**

**Education
- Any Graduation**

**Job Description-**

**Primary Skills-**

Vulnerability Assessment and Penetration Testing for Infrastructure
- Application Security
- SAST
- DAST

**Secondary Skills-**

Certified with any technology such as CEH, CISSP, etc.

**Role and Responsibility-**
- To carry out secure code reviews and to find out critical security flaws in the code
- Conduct penetration test and launch exploits using Burpsuite, Nessus, Metaspoilt, Backtrack penetration testing distribution tools sets
- Analyze scan reports and suggest remediation / mitigation plan
- Providing rich client specific reports
- Demonstration of proof of concepts for exploits, manual penetration testing
- Knowledge on open source and commercial security assessment tools e.g. Burpsuit, Nessus, Appscan, nmap etc.
- Security configuration review of database /servers / firewalls / switches / routers, etc
- Knowledge of operating systems preferably windows, linux etc. network equipment’s system & network hardening

**Salary**: ₹400,000.00 - ₹600,000.00 per year

Schedule:

- Day shift

**Speak with the employer**
This advertiser has chosen not to accept applicants from your region.

Vulnerability Assessment and Penetration Testing

Mumbai, Maharashtra dfcs technologies ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

Please find JD.

**Job Summary**:
**Responsibilities**:
2. Perform manual and automated security assessments, leveraging industry-standard tools and techniques.

3. Analyse and interpret security assessment results to prioritize vulnerabilities based on risk level and potential impact.

4. Collaborate with development teams to provide guidance on secure coding practices and remediation strategies.

5. Prepare detailed reports documenting findings, including proof-of-concept demonstrations and recommendations for mitigation.

7. Participate in red team exercises and security incident response activities as needed.

**Requirements**:
1. bachelor's degree in computer science, Information Security, or related field (or equivalent work experience).

3. Proficiency in using industry-standard penetration testing tools such as Burp Suite, OWASP ZAP, Nmap, and Metasploit.

5. Familiarity with web technologies and frameworks, such as JavaScript, PHP, ASP.NET, and Ruby on Rails.

6. Excellent analytical and problem-solving skills, with the ability to think creatively to exploit vulnerabilities.

7. Effective communication skills, including the ability to articulate technical concepts to both technical and non-technical stakeholders.

8. Relevant certifications such as Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), or GIAC Web Application Penetration Tester (GWAPT) are a plus.

**Location: Mumbai ( Andheri)**

**Salary**: ₹400,000.00 - ₹600,000.00 per year

Application Question(s):

- How many years of experience do you have in VAPT?
- Can you attend face to face interview?

**Experience**:

- total work: 1 year (required)

Ability to Commute:

- Mumbai, Maharashtra (required)

Ability to Relocate:

- Mumbai, Maharashtra: Relocate before starting work (required)

Work Location: In person

**Speak with the employer**

This advertiser has chosen not to accept applicants from your region.

Pentester - Vulnerability Assessment & Penetration Testing (VAPT)

Hyderabad, Andhra Pradesh ProArch

Posted today

Job Viewed

Tap Again To Close

Job Description

We are hiring a hands-on Penetration Tester to lead and execute end-to-end security assessments across Web, Infrastructure, and Cloud environments. As the technical backbone of our lean and growing VAPT practice, you’ll work closely with the Security Lead and directly engage with clients to deliver meaningful, high-impact security outcomes.

Key Responsibilities:

  • Perform manual and automated penetration testing across:
    • Web Applications (based on OWASP Top 10)
    • Infrastructure (external/internal IPs, firewall review, patch audits)
    • Cloud Environments (basic Azure/AWS – IAM, Storage, Networking)
  • Identify, exploit, and report on vulnerabilities such as SSRF, RCE, IDOR, LFI, and S3 bucket exposures
  • Use tools such as Burp Suite , Nmap , SQLMap , Nikto , Nessus/OpenVAS
  • Write high-quality, detailed technical reports with:
    • Screenshots for PoCs
    • Remediation guidance
    • Risk severity scoring (preferably CVSSv3 )
  • Collaborate with clients to explain findings and provide actionable recommendations
  • Contribute to toolchain improvements and lightweight automation (Python/Bash preferred)

Requirements

  • 3–6+ years of hands-on experience in at least 2 of the following areas :
    • Web Application Penetration Testing (OWASP Top 10)
    • Infrastructure VAPT (internal/external, firewall, patch validation)
    • Basic Cloud VAPT (AWS or Azure: IAM, Storage, Networking)
  • Proficiency in:
    • Manual testing techniques , fuzzing, and exploitation
    • Burp Suite (Community or Pro)
    • Tools like Nmap, SQLMap, Nikto, Nessus/OpenVAS
  • Strong understanding of common vulnerabilities and exploitation techniques

