1,207 Mobile Security jobs in India
Mobile Security Technician
Posted today
Job Viewed
Job Description
What you will be expected to do:
You might be a strong candidate if you have/are:
What Sun King offers:
About Sun King
Sun King is the world’s leading off-grid solar energy company, combining cutting-edge product design, fintech, and field operations to deliver energy access for the 1.8 billion people who live without an affordable and reliable electric-grid connection. Sun King has connected more than 20 million homes to solar power across Africa and Asia, adding over 200,000 homes each month. Sun King makes solar products affordable to low-income households and businesses via ‘pay-as-you-go’ purchase financing. Sun King installs solar after customers pay a small deposit. Customers then make small, manageable payments of as little as US $0.11 a day via mobile money or cash. Instead of paying for expensive, polluting, and health-damaging kerosene for lighting or diesel for power, customers unlock savings through accessing solar power and after one to two years of payments, customers own their solar equipment outright. To date, our Sun King solar products have saved customers more than $4 billion cumulatively.Sun King collects payments digitally through mobile money systems and its 28,000 field agents — over 650,000 payments each day. Embedded electronics inside each Sun King device regulate usage based on payments, similar to the operation of a pre-paid mobile or electricity meter. From cost-effective solar systems that provide home lighting and phone charging to robust solar inverters that can power high-energy appliances such as laptops, computers, refrigerators, and more, effectively acting as a full stand-in for grid power, Sun King’s products cater to a wide range of income segments and energy needs. Leveraging its proven distribution network and brand, Sun King is expanding its range of products and services to encompass clean cooking, electric mobility, entertainment, and more, aiming to address the needs of our underserved customers.
Sun King employs 2,800 full-time staff in 12 countries, with specialties spanning product design, data science, logistics, customer service, sales, software, operations, and more — all with a passion to serve off-grid families.Sun King is committed to gender diversity in the workplace. Women represent 44% of Sun King’s workforce.
Mobile Security Engineer (Penetration Tester) - GSHD - BLR
Posted today
Job Viewed
Job Description
Hiring Mobile Tester (Penetration Tester) for a product company in the mobile-first risk intelligence platform (Fraud Detection Software) domain.
Experience Range: 2 - 5 yrs
Location: Koramangala, Bengaluru
Work from office
Responsibilities:
- Conduct penetration tests on various applications
- Create and execute test plans, test cases, and test scenarios to identify defects and ensure application quality
- Collaborate with the development team to analyze and prioritize defects, and provide feedback for improvements
- Utilize Jira for project management, tracking, and reporting of testing progress and defects
- Continuously research and stay up-to-date with the latest mobile testing tools, techniques, and industry best practices
- Collaborate with cross-functional teams, including developers, product managers, and UX designers, to ensure alignment on project goals and requirements
- Perform regression testing to ensure that new features or updates do not negatively impact existing functionality
- Monitor and analyze application performance metrics to identify areas for optimization
- Provide training and support to team members on mobile testing best practices and tools
- Contribute to the continuous improvement of the mobile testing process and methodologies
Requirements:
- Bachelor's degree in Computer Science, Engineering, or a related field
- Minimum of 2 years of experience in mobile testing, with a focus on Android and iOS platforms
- Experience with security testing tools (MobSF, Burp Suite, OWASP ZAP, etc.)
- Knowledge of common mobile security vulnerabilities (OWASP Mobile Top 10)
- Familiarity with network protocols and security concepts
- Ability to write and execute Frida scripts in JavaScript
- Experience using Frida's APIs for code injection, hooking, and data extraction
- Understanding of Frida's capabilities for runtime instrumentation and analysis
- Proficiency in using tools like jadx, apktool, or similar for decompiling Android applications
- Ability to analyze decompiled code to identify security vulnerabilities and understand application logic
- Excellent communication and collaboration skills, with the ability to work effectively with cross-functional teams
- Strong attention to detail and a commitment to delivering high-quality mobile applications
Mobile Cyber-Security Developer
Posted today
Job Viewed
Job Description
• Experience with microprocessors and embedded operating systems
• Strong knowledge of software and data security schemes
• Experience in the development of mobile platform embedded software using C/C++
• Experience with IDAPro or similar tools
• Experience analyzing software binaries
Pentester /Mobile Application Security
Posted today
Job Viewed
Job Description
Greetings from Netsach - A Cyber Security Company.
