2,426 Ethical Hacking jobs in India

Ethical Hacking

Chennai, Tamil Nadu Anicalls (Pty) Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

• Ability to demonstrate manual web application testing experience
• Experience with web application vulnerability scanning tools (e.g., IBM AppScan, HP Web Inspect, Acunetix, NTO Spider, Burpsuite Pro, etc.)
• Experience with vulnerability assessment tools and penetration testing techniques (e.g., web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI, etc.)
• Experience of penetration testing on mobile platforms such as iOS, Android, Windows, and RIM.
• Solid programming/debugging skills with proficiency in one or more of the following: Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C.
• Expert-level experience and very details technical Knowledge in at least 3 of the following areas: general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; standard communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web services
• Demonstrated ability to learn and apply critical thinking to a variety of situations
• Mobile programming abilities such as Xcode, Objective-C
• One or more of the following certifications: CISSO, GWAPT, CEH, OSCP (or qualified work experience)
• Strong scripting skills (e.g., Python, Perl, Shell script, JavaScript
• Experience as a developer
• Knowledge of a Structured Query Language
This advertiser has chosen not to accept applicants from your region.

Ethical Hacking

Thiruvananthapuram, Kerala Softzone

Posted today

Job Viewed

Tap Again To Close

Job Description

softzone is an IT training institution and a leading company in kerala.

**Job Type**: Part-time
Part-time hours: 10 per week

**Salary**: From ₹150.00 per hour

Schedule:

- Evening shift
- Flexible shift

COVID-19 considerations:
keep mask.

Ability to commute/relocate:

- Thiruvananthapuram, Kerala: Reliably commute or planning to relocate before starting work (required)

**Experience**:

- total work: 1 year (preferred)
This advertiser has chosen not to accept applicants from your region.

Ethical Hacking developer

Bengaluru, Karnataka Anicalls (Pty) Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

• Ability to demonstrate manual web application testing experience
• Experience with web application vulnerability scanning tools (e.g., IBM AppScan, HP Web Inspect, Acunetix, NTO Spider, Burpsuite Pro, etc.)
• Experience with vulnerability assessment tools and penetration testing techniques (e.g., web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI, etc.)
• Experience of penetration testing on mobile platforms such as iOS, Android, Windows, and RIM.
• Solid programming/debugging skills with proficiency in one or more of the following: Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C.
• Expert-level experience and very details technical Knowledge in at least 3 of the following areas: general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; standard communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web services
• Demonstrated ability to learn and apply critical thinking to a variety of situations
• Mobile programming abilities such as Xcode, Objective-C
• One or more of the following certifications: CISSO, GWAPT, CEH, OSCP (or qualified work experience)
• Strong scripting skills (e.g., Python, Perl, Shell script, JavaScript
• Experience as a developer
• Knowledge of a Structured Query Language
This advertiser has chosen not to accept applicants from your region.

Ethical Hacking Analyst

Noida, Uttar Pradesh Anicalls (Pty) Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

• Ability to demonstrate manual web application testing experience
• Experience with web application vulnerability scanning tools (e.g., IBM AppScan, HP Web Inspect, Acunetix, NTO Spider, Burpsuite Pro, etc.)
• Experience with vulnerability assessment tools and penetration testing techniques (e.g., web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI, etc.)
• Experience of penetration testing on mobile platforms such as iOS, Android, Windows, and RIM.
• Solid programming/debugging skills with proficiency in one or more of the following: Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C.
• Expert-level experience and very details technical Knowledge in at least 3 of the following areas: general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; standard communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web services
• Demonstrated ability to learn and apply critical thinking to a variety of situations
• Mobile programming abilities such as Xcode, Objective-C
• One or more of the following certifications: CISSO, GWAPT, CEH, OSCP (or qualified work experience)
• Strong scripting skills (e.g., Python, Perl, Shell script, JavaScript
• Experience as a developer
• Knowledge of a Structured Query Language
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Hyderabad, Andhra Pradesh Wells Fargo