Preferred Certifications

  • CEH , eJPT , OSCP (or strong portfolio/proof of hands-on skill)
  • AZ-500 or AWS Security Specialty (for cloud security exposure)

Good to Have

  • Familiarity with scripting for automation (Python, Bash)
  • Exposure to CVSSv3 for vulnerability scoring
  • Experience with Dradis , Excel-based reporting , or similar tools
This advertiser has chosen not to accept applicants from your region.

Senior Consultant - VAPT (Vulnerability Assessment & Penetration Testing)

Pune, Maharashtra Apt Resources

Posted today

Job Viewed

Tap Again To Close

Job Description

Apt Resources is hiring for our client, a leading cybersecurity services firm, seeking an experienced Senior Consultant – VAPT to join their expert team. The ideal candidate will have deep expertise in infrastructure and application security assessments, penetration testing, and a solid understanding of modern security threats and countermeasures.

Key Responsibilities: Infrastructure VA/PT:
  • Conduct black-box and grey-box vulnerability assessments and penetration tests on system/network/cloud environments.
  • Map network infrastructure, discover ports/services, and audit OS, network, and security configurations.
  • Use tools like NMap, Nessus, Metasploit, Kali Linux for exploiting vulnerabilities.
  • Stay current with CVEs and threat intelligence relevant to supported technologies.
  • Prepare and present detailed findings and mitigation plans to clients.
  • Deliver cloud infrastructure security assessments and configuration audits.
  • Create and deliver comprehensive, client-specific technical reports.
Application VA/PT:
  • Perform vulnerability assessments of Web, Mobile, and Thick-client applications based on OWASP standards.
  • Combine automated scanning with manual testing techniques to detect flaws.
Social Engineering:
  • Conduct phishing and spear-phishing simulations to assess end-user security awareness.

Requirements

Qualifications:
  • Bachelor's degree in Computer Science, IT, or a related field.
  • 8–10 years of hands-on experience in VAPT.
  • CEH certification is required.
  • OSCP or CREST certifications are a plus.
  • Experience working in an MSSP (Managed Security Services Provider) environment is preferred.
  • Strong understanding of Windows, Unix/Linux systems, firewalls, VPNs, and security infrastructure.
Technical Skills:
  • Expertise in tools like NMap, Metasploit, Kali Linux, Nessus, NetCat, HPing, Qualys, and RetinaCS.
  • Strong understanding of CVE databases, exploit development, and countermeasures.
  • Familiarity with scripting languages such as C++, C#, Perl, HTML, Shell, etc.
  • Knowledge of firewalls, IPS, DNS security, VLAN, web filtering, and VPNs.
  • Experience with cloud security assessment across major platforms (AWS, Azure, GCP).
Additional Requirements:
  • Strong communication, presentation, and documentation skills.
  • Ability to work independently and lead security assessments across client environments.
  • Willingness to travel overseas for project deployments.
  • Exposure to RFP response preparation, solution architecture, and client-facing presentations.

Benefits

Salary: Up to INR 18 LPA

This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Cybersecurity analysts Jobs in India !

Information Security Analyst

Chennai, Tamil Nadu Lexitas

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

About the company

Lexitas is a high growth company. The Company is built on a belief that having strong personal relationships with our clients, and providing reliable, accurate and professional services, is the driving force of our success.

Lexitas offers an array of services including local and national court reporting, medical record retrieval, process service, registered agent services and legal talent outsourcing. Our reach is truly national as well as international.

Lexitas is a MNC Company that has set up a subsidiary in Chennai, India – Lexitas India Pvt. Ltd. This Indian company will be the Lexitas Global Capability Center, helping build a world class IT development team, and over time serve as a Shared Services hub for several of the corporate functions.


For More Information -


This is a Full-Time Job located in Chennai, India.


Summary:

This position supports information security, privacy, risk and compliance programs and activities under the direction of the VP of Information Security or designated Information Security Manager. The position assists in developing and maintaining a comprehensive security program for Lexitas. Providing functional and technical support is important to maintain security posture and protection of electronically and physically stored information assets across our systems. Tasks include supporting design, implementation, configuration, documentation, and maintenance to mitigate risk to the business and its computing resources and assets, as well as collaborating with applicable providers, managing and monitoring tools, and facilitating applicable processes and procedures.


