3,408 Ethical Hacking jobs in India
Senior security consultant - pentester
Job Viewed
Job Description
Job No Longer Available
This position is no longer listed on WhatJobs. The employer may be reviewing applications, filled the role, or has removed the listing.
However, we have similar jobs available for you below.
Ethical Hacking
Posted today
Job Viewed
Job Description
• Experience with web application vulnerability scanning tools (e.g., IBM AppScan, HP Web Inspect, Acunetix, NTO Spider, Burpsuite Pro, etc.)
• Experience with vulnerability assessment tools and penetration testing techniques (e.g., web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI, etc.)
• Experience of penetration testing on mobile platforms such as iOS, Android, Windows, and RIM.
• Solid programming/debugging skills with proficiency in one or more of the following: Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C.
• Expert-level experience and very details technical Knowledge in at least 3 of the following areas: general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; standard communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web services
• Demonstrated ability to learn and apply critical thinking to a variety of situations
• Mobile programming abilities such as Xcode, Objective-C
• One or more of the following certifications: CISSO, GWAPT, CEH, OSCP (or qualified work experience)
• Strong scripting skills (e.g., Python, Perl, Shell script, JavaScript
• Experience as a developer
• Knowledge of a Structured Query Language
Ethical Hacking Analyst
Posted today
Job Viewed
Job Description
• Experience with web application vulnerability scanning tools (e.g., IBM AppScan, HP Web Inspect, Acunetix, NTO Spider, Burpsuite Pro, etc.)
• Experience with vulnerability assessment tools and penetration testing techniques (e.g., web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI, etc.)
• Experience of penetration testing on mobile platforms such as iOS, Android, Windows, and RIM.
• Solid programming/debugging skills with proficiency in one or more of the following: Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C.
• Expert-level experience and very details technical Knowledge in at least 3 of the following areas: general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; standard communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web services
• Demonstrated ability to learn and apply critical thinking to a variety of situations
• Mobile programming abilities such as Xcode, Objective-C
• One or more of the following certifications: CISSO, GWAPT, CEH, OSCP (or qualified work experience)
• Strong scripting skills (e.g., Python, Perl, Shell script, JavaScript
• Experience as a developer
• Knowledge of a Structured Query Language
Ethical Hacking developer
Posted today
Job Viewed
Job Description
• Experience with web application vulnerability scanning tools (e.g., IBM AppScan, HP Web Inspect, Acunetix, NTO Spider, Burpsuite Pro, etc.)
• Experience with vulnerability assessment tools and penetration testing techniques (e.g., web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI, etc.)
• Experience of penetration testing on mobile platforms such as iOS, Android, Windows, and RIM.
• Solid programming/debugging skills with proficiency in one or more of the following: Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C.
• Expert-level experience and very details technical Knowledge in at least 3 of the following areas: general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; standard communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web services
• Demonstrated ability to learn and apply critical thinking to a variety of situations
• Mobile programming abilities such as Xcode, Objective-C
• One or more of the following certifications: CISSO, GWAPT, CEH, OSCP (or qualified work experience)
• Strong scripting skills (e.g., Python, Perl, Shell script, JavaScript
• Experience as a developer
• Knowledge of a Structured Query Language
Ethical Hacking Analyst
Posted today
Job Viewed
Job Description
• Experience with web application vulnerability scanning tools (e.g., IBM AppScan, HP Web Inspect, Acunetix, NTO Spider, Burpsuite Pro, etc.)
• Experience with vulnerability assessment tools and penetration testing techniques (e.g., web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI, etc.)
• Experience of penetration testing on mobile platforms such as iOS, Android, Windows, and RIM.
• Solid programming/debugging skills with proficiency in one or more of the following: Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C.