We are looking for Mobile Application Security with 3 yrs of relevant experience and mandatory skills set are Web and Mobile Application Security, Security Code review, API security, Platform security, IAST, SAST, DAST.
Job Title: Mobile Application Security/ Pentester
Exp: 3+ - 5yrs
Job Location: Bangalore
Job Type: Full-time
Interested candidates please share your resume at and netsachglobal.com
Job Description
1. Job Overview
The primary purpose is to Design, Engineer & eventually Embed practical & balanced cyber / information security principles/patterns/controls into all products and platforms. Conduct security assessments, gap analysis, provide remediation to the relevant squads / stakeholders.
2. Job Purpose
Primary/General Job Purpose:
- Encourage Shift Left Mindset - Proactively embed security requirements, by influencing implementation of security & privacy patterns from the start of the development cycle
- Implement via Influence - Influence stakeholders such as Product Owners, Solution Architects, Developers, Testers, Engineers & others to include security patterns into features, epics and stories in order to build secure, innovative & superior digital products for customers and employees
- Assessments Perform security assessment and perform gap analysis to provide appropriate remediations to the teams for implementing the fixes.
Key Skills Web and Mobile Application Security, Security Code review, API security, Platform security, IAST, SAST, DAST,
- Tools and Technologies Expertise Burp Suite, MobSF, Frida, Kali Linux, Nessus, Checkmarx SAST, Kubernetes, Docker, Jenkins, GitHub, OpenShift and good knowledge about microservice architecture and pipeline driven security.
Experience with following Components:
3. Technical Requirements
Application Security Assessment Skillset
- Mobile App testing (Android & iOS)
- Web Application Security
- Security Code Review
- Container Review
- Infrastructure Review
- WAF rules review
Soft Skills:
- Ability to collaborate with multiple stakeholders and manage their expectations from a security perspective
- Holistic thinking; must balance security and functionality using practical demonstrable examples. Must also contribute to and implement good architecture principles to lower technical debt
- Assertive personality; should be able to hold her/his own in a project board or work group setting
- Superlative written and verbal communication skills; should be able to explain technical observations in an easy-to-understand manner
- Ability to work under pressure and meet tough/challenging deadlines
- Influencer- must be able to convince various stakeholders (internal IT Teams, C-Level execs, Risk & Audit) of why a certain observation is a concern or not
- Strong understanding of Risk Management Framework and security controls implementation from an implementer standpoint
- Has strong decision making, planning and time management skills.
- Can work independently.
- Has a positive and constructive attitude.
4. Person Specifications (required to carry out the job, not what the current or recommended incumbent possesses)
Specifications
Description of Knowledge / Skill etc.
Desirable or Essential
- Education
- General
- Professional
Bachelors degree in a computer-related field such as computer science, cyber/information security discipline, physics, mathematics or similar
- General Information Security : CISSP, OSCP, CEH, CISM/CISA or similar
Essential
Desirable
- General Cloud Security : CCSK /CCSP or similar
- Specific Cloud Security : AWS/Azure/GCP/Oracle Solution/Security or similar
- Network Security : CCNA, CCNP, CCIE, Certified Kubernetes Security Specialist
Must have minimum 4 years of experience in an information
Essential
B.Experiences
security function with good background in information
(Years & Type)
technology, stakeholder management and people
- Industry
management
- Regional
- Functional
Minimum 3 years of experience, as a Security Engineer
Essential
especially in Cloud Native environments
Deep foundational knowledge of Mobile Applications, Intensive skills on SSL pinning bypass, root / jailbreak bypass, core Mobile application exploitation Skillset
Essential
Expert at the technology and frameworks in his/her area of expertise, and coach other architect on development standards and best practices.