Posted 2 days ago

Job Viewed

Tap Again To Close

Job Description

**About this role:**
Wells Fargo is seeking an Information Security Analyst.
**In this role, you will:**
+ Participate and identify security risks companywide and ensure that appropriate data security procedures and products are implemented
+ Maintain an awareness of bank security policies and government regulations pertaining to information security
+ Review the development, testing, and implementation of security plans, products, and control techniques
+ Develop and implement security standards, procedures, and guidelines for multiple platforms and diverse systems environments
+ Investigate and recommend appropriate corrective actions for data security incidents
+ Identify regulatory changes that will affect information security policy, standards, procedures, and recommend appropriate changes
+ Provide security consulting and project management services on highly complex information security projects and issues
+ Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals
+ Interact with internal customers
+ Receive direction from leaders and exercise independent judgment while developing the knowledge to understand function, policies, procedures, and compliance requirements
**Required Qualifications:**
+ 2+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
**Desired Qualifications:**
+ Ability to make timely and independent decisions while working in a fast-paced and results-driven environment
+ Must have leadership skills, to be resilient and drive changes.
+ Any one Information Security certification (Security +, CISSP, CIAM) or IAM vendor based certifications (Cyberark, Oracle, IBM)
+ Knowledge and understanding of service delivery including SLAs/KPIs
+ Exposure on escalation processes/matrix and ability to prioritize tasks
+ Basic troubleshooting skills over UNIX / Database / Mainframe / Active Directory.
+ Ability to collaborate effectively with different teams, accept challenging assignments and foster robust working relationships with teams.
+ Knowledge sharing to help the team explore ideas and make them successful.
**Job Expectations:**
+ Provides Identity and Access administration within Application/Active directory/Mainframe environment as per requests submitted through various request methods.
+ Provides basic technical support for routine security-related issues.
+ Responds to related problem tickets.
+ Provides on-call 24/7 Access Management/Production support as required or scheduled by management.
+ Performs periodic review of existing documentation to ensure current understanding of processes and procedures making updates/changes as necessary.
+ Identifies ways to streamline and automate access management processes to ensure consistency, reduce errors, reduce cycle time, and minimize audit/gap issues.
+ Performs tasks/projects that is assigned/recommended by Immediate Manager
**Posting End Date:**
13 Aug 2025
**_*Job posting may come down early due to volume of applicants._**
**We Value Equal Opportunity**
Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic.
Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements.
Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process.
**Applicants with Disabilities**
To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo ( .
**Drug and Alcohol Policy**
Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy ( to learn more.
**Wells Fargo Recruitment and Hiring Requirements:**
a. Third-Party recordings are prohibited unless authorized by Wells Fargo.
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.
**Req Number:** R-479064
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Hyderabad, Andhra Pradesh Wells Fargo