• Expert-level experience and very details technical Knowledge in at least 3 of the following areas: general information security; security engineering; application architecture; authentication and security protocols; application session management; applied cryptography; standard communication protocols; mobile frameworks, single sign-on technologies; exploit automation platforms; RESTful web services
• Demonstrated ability to learn and apply critical thinking to a variety of situations
• Mobile programming abilities such as Xcode, Objective-C
• One or more of the following certifications: CISSO, GWAPT, CEH, OSCP (or qualified work experience)
• Strong scripting skills (e.g., Python, Perl, Shell script, JavaScript
• Experience as a developer
• Knowledge of a Structured Query Language
Ethical Hacking- Trainer
Posted today
Job Viewed
Job Description
- Trainer**
**The Job Overview**
We are looking for a full time Certified Ethical Hacker - IT Trainer to conduct training courses on Cyber Security & Ethical Hacking, Forensics investigation.
IT Trainer responsibilities include identifying educational needs and conduct training as per audience need.
**Responsibilities**
- Conducting IT skills gap analyses among employees
- Designing technical manuals using simple language
- Performing role-specific training.
- Evaluate the effectiveness of each educational session
- Maintain updated records of training curriculum and materials
**Requirements and skills**
- Proven work experience as an IT Trainer, _Technical Trainer_ or similar role
- Experience designing technical course material
- Familiarity with web-based learning platforms and modern educational techniques
- Good understanding of corporate computer security principles
- Excellent communication skills with the ability to explain technical terms plainly
- Additional global certification in training (e.g. Certified Technical Trainer) is a plus
**Requirements Technical skills**
- Below are some of the responsibilities a certified professional ethical hacker is expected to assume:
- Ethical hacking and penetration testing
- Vulnerability assessment
- Malware analysis
- Work with other penetration testers and information security analysts
- Social engineering
- Database security
- Reverse engineering
- Network security
- Threat modelling and risk assessment
- Job Qualifications and Skill Sets
**Below are the qualifications expected of a certified ethical hacker trainer?**
- Bachelor’s degree in computer science, information technology security, or related field
- Security certifications, including the Certified Information Systems Security Professional (CISSP) and Certified Ethical Hacker (CEH)
- Demonstrable expertise in penetration tests, vulnerability assessment, and security monitoring
- Proficiency with the OSI model, TCP/IP, HTTP, SSL, and wireless networking
- Experience with common network infrastructure and security tools
- Knowledge of security testing methodologies in accordance with the EC-Council
- Ability to work in a fast-paced environment
**Job Type**:Full-time
**Salary**: Up to ₹18,000.00 per month
**Benefits**:
- Cell phone reimbursement
**Schedule**:
- Day shift
**Supplemental pay types**:
- Performance bonus
**Speak with the employer**
+91 +91-XXX
**Job Types**: Full-time, Part-time
**Salary**: ₹8,000.00 - ,000.00 per month
**Benefits**:
- Cell phone reimbursement
Schedule:
- Day shift
Ability to commute/relocate:
- Vashi, Navi Mumbai - , Maharashtra: Reliably commute or planning to relocate before starting work (required)
**Education**:
- Diploma (preferred)
**Experience**:
- Teaching: 1 year (preferred)
- total work: 1 year (preferred)
**Language**:
- English (preferred)
Ethical Hacking Trainer
Posted today
Job Viewed
Job Description
**Designation - Ethical hacking trainer**
**Experience - 2 to 7 Years**
**CTC - As per company norms.**
**Location - Pune**
**Position - 1**
**Joining Date : 1 Week/15 Days**
**Key Skills**:
( CCNA, CCNP and CCIE ,Ethical hacking )
**Required Experience, Skills and Qualifications**:
Will handle the CCNA/MCSA and Cloud batches for freshers and working professionals.
Will take the ownership of Networking lab and facilities.