Desirable
Good understanding of Microservice based architecture (Technical)
Desirable
Good hands-on experience solutioning technology architectures that involve perimeter protection, core protection and end-point protection/detection & API /Micro services Security
Desirable
Experience working in a DevOps environment with knowledge of Continuous Integration, Containers, DAST/SAST tools and building Evil Stories (Technical)
Essential
- Knowledge & Skills
- Technical
- Functional
- Managerial
The Analyst / Engineer has the skill to follow design principles and applies design patterns to enforce maintainable and reusable patterns, in the form of code or otherwise
The Analyst / Engineer can understand and interpret potential issues found in source or compiled code
Desirable Desirable
The Analyst / Engineer has automation skills/capability in the form of scripting or similar
Desirable
The Analyst / Engineer can attack application and infrastructure assets, interpret threats, and suggest mitigating measures
Desirable
Ability to interpret Security Requirements mandated by oversight functions and ensure comprehensive coverage of those requirements, via documentation, within high level design and/or during agile ceremonies, via Evil Stories
Desirable
The Analyst / Engineer can propose options for solutions to the security requirements / patterns that provide a balance of security, user experience & performance
Desirable
The Analyst / Engineer has the skill to discuss and present solutions to other architecture, security, development, and leadership teams.
Desirable
The Analyst / Engineer can interpret and understand
Desirable
Thank You
Emily Jha
Netsach - A Cyber Security Company
+91
Pentester /Mobile Application Security
Posted 7 days ago
Job Viewed
Job Description
Greetings from Netsach - A Cyber Security Company.
We are looking for Mobile Application Security with 3 yrs of relevant experience and mandatory skills set are Web and Mobile Application Security, Security Code review, API security, Platform security, IAST, SAST, DAST.
Job Title: Mobile Application Security/ Pentester
Exp: 3+ - 5yrs
Job Location: Bangalore
Job Type: Full-time
Interested candidates please share your resume at and netsachglobal.com
Job Description
1. Job Overview
The primary purpose is to Design, Engineer & eventually Embed practical & balanced cyber / information security principles/patterns/controls into all products and platforms. Conduct security assessments, gap analysis, provide remediation to the relevant squads / stakeholders.
2. Job Purpose
Primary/General Job Purpose:
- Encourage Shift Left Mindset - Proactively embed security requirements, by influencing implementation of security & privacy patterns from the start of the development cycle
- Implement via Influence - Influence stakeholders such as Product Owners, Solution Architects, Developers, Testers, Engineers & others to include security patterns into features, epics and stories in order to build secure, innovative & superior digital products for customers and employees
- Assessments Perform security assessment and perform gap analysis to provide appropriate remediations to the teams for implementing the fixes.
Key Skills Web and Mobile Application Security, Security Code review, API security, Platform security, IAST, SAST, DAST,
- Tools and Technologies Expertise Burp Suite, MobSF, Frida, Kali Linux, Nessus, Checkmarx SAST, Kubernetes, Docker, Jenkins, GitHub, OpenShift and good knowledge about microservice architecture and pipeline driven security.
Experience with following Components:
3. Technical Requirements
Application Security Assessment Skillset
- Mobile App testing (Android & iOS)
- Web Application Security
- Security Code Review
- Container Review
- Infrastructure Review
- WAF rules review
Soft Skills:
- Ability to collaborate with multiple stakeholders and manage their expectations from a security perspective
- Holistic thinking; must balance security and functionality using practical demonstrable examples. Must also contribute to and implement good architecture principles to lower technical debt
- Assertive personality; should be able to hold her/his own in a project board or work group setting
- Superlative written and verbal communication skills; should be able to explain technical observations in an easy-to-understand manner
- Ability to work under pressure and meet tough/challenging deadlines
- Influencer- must be able to convince various stakeholders (internal IT Teams, C-Level execs, Risk & Audit) of why a certain observation is a concern or not
- Strong understanding of Risk Management Framework and security controls implementation from an implementer standpoint
- Has strong decision making, planning and time management skills.
- Can work independently.
- Has a positive and constructive attitude.
4. Person Specifications (required to carry out the job, not what the current or recommended incumbent possesses)
Specifications
Description of Knowledge / Skill etc.