Key Roles and Responsibilities :

  • Supports IT security, privacy, risk and compliance systems, processes, supporting activities, with the ability to lead activities and programs.
  • Monitors computer networks and associated tools and provider services for security, privacy, risk and compliance issues
  • Supports the project management, tracking, and documentation of Information, Privacy, Risk, and Compliance programs, processes, and activities
  • Investigate security breaches and cybersecurity incidents.
  • Documents security breaches and assesses impact.
  • Performs and/or supports security tests, risk assessments, and audits to uncover network, application, and process vulnerabilities and provides guidance and training to ensure violations do not persist.
  • Tracks and facilitates the mitigation of vulnerabilities to maintain a high security standard.
  • Supports best practices for IT security, privacy and compliance.
  • Performs and supports 3rd party vulnerability management and penetration testing.
  • Research security enhancements and makes recommendations to management.
  • Stays current on information technology trends and security standards.
  • Prepares reports that detail security, privacy, and compliance risk assessment findings.
  • Supports Security Operations Center functions including monitoring and supporting Incident Response activities.
  • Supports all related IT Security, Privacy, Risk and Compliance policies and provides guidance to the business.
  • Other Information Security, Privacy, Risk, and Compliance duties as required.


Skills and Abilities:

  • Experience with computer network and application vulnerability management and penetration testing, and techniques.
  • Solid understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
  • Ability to identify and mitigate network and application vulnerabilities.
  • Good understanding of patch management
  • Proficient with various OS
  • Excellent written and verbal communication skills
  • Knowledge of firewalls, antivirus, and intrusion detection system concepts
  • Ability to support and document areas of Information Security, Privacy, Risk, and compliance processes and programs.
  • Ability to support incident response process.
  • Experience directing 3rd Party providers in the areas of Information Security, Privacy, Risk and Compliance
  • Support information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
  • Preferred KSA’s:
  • Strong working knowledge and experience with primary Information Security, Privacy, Risk, and compliance standards and frameworks such as NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.
  • Experience administering information security software and controls.
  • Experience supporting process for managing network and application security.
  • Network and system administration experience a plus.
  • Good understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices.
  • Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
  • Learns and monitors the business processes for the areas of primary support responsibility.
  • Support annual Security Baseline Audits and execution of recommendations.
  • As part of the technology team, performs “Help Desk” day-to-day tasks in support of Information Security, Privacy, Risk, and Compliance.



Education and Experience:

  • Bachelor’s degree in computer science or related field strongly preferred.
  • IAT Level-2 technical certification strongly preferred (Comp TIA Security+ or CISSP) or ability to obtain within first 90 days of hire.
  • 5+ years’ experience performing role of Information Security Analyst or SOC
  • Demonstrated experience in responding to, managing, and resolving security incidents.
  • Experience with LAN/WAN networking concepts, IP addressing and routing concepts, Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
  • Experience with Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
  • Experience working with Security Information and Even Management (SIEM) system is a plus.
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Pune, Maharashtra ₹1200000 - ₹3600000 Y Cohesity

Posted today

Job Viewed

Tap Again To Close

Job Description

Cohesity is the leader in AI-powered data security. Over 13,600 enterprise customers, including over 85 of the Fortune 100 and nearly 70% of the Global 500, rely on Cohesity to strengthen their resilience while providing Gen AI insights into their vast amounts of data. Formed from the combination of Cohesity with Veritas' enterprise data protection business, the company's solutions secure and protect data on-premises, in the cloud, and at the edge. Backed by NVIDIA, IBM, HPE, Cisco, AWS, Google Cloud, and others, Cohesity is headquartered in Santa Clara, CA, with offices around the globe.

We've been named a Leader by multiple analyst firms and have been globally recognized for Innovation, Product Strength, and Simplicity in Design , and our culture.