Posted 4 days ago

Job Viewed

Tap Again To Close

Job Description

**About this role:**
Wells Fargo is seeking a Information Security Analyst.
**In this role, you will:**
+ Participate and identify security risks companywide and ensure that appropriate data security procedures and products are implemented
+ Maintain an awareness of bank security policies and government regulations pertaining to information security
+ Review the development, testing, and implementation of security plans, products, and control techniques
+ Develop and implement security standards, procedures, and guidelines for multiple platforms and diverse systems environments
+ Investigate and recommend appropriate corrective actions for data security incidents
+ Identify regulatory changes that will affect information security policy, standards, procedures, and recommend appropriate changes
+ Provide security consulting and project management services on highly complex information security projects and issues
+ Collaborate and consult with peers, colleagues, and managers to resolve issues and achieve goals
+ Interact with internal customers
+ Receive direction from leaders and exercise independent judgment while developing the knowledge to understand function, policies, procedures, and compliance requirements
**Required Qualifications:**
+ 2+ years of Information Security Analysis experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
**Desired Qualifications:**
+ Bachelor of Engineering Degree, preferably of Computer science or Information Technology
+ 2+ years of IAM, information security, Access Administration and provisioning Enterprise Applications
+ Knowledge and experience with any IAM, Provisioning, role management and certification tool
+ Knowledge and experience on Applications Infrastructure in a Large Enterprise environment.
+ Strong knowledge and understanding of information security and IAM practices and policies.
+ Experience with Service Delivery and SLAs/KPIs monitoring. Proven ability for high volume/high quality results
+ Ability to interact with integrity and a high level of professionalism with all levels of team members and management.
+ Knowledge on formal risk management methodology / regulatory guidelines required for financial service organizations / information security compliance/policies and ability to identify & contribute towards mitigating risks.
+ Strong verbal, written, and interpersonal communication skills.
+ Excellent customer service skills. Ability to research and correspond with customers, responding to their questions and concerns with detailed information.
+ Ability to make timely and independent decisions while working in a fast-paced and results-driven environment.
+ Strong problem solving and analytical skills with high attention to detail and accuracy.
+ Ability to work effectively, as well as independently, in team environment.
+ Ability to take an active role in the education, mentoring and training of less experienced team members.
+ Strong documentation skills with the ability to collect, organize, analyze, update and disseminate significant amounts of information with attention to detail and accuracy.
+ Strong time management skills with ability to participate in multiple projects/work streams simultaneously.
+ Proven experience in identifying and resolving customer and production issues.
+ Maintains familiarity with internal departmental and bank procedures and policies.
+ Knowledge/Skills/Ability in advanced Microsoft Office (Word, Excel, Outlook, PowerPoint, Access, and Project) skills.
+ Must be flexible to work in shifts & be available for business meetings/team deliverables within/outside of one's shift.
+ Must have leadership skills, to be resilient and drive changes. Ability to maintain composure under pressure and deadlines in a dynamic environment.
+ Working knowledge ticketing tools like Service Now etc.
+ Any one Information Security certification (Security +, CISSP, CIAM) or IAM vendor- based certifications (CyberArk, Oracle, IBM)
+ Banking Domain Experience
+ Ability to assess current processes/procedures and make recommendations for efficiency.
+ Proven experience in mentoring less experienced team members
+ Basic troubleshooting skills over UNIX / Database / Mainframe / Active Directory.
+ Exposure on escalation processes/matrix and ability to prioritize tasks.
+ Basic knowledge on programming languages like Python, VBA etc.
**Posting End Date:**
30 Aug 2025
**_*Job posting may come down early due to volume of applicants._**
**We Value Equal Opportunity**
Wells Fargo is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other legally protected characteristic.
Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit's risk appetite and all risk and compliance program requirements.
Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process.
**Applicants with Disabilities**
To request a medical accommodation during the application or interview process, visit Disability Inclusion at Wells Fargo ( .
**Drug and Alcohol Policy**
Wells Fargo maintains a drug free workplace. Please see our Drug and Alcohol Policy ( to learn more.
**Wells Fargo Recruitment and Hiring Requirements:**
a. Third-Party recordings are prohibited unless authorized by Wells Fargo.
b. Wells Fargo requires you to directly represent your own experiences during the recruiting and hiring process.
**Req Number:** R-477905
This advertiser has chosen not to accept applicants from your region.

Information Security Analyst

Tripura, Tripura Diamond Infotech Pvt Ltd

Posted today

Job Viewed

Tap Again To Close

Job Description

We are seeking a skilled and experienced Information Security Analyst/ SOC Administrator to join our team in Tripura. In this critical role, you will be instrumental in safeguarding our Data Centre Infrastructure, ensuring the continuous protection of our digital assets from evolving cyber threats. You will lead our cybersecurity operations, providing expert guidance and fostering a robust security posture.