Desirable or Essential
- Education
- General
- Professional
Bachelors degree in a computer-related field such as computer science, cyber/information security discipline, physics, mathematics or similar
- General Information Security : CISSP, OSCP, CEH, CISM/CISA or similar
Essential
Desirable
- General Cloud Security : CCSK /CCSP or similar
- Specific Cloud Security : AWS/Azure/GCP/Oracle Solution/Security or similar
- Network Security : CCNA, CCNP, CCIE, Certified Kubernetes Security Specialist
Must have minimum 4 years of experience in an information
Essential
B.Experiences
security function with good background in information
(Years & Type)
technology, stakeholder management and people
- Industry
management
- Regional
- Functional
Minimum 3 years of experience, as a Security Engineer
Essential
especially in Cloud Native environments
Deep foundational knowledge of Mobile Applications, Intensive skills on SSL pinning bypass, root / jailbreak bypass, core Mobile application exploitation Skillset
Essential
Expert at the technology and frameworks in his/her area of expertise, and coach other architect on development standards and best practices.
Desirable
Good understanding of Microservice based architecture (Technical)
Desirable
Good hands-on experience solutioning technology architectures that involve perimeter protection, core protection and end-point protection/detection & API /Micro services Security
Desirable
Experience working in a DevOps environment with knowledge of Continuous Integration, Containers, DAST/SAST tools and building Evil Stories (Technical)
Essential
- Knowledge & Skills
- Technical
- Functional
- Managerial
The Analyst / Engineer has the skill to follow design principles and applies design patterns to enforce maintainable and reusable patterns, in the form of code or otherwise
The Analyst / Engineer can understand and interpret potential issues found in source or compiled code
Desirable Desirable
The Analyst / Engineer has automation skills/capability in the form of scripting or similar
Desirable
The Analyst / Engineer can attack application and infrastructure assets, interpret threats, and suggest mitigating measures
Desirable
Ability to interpret Security Requirements mandated by oversight functions and ensure comprehensive coverage of those requirements, via documentation, within high level design and/or during agile ceremonies, via Evil Stories
Desirable
The Analyst / Engineer can propose options for solutions to the security requirements / patterns that provide a balance of security, user experience & performance
Desirable
The Analyst / Engineer has the skill to discuss and present solutions to other architecture, security, development, and leadership teams.
Desirable
The Analyst / Engineer can interpret and understand
Desirable
Thank You
Emily Jha
Netsach - A Cyber Security Company
+91
Sr Mobile Cyber-Security Developer
Posted today
Job Viewed
Job Description
• Experience with microprocessors and embedded operating systems
• Strong knowledge of software and data security schemes
• Experience in the development of mobile platform embedded software using C/C++
• Experience with IDAPro or similar tools
• Experience analyzing software binaries
Mobile Cyber-Security associate eng...
Posted today
Job Viewed
Job Description
• Experience with microprocessors and embedded operating systems
• Strong knowledge of software and data security schemes
• Experience in the development of mobile platform embedded software using C/C++
• Experience with IDAPro or similar tools
• Experience analyzing software binaries
Be The First To Know
About the latest Mobile security Jobs in India !
Data Protection Officer
Posted 4 days ago
Job Viewed
Job Description
About the job
Who We Are
We help to create icons. We help to build marvels. Our products feature in some of the most iconic buildings in the world. RAK Ceramics is one of the largest ceramics brands globally, specializing in ceramic and gres porcelain wall and floor tiles, sanitaryware, faucets, and tableware. Headquartered in the United Arab Emirates, we serve clients in over 150 countries through operational hubs in Europe, the Middle East and North Africa, Asia, North & South America, and Australia . With over 12,000 employees from 40+ nationalities , we are a truly global and diverse organization. RAK Ceramics is publicly listed on the Abu Dhabi Securities Exchange (ADX) and the Dhaka Stock Exchange .
The Role
The Data Protection Officer (DPO) ensures RAK Ceramic’s compliance with global data privacy regulations, across various countries, e.g., European GDPR, UAE Data Protection Law, USA data protection rules, Saudi Arabia’s PDPL, India’s Digital Personal Data Protection (DPDP) Act, Bangladesh data protection rules etc. This role is a central management role for addressing data protection risks and building trust with regional stakeholders. Reporting to the Head of Information security, the DPO will advise teams, oversee global data privacy programs, handle regulatory communication, and lead compliance audits and staff training. With at least 5 years of experience in this field, the ideal candidate will have a strong understanding of international data laws and the ability to drive a culture of privacy across the organization.