Want to join the leader in AI-powered data security?
We are seeking a highly skilled Security Engineer with strong expertise in Endpoint Detection & Response (EDR/XDR) tools (e.g., CrowdStrike Falcon), Security Information and Event Management (SIEM) platforms (e.g., Splunk, Google SecOps/Chronicle), Cloud Security across AWS, Azure, and GCP. The ideal candidate will have Deep investigation skills and cloud threat detection capabilities, Proven experience as Incident Commander during critical incidents, awareness of recent threats and adversarial techniques, Ability to quickly understand complex environments, Strong business and interpersonal skills to manage risks and collaborate with cross-functional teams

How You'll Spend Your Time Here

  • Serve as a senior escalation point for high-severity alerts and incidents across on-prem, endpoint, and cloud workloads
  • Perform deep-dive investigations into complex threats such as Cloud-native attacks, Malware and ransomware, Insider threats, Advanced Persistent Threat (APT) campaigns
  • Correlate telemetry from EDR/XDR, SIEM, CSPM, and threat intel sources to detect sophisticated threats
  • Lead Major Incident Response as Incident Commander, coordinating SOC, IR, Cloud, and IT teams
  • Drive containment, eradication, and recovery for both on-premises and cloud security incidents
  • Deliver comprehensive post-incident reports with actionable remediation guidance
  • Lead and participate in Blue/Red team exercises to improve detection logic and align with MITRE ATT&CK
  • Mentor SOC analysts and junior engineers in advanced investigations and cloud IR
  • Review and update SOPs, protocols, and capabilities to address emerging threats
  • Develop metrics and scorecards to measure Organizational risk, SOC operational effectiveness and efficiency

*WE'D LOVE TO TALK TO YOU IF YOU HAVE MANY OF THE FOLLOWING: *

  • EDR/XDR: Strong hands-on experience with CrowdStrike Falcon
  • SIEM: Expertise in Splunk and/or Google SecOps (Chronicle)
  • Cloud Security: Skilled in cloud monitoring (AWS, Azure, GCP) and incident handling
  • Incident Response: Proven track record as Incident Commander handling multi-vector incidents
  • OS Knowledge: Deep understanding of Windows and Linux internals
  • DLP Tools: Proficiency with MS Defender, Zscaler
  • CSPM Tools: Familiarity with Wiz, Qualys, AWS Security Hub, Azure Defender, GCP SCC
  • SOAR Platforms: Experience with Splunk SOAR, Google Siemplify
  • Scripting: Python, PowerShell, or similar for automation (preferred)

Data Privacy Notice For Job Candidates
For information on personal data processing, please see our Privacy Policy
.
**Equal Employment Opportunity Employer (EEOE)

Cohesity is an Equal Employment Opportunity Employer. All qualified applicants will receive consideration for employment without regard to race, color, creed, religion, sex, sexual orientation, national origin or nationality, ancestry, age, disability, gender identity or expression, marital status, veteran status or any other category protected by law.

If you are an individual with a disability and require a reasonable accommodation to complete any part of the application process, or are limited in the ability or unable to access or use this online application process and need an alternative method for applying, you may contact us at COHESITY or

for assistance.
In-Office Expectations

Cohesity employees who are within a reasonable commute (e.g. within a forty-five (45) minute average travel time) work out of our core offices 2-3 days a week of their choosing.
Interested candidates based outside of the designated areas are welcome to apply, provided they have the right to work in the job location.

This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Hyderabad, Andhra Pradesh ₹1500000 - ₹2500000 Y Cynosure Corporate Solutions

Posted today

Job Viewed

Tap Again To Close

Job Description

Role & responsibilities

  • Should have Cybersecurity Audit experience , PCI DSS/ISO27k/SOC1/SOC2 or any other cybersecurity framework.
  • Should have conducted cybersecurity risk assessment.
  • Should be into security control architect.
  • Must have implemented security controls projects.

Requirements:

  • Conduct monthly, quarterly, semi-annual, and annual application, infrastructure, microservices, API and cloud security assessments.
  • 3+ years experience in ERM, BIA, DR and BCP.
  • 3+ years experience with vulnerability management, SIEM and Log Management, Antivirus/Anti- Malware, proxy servers, DLP, IPS/IDS, VPN, PKI, Multi-factor authentication, cryptography.
  • Detailed understanding of common exploits and their defense (EOP, DoS/DDoS, Spoofing, Phishing, Rootkits, RATs, key logging, Zero Day, SQL Injection, XSS, CSRF).
  • Excellent in security incident response and to countermeasure atacks.
  • Knowledge in common operating system and architecture, Windows, Linux, MS SQL, MySQL, Oracle, networking, etc.
  • Research, perform gap analysis, implement, and maintain security controls excellence across existing and new applications, mobile apps, microservices, infrastructure and network.
  • Audit/assess security controls to satisfy PCI DSS.
  • Define application security policies, procedures, and provide application security architecture best practices.
  • Facilitate cyber security training based on the department, role, responsibility, and data access.
  • Manage technical, operational, and administrative projects across the Enterprise.
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Cybersecurity Analysts Jobs