Key Responsibilities:

  • Cybersecurity System Management:
  • Manage, monitor, and analyze cybersecurity systems to proactively protect Data Centre Infrastructure from intrusions.
  • Incident Management & Reporting:
  • Prepare daily, weekly, and monthly analysis reports for DIT, detailing incident severity, root causes, and recommended remedial measures to prevent reoccurrence.
  • Manage CSOC event and information intake, including intelligence gathering, monitoring ticket queues, investigating reported incidents, and liaising with security and network groups.
  • Team Leadership & Mentorship:
  • Monitor the performance of Level 1 and Level 2 analysts by thoroughly investigating incoming events using CSOC tools.
  • Ensure timely resolution of Level 1 and Level 2 events through available reporting and metrics.
  • Approve and, if necessary, further investigate Level 1 and Level 2 escalated events.
  • Mentor and guide Level 1 and Level 2 analysts to enhance their detection capabilities within the CSOC.
  • Expert Analysis & Research:
  • Function as a Subject Matter Expert (SME) in incident detection and analysis techniques, offering guidance to junior analysts and strategic recommendations to organizational managers.
  • Conduct security research and intelligence gathering on emerging threats and exploits.
  • Investigate new vulnerabilities and share the latest industry-level responses and best practices.
  • Risk Management & Consulting:
  • Perform risk assessments and develop mitigation strategies.
  • Provide network and security consulting and training to internal teams.
  • Operational Excellence & Business Continuity:
  • Monitor overall SOC performance.
  • Serve as a backup analyst for potential coverage gaps to ensure seamless business continuity.
  • Stakeholder Engagement:
  • Liaise effectively with various internal and external stakeholders during incident response.
  • Additional Responsibilities:
  • Perform other auxiliary cybersecurity responsibilities as required.

Required Skills and Qualifications:

  • Education: B.E / B-Tech / MCA / MSc. IT.
  • Experience:
  • Minimum 2 years of experience in SOC services, specifically conducting security device administration & management.
  • Minimum 2 years of hands-on experience with SIEM tools and other security tools.
  • Certifications (at least one of the following):
  • Certification in at least one industry-leading SIEM product (e.g., Splunk Certified Admin/Architect, IBM QRadar Certified Analyst/Administrator, Arc Sight Certified Analyst/Administrator, Microsoft Azure Sentinel certifications).
  • Certification in ISO 27001:2013 or later version.
This advertiser has chosen not to accept applicants from your region.
Be The First To Know

About the latest Ethical hacking Jobs in India !

Information Security Analyst

Trivandrum, Kerala Envestnet

Posted today

Job Viewed

Tap Again To Close

Job Description

Job Title: Information Security Analyst / Analyst – Identity Governance and Compliance

Department: Information Security – Governance, Risk & Compliance (GRC)

Experience Level: 2 - 4 years

Employment Type: Full-time


Job Summary:

We are seeking a highly motivated and detail-oriented Information Security Analyst / Sr. Analyst to join our GRC team, with a focus on Identity Governance and Compliance. This role is pivotal in ensuring that Identity and Access Management (IAM) practices align with regulatory requirements, internal policies, and industry best practices. The ideal candidate will have experience with User Access Reviews (UAR), Active Directory (AD), and a strong understanding of security frameworks such as PCI DSS, ISO 27001, NIST, and COBIT.


Key Responsibilities:

  • Manage the Identity Governance and compliance activities, including periodic User Access Reviews (UAR) and RBAC activities.
  • Ensure IAM practices comply with internal policies and external regulatory requirements.
  • Maintain and enhance identity governance policies, standards, and procedures.
  • Provide subject matter expertise on Active Directory (AD), including group policies and access provisioning/deprovisioning.
  • Align identity governance practices with frameworks such as PCI DSS, ISO 27001, NIST CSF, and COBIT.
  • Engage with IT, HR, and business units to enforce least privilege principles and maintain accurate access records.
  • Conduct regular training sessions for the SM team on security controls and client requirements.
  • Coordinate SME involvement in quarterly meetings and training initiatives.
  • Maintain and organize SharePoint and Jira spaces for audit readiness and evidence management.
  • Participate in incident management, change control meetings, and cloud migration initiatives.
  • Engage in SOC operations and threat tracking.
  • Drive continuous improvement initiatives in identity governance and GRC processes.
  • Lead the annual review of security information presentations in collaboration with Compliance.