What You Will Be Doing
- Act as the organization’s subject matter expert on data protection and privacy laws across relevant jurisdictions.
- Prepare, draft and implement data processing agreements, policies and frameworks
- Ensure full compliance with international and local data protection regulations.
- Design and implement data protection policies, frameworks, and controls.
- Serve as a liaison with supervisory authorities and stakeholders.
- Advocate a company-wide culture of data privacy and accountability
- Develop, review, and update the organization’s data protection policies and practices in line with evolving laws.
- Monitor and assess compliance with data protection legislation in each country where RAK Ceramics operates, e.c., the EU (GDPR), USA, UAE, KSA, Bangladesh, India etc.
- Conduct regular internal audits and data protection impact assessments (DPIAs).
- Collaborate with IT, Legal, HR, and other business units to embed privacy by design into processes and systems.
- Respond to and manage data subject access requests (DSARs), breaches, and complaints in coordination with legal and technical teams.
- Develop and lead training sessions on data protection awareness for staff across regions.
- Maintain and update Records Of data Processing Activities (ROPA) as required by applicable laws.
- Act as the primary contact point for data protection authorities and external stakeholders.
What We Are Looking For
Some of the key competencies required for the role include:
Functional
Data and Risk Management
- Experience of having dealt with regulatory authorities on “data privacy matters”
- Data classification and handling procedures
- Data retention and disposal schedules
- Personal data inventory and data flow mapping
- Data Protection Impact Assessments (DPIAs)
- Third-party/vendor data processing and contract compliance
- Preparation of Organizational Policies and Practices
- Data Governance and Risk Management
- Data classification and handling procedures
- Data retention and disposal schedules
- Personal data inventory and data flow mapping
- Data Protection Impact Assessments (DPIAs)
- Third-party/vendor data processing and contract compliance
- Organizational Policies and Practices
Information Security & Privacy Policy
- Acceptable Use and Access Control Guidelines
- Data Breach Response Plan and Notification Protocol
- Incident Handling and Reporting Procedures
- Record of Processing Activities (ROPA) documentation
- Employee Awareness and Operational Conduct
Employee data handling and confidentiality guidelines
- Consent collection and processing protocols
- Bring Your Own Device (BYOD) and remote work data usage
- Guidelines for customer service and marketing departments on lawful data use
- Privacy by Design and Default principles integration
Monitoring, Audit, and Reporting
- Internal audit checklists for data protection compliance
- Metrics and KPIs for privacy program effectiveness
- Reporting templates for regulatory authorities
- Guidelines for responding to Data Subject Access Requests (DSARs)
Behavioural
- Stakeholder management and Leadership Influence
- Problem-Solving & Critical Thinking
- Proactive & Strategic Thinking
- Communication & Collaboration
- Attention to Detail
- Decision-Making Under Pressure
- Adaptability & Continuous Learning
- Ethical Responsibility
Our Ideal Match
- A Bachelor’s degree in related field and Master’s Degree is Ideal.
- 10 to 14 years of experience including minimum 5 to 8 years in Data Protection role.
- Data Protection Laws of various countries like UAE, KSA, EU (GDPR), USA, IN (DPDP) etc.
- ISMS (ISO 27001/NIST)
RAK Ceramics is an Equal Opportunity Employer.
We do not discriminate on the basis of race, colour, religion, gender, nationality, disability, age, or marital status.
Data Protection Officer
Posted today
Job Viewed
Job Description
Who We Are
We help to create icons. We help to build marvels. Our products feature in some of the most iconic buildings in the world. RAK Ceramics is one of the largest ceramics brands globally, specializing in ceramic and gres porcelain wall and floor tiles, sanitaryware, faucets, and tableware. Headquartered in the United Arab Emirates, we serve clients in over 150 countries through operational hubs in Europe, the Middle East and North Africa, Asia, North & South America, and Australia . With over 12,000 employees from 40+ nationalities , we are a truly global and diverse organization. RAK Ceramics is publicly listed on the Abu Dhabi Securities Exchange (ADX) and the Dhaka Stock Exchange .