Required Trainer for Computer Hardware & Networking ,
Should have knowledge of Networking servers
Should possess all Networking skills
MCSE / CCNA / CCNP / AWS/Azure
Having Teaching or Training exp
Must have knowledge on Windows server
Must Have a basic Knowledge of Hardware & Networking
Must Know Tcp /IP and other Networking skill
**Benefits**:
CCNA, Ethical hacking certified
Other certifications would be additional benefit.
**Contact on:
.**
**Regards,**
**HR Team**
**Job Types**: Part-time, Freelance
**Salary**: ₹25,000.00 - ₹40,000.00 per month
Schedule:
- Day shift
- Morning shift
Ability to commute/relocate:
- Pune, Maharashtra: Reliably commute or planning to relocate before starting work (required)
Faculty - Ethical Hacking / Cyber Security
Posted today
Job Viewed
Job Description
Primary Responsibilities:
- Fluent English.
- Pleasant personality should be approachable & friendly.
- Excellent verbal communications skills and concise written communication skills.
- Good organization and multitasking skills.
- Ability to work both independently and as part of a team.
- Sound Knowledge of Information Security & Ethical Hacking Concepts.
- Experience with one or more of the following tools / OS - make names of tools starting with caps - eg: Backtrack, Nessus.
- In-Depth knowledge about Networking Protocols.
- Basic knowledge about Web Applications, Exploits, Network Security and Malwares.
- Deliver Technical Training based on Latest Technologies.
- Prepare Presentations, Course Structure & Learning Kits, Work on R&D Projects.
- Provide practical demonstrations in training/Workshop modules along with theory topics.
- At least 1 year of combined IT and security work experience with a broad exposure to infrastructure/network and multi-platform environments. Key Skills
- Ability to relate to a wide range of people.
- Programming knowledge
- Ethical Hacking
- Web Application Security Testing
- OWASP Top 10
- IT Security Topics
- Penetration Testing
Work Experience (In Year) 1-3
Qualifications: BE B.Tech-Bachelor of Engineering or Technology MCA-Master in Computer Application B.Sc.CS-Bachelor of Science in Computer Science B.Sc.IT-Bachelor of Science in Information Technology
Pay: ₹11,337.64 - ₹20,040.71 per month
Schedule:
- Day shift
**Experience**:
- total work: 2 years (preferred)
Work Location: In person
Expected Start Date: 01/11/2024
Be The First To Know
About the latest Ethical hacking Jobs in India !
Java, C++, Ethical Hacking, Web Design
Posted today
Job Viewed
Job Description
seeking an IT Profession with JAVA, C++, WEB DESIGN & ETHICAL HACKING Proficiency
Qua: BE/ B.Tech with relevant experience
proficiency of other software's related to IT segment is an advantage.
**Salary**: ₹10,000.00 - ₹20,000.00 per month
Schedule:
- Day shift
Supplemental Pay:
- Overtime pay
- Performance bonus
- Shift allowance
Ability to commute/relocate:
- COLLEGE ROAD, PALAKKAD, Palghat, Kerala: Reliably commute or planning to relocate before starting work (required)
**Education**:
- Bachelor's (preferred)
**Experience**:
- total work: 1 year (preferred)
- Mechanical engineering: 1 year (preferred)
- Design: 1 year (preferred)
**Speak with the employer**
+91-XXX
Information Security Analyst - Penetration Testing
Posted 11 days ago
Job Viewed
Job Description
Information Security Analyst
Posted 9 days ago
Job Viewed
Job Description
About the company
Lexitas is a high growth company. The Company is built on a belief that having strong personal relationships with our clients, and providing reliable, accurate and professional services, is the driving force of our success.
Lexitas offers an array of services including local and national court reporting, medical record retrieval, process service, registered agent services and legal talent outsourcing. Our reach is truly national as well as international.
Lexitas is a MNC Company that has set up a subsidiary in Chennai, India – Lexitas India Pvt. Ltd. This Indian company will be the Lexitas Global Capability Center, helping build a world class IT development team, and over time serve as a Shared Services hub for several of the corporate functions.