Required Qualifications:

  • Bachelor’s degree in Information Security, Computer Science, or a related field.
  • 2 – 4 years of experience in Information Security, with a focus on Identity Governance and Compliance.
  • Strong understanding of User Access Review (UAR) processes and tools.
  • Experience with Active Directory (AD) and identity lifecycle management.
  • Familiarity with regulatory and compliance frameworks: PCI DSS, ISO 27001, NIST, COBIT.
  • Excellent analytical, documentation, and communication skills.
  • Ability to work independently and collaboratively in a fast-paced environment.


Preferred Qualifications:

  • Relevant certifications such as CISSP, CISA, CISM, CRISC, or GIAC.
  • Experience with IAM tools (e.g., SailPoint, Saviynt, Okta, Azure AD).
  • Prior experience supporting internal or external audits.
  • Knowledge of GRC tools and platforms.
  • Understanding of legal and regulatory standards such as FERPA, CIS, and data protection laws.
  • Knowledge of Cloud Identity (AWS or Azure Identity).
This advertiser has chosen not to accept applicants from your region.
 

Nearby Locations

Other Jobs Near Me

Industry

  1. request_quote Accounting
  2. work Administrative
  3. eco Agriculture Forestry
  4. smart_toy AI & Emerging Technologies
  5. school Apprenticeships & Trainee
  6. apartment Architecture
  7. palette Arts & Entertainment
  8. directions_car Automotive
  9. flight_takeoff Aviation
  10. account_balance Banking & Finance
  11. local_florist Beauty & Wellness
  12. restaurant Catering
  13. volunteer_activism Charity & Voluntary
  14. science Chemical Engineering
  15. child_friendly Childcare
  16. foundation Civil Engineering
  17. clean_hands Cleaning & Sanitation
  18. diversity_3 Community & Social Care
  19. construction Construction
  20. brush Creative & Digital
  21. currency_bitcoin Crypto & Blockchain
  22. support_agent Customer Service & Helpdesk
  23. medical_services Dental
  24. medical_services Driving & Transport
  25. medical_services E Commerce & Social Media
  26. school Education & Teaching
  27. electrical_services Electrical Engineering
  28. bolt Energy
  29. local_mall Fmcg
  30. gavel Government & Non Profit
  31. emoji_events Graduate
  32. health_and_safety Healthcare
  33. beach_access Hospitality & Tourism
  34. groups Human Resources
  35. precision_manufacturing Industrial Engineering
  36. security Information Security
  37. handyman Installation & Maintenance
  38. policy Insurance
  39. code IT & Software
  40. gavel Legal
  41. sports_soccer Leisure & Sports
  42. inventory_2 Logistics & Warehousing
  43. supervisor_account Management
  44. supervisor_account Management Consultancy
  45. supervisor_account Manufacturing & Production
  46. campaign Marketing
  47. build Mechanical Engineering
  48. perm_media Media & PR
  49. local_hospital Medical
  50. local_hospital Military & Public Safety
  51. local_hospital Mining
  52. medical_services Nursing
  53. local_gas_station Oil & Gas
  54. biotech Pharmaceutical
  55. checklist_rtl Project Management
  56. shopping_bag Purchasing
  57. home_work Real Estate
  58. person_search Recruitment Consultancy
  59. store Retail
  60. point_of_sale Sales
  61. science Scientific Research & Development
  62. wifi Telecoms
  63. psychology Therapy
  64. pets Veterinary
View All Ethical Hacking Jobs