The Role
The Data Protection Officer (DPO) ensures RAK Ceramic’s compliance with global data privacy regulations, across various countries, e.g., European GDPR, UAE Data Protection Law, USA data protection rules, Saudi Arabia’s PDPL, India’s Digital Personal Data Protection (DPDP) Act, Bangladesh data protection rules etc. This role is a central management role for addressing data protection risks and building trust with regional stakeholders. Reporting to the Head of Information security, the DPO will advise teams, oversee global data privacy programs, handle regulatory communication, and lead compliance audits and staff training. With at least 5 years of experience in this field, the ideal candidate will have a strong understanding of international data laws and the ability to drive a culture of privacy across the organization.
What You Will Be Doing
Act as the organization’s subject matter expert on data protection and privacy laws across relevant jurisdictions.
Prepare, draft and implement data processing agreements, policies and frameworks
Ensure full compliance with international and local data protection regulations.
Design and implement data protection policies, frameworks, and controls.
Serve as a liaison with supervisory authorities and stakeholders.
Advocate a company-wide culture of data privacy and accountability
Develop, review, and update the organization’s data protection policies and practices in line with evolving laws.
Monitor and assess compliance with data protection legislation in each country where RAK Ceramics operates, e.c., the EU (GDPR), USA, UAE, KSA, Bangladesh, India etc.
Conduct regular internal audits and data protection impact assessments (DPIAs).
Collaborate with IT, Legal, HR, and other business units to embed privacy by design into processes and systems.
Respond to and manage data subject access requests (DSARs), breaches, and complaints in coordination with legal and technical teams.
Develop and lead training sessions on data protection awareness for staff across regions.
Maintain and update Records Of data Processing Activities (ROPA) as required by applicable laws.
Act as the primary contact point for data protection authorities and external stakeholders.
What We Are Looking For
Some of the key competencies required for the role include:
Functional
Data and Risk Management
Experience of having dealt with regulatory authorities on “data privacy matters”
Data classification and handling procedures
Data retention and disposal schedules
Personal data inventory and data flow mapping
Data Protection Impact Assessments (DPIAs)
Third-party/vendor data processing and contract compliance
Preparation of Organizational Policies and Practices
Data Governance and Risk Management
Data classification and handling procedures
Data retention and disposal schedules
Personal data inventory and data flow mapping
Data Protection Impact Assessments (DPIAs)
Third-party/vendor data processing and contract compliance
Organizational Policies and Practices
Information Security & Privacy Policy
Acceptable Use and Access Control Guidelines
Data Breach Response Plan and Notification Protocol
Incident Handling and Reporting Procedures
Record of Processing Activities (ROPA) documentation
Employee Awareness and Operational Conduct
Employee data handling and confidentiality guidelines
Consent collection and processing protocols
Bring Your Own Device (BYOD) and remote work data usage
Guidelines for customer service and marketing departments on lawful data use
Privacy by Design and Default principles integration
Monitoring, Audit, and Reporting
Internal audit checklists for data protection compliance
Metrics and KPIs for privacy program effectiveness
Reporting templates for regulatory authorities
Guidelines for responding to Data Subject Access Requests (DSARs)
Behavioural
Stakeholder management and Leadership Influence
Problem-Solving & Critical Thinking
Proactive & Strategic Thinking
Communication & Collaboration
Attention to Detail
Decision-Making Under Pressure
Adaptability & Continuous Learning
Ethical Responsibility
Our Ideal Match
A Bachelor’s degree in related field and Master’s Degree is Ideal.
10 to 14 years of experience including minimum 5 to 8 years in Data Protection role.
Data Protection Laws of various countries like UAE, KSA, EU (GDPR), USA, IN (DPDP) etc.
ISMS (ISO 27001/NIST)
RAK Ceramics is an Equal Opportunity Employer.
We do not discriminate on the basis of race, colour, religion, gender, nationality, disability, age, or marital status.