For More Information -
This is a Full-Time Job located in Chennai, India.
Summary:
This position supports information security, privacy, risk and compliance programs and activities under the direction of the VP of Information Security or designated Information Security Manager. The position assists in developing and maintaining a comprehensive security program for Lexitas. Providing functional and technical support is important to maintain security posture and protection of electronically and physically stored information assets across our systems. Tasks include supporting design, implementation, configuration, documentation, and maintenance to mitigate risk to the business and its computing resources and assets, as well as collaborating with applicable providers, managing and monitoring tools, and facilitating applicable processes and procedures.
Key Roles and Responsibilities :
- Supports IT security, privacy, risk and compliance systems, processes, supporting activities, with the ability to lead activities and programs.
- Monitors computer networks and associated tools and provider services for security, privacy, risk and compliance issues
- Supports the project management, tracking, and documentation of Information, Privacy, Risk, and Compliance programs, processes, and activities
- Investigate security breaches and cybersecurity incidents.
- Documents security breaches and assesses impact.
- Performs and/or supports security tests, risk assessments, and audits to uncover network, application, and process vulnerabilities and provides guidance and training to ensure violations do not persist.
- Tracks and facilitates the mitigation of vulnerabilities to maintain a high security standard.
- Supports best practices for IT security, privacy and compliance.
- Performs and supports 3rd party vulnerability management and penetration testing.
- Research security enhancements and makes recommendations to management.
- Stays current on information technology trends and security standards.
- Prepares reports that detail security, privacy, and compliance risk assessment findings.
- Supports Security Operations Center functions including monitoring and supporting Incident Response activities.
- Supports all related IT Security, Privacy, Risk and Compliance policies and provides guidance to the business.
- Other Information Security, Privacy, Risk, and Compliance duties as required.
Skills and Abilities:
- Experience with computer network and application vulnerability management and penetration testing, and techniques.
- Solid understanding of firewalls, proxies, SIEM, antivirus, and IDPS concepts
- Ability to identify and mitigate network and application vulnerabilities.
- Good understanding of patch management
- Proficient with various OS
- Excellent written and verbal communication skills
- Knowledge of firewalls, antivirus, and intrusion detection system concepts
- Ability to support and document areas of Information Security, Privacy, Risk, and compliance processes and programs.
- Ability to support incident response process.
- Experience directing 3rd Party providers in the areas of Information Security, Privacy, Risk and Compliance
- Support information security controls including physical and data security protecting the confidentiality, integrity and availability of information systems data.
- Preferred KSA’s:
- Strong working knowledge and experience with primary Information Security, Privacy, Risk, and compliance standards and frameworks such as NIST, SOC 2, HIPAA, PCI DSS, GDPR, etc.
- Experience administering information security software and controls.
- Experience supporting process for managing network and application security.
- Network and system administration experience a plus.
- Good understanding of Standard Information Security Baseline Frameworks, Business Continuity, and Disaster Recovery protocols and best practices.
- Exposure to ITIL (Incident/Change Management) – ITIL v3F preferred.
- Learns and monitors the business processes for the areas of primary support responsibility.
- Support annual Security Baseline Audits and execution of recommendations.
- As part of the technology team, performs “Help Desk” day-to-day tasks in support of Information Security, Privacy, Risk, and Compliance.
Education and Experience:
- Bachelor’s degree in computer science or related field strongly preferred.
- IAT Level-2 technical certification strongly preferred (Comp TIA Security+ or CISSP) or ability to obtain within first 90 days of hire.
- 5+ years’ experience performing role of Information Security Analyst or SOC
- Demonstrated experience in responding to, managing, and resolving security incidents.
- Experience with LAN/WAN networking concepts, IP addressing and routing concepts, Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience with Windows/Linux/Unix operating systems, Information Security concepts, and best practices.
- Experience working with Security Information and Even Management (SIEM) system is a plus.