• Goa'19
  • Job Fair

Job Fair

InfoSec Job Opening from nullcon Sponsors & Exhibitors

We have put together a number of amazing job opportunities in the most renowned companies that also support nullcon Goa 2019! If you are looking for a new position or thinking about a career change, definitely have a look at the list below. Good luck!

1. Job Title: Security Event Analyst
Job Description:
The Security Event Analyst will be part of the monitoring and triage arm of Salesforce Security, responsible for analyzing events across a large and complex environment in order to identify security incidents and protect our customers. In a typical hour, an analyst might examine a malicious email, investigate an unusual login, and analyze a PC with a potential malware issue. Between these events, they will interact with Salesforce colleagues around the world, who contact Security Event Analysts with issues ranging from missing laptops to suspicious devices found in our offices.
Location: Hyderabad
Contact: [email protected]

2. Job Title: Lead Security Operations
Job Description:
The Technical lead shall manage Security Operations Center initiatives primarily responsible for security alert analysis and response. This role will also ensure incident identification, assessment, reporting and communication. The successful candidate will work as a bridge in integrating our existing incident response and security operations structures, and setting the standards that will make this an industry-leading team. You will leverage various internal platforms and use your in-depth understanding of threats, exploits and vulnerabilities in order to provide data security to all of our internal employees as well customers. You will have a track record and a proven ability to lead technical teams, and a strong understanding of incident response.
Location: Hyderabad
Contact: [email protected]

3. Job Title: System Security Engineer
Job Description:
Salesforce is looking for an addition to our expanding infrastructure security team. To join this team, you'll need to have a passion for security. As a key member of our team, the Systems Security engineer will work on the 'front lines' of the salesforce production environment, the largest SaaS platform on the planet, protecting our critical infrastructure and proactively defending our customers' data. PKI and Key Management work, such as having created CSR’s, adding certificates to web servers, understanding of Cryptography, knowledge of HSMs, TLS, etc. would be highly preferred.
Location: Hyderabad
Contact: [email protected]

4. Job Title: Analyst - Security and Compliance
Job Description:
In the role of Analyst - Security & Compliance (Customer Success), you will be responsible for working on various customer-facing activities ensuring customer understanding and accepting of our security controls and processes. Maintaining customer facing security and compliance documents and white papers and Creating security and compliance knowledge base across multiple Salesforce services for consumption by Sales and Customer Success teams are the key responsibilities. Knowledge of various security certifications (i.e. ISO 27K, PCI, etc.) is highly preferred.
Location: Hyderabad
Contact: [email protected]

1. Job Title: Security researcher
Job Description:
Are you a great vulnerability researcher? Are you passionate about discovering new vulnerabilities in Android, iOS browsers and more? Do you want to earn money for what you enjoy the most? If so, come work for us! We are looking for the best vulnerability researchers out there, specializing in browsers, Operating systems, mobile and more. For more information, contact us at [email protected]
Location: Remote
Contact: [email protected]

Apply Here: https://careers.microsoft.com

1. Job Title: Principal Software Engineering Manager
Job Description:
You will lead a team of engineers to plan, architect, design and implement large scale services and ship them in Azure and Exchange Cloud platforms. We are looking for someone who shares our passion for building great software for enterprises. You will work in a forward-looking product as part of an agile, collaborative, and cross-discipline team. In addition to strong technical skills, you should have a passion for innovation and software quality. As a people manager, you would hire, coach, motivate and influence your team to deliver success.
Location: Hyderabad
Contact: https://careers.microsoft.com/us/en/job/507601/Principal-Software-Engineering-Manager

2. Job Title: Senior Service Engineer
Job Description:
Day-to-day responsibilities include:
- Triage, investigate and advise about threats related to SSIRPs, CVEs and Security Advisories issued by Microsoft and 3rd Party Companies.
- Help on automation and troubleshooting of the TVM infrastructure
- Help onboarding of new TVM properties on Azure, AP and discreet environments
- Partner with engineering, program management and operations personnel within the WDG Online Services community to suggest and implement security improvements to processes and technologies
Location: Hyderabad
Contact: https://careers.microsoft.com/us/en/job/550015/Senior-Service-Engineer

3. Job Title: Service Engineer 2
Job Description:
1. Monitoring for security threats working within Microsoft SOC (security operations center)
2. Event analysis, attack identification, investigation and correlation, and implementation of mitigation measures
3. Investigation of potential attacks and potentially compromised systems
4. Leading or participating in the incident response process
5. Provide recommendations and implement changes to optimize our detection capabilities
6. Contribute technical and process improvements within the team
Location: Hyderabad
Contact: https://careers.microsoft.com/us/en/job/533498/Service-Engineer-2

4. Job Title: Software Engineer 2
Job Description:
- Work with Research peers to understand attacker techniques and the available telemetry to enable detection via heuristic rules.
- Implement detection rules in C# and validate their effectiveness using a data-driven approach.
- Maintain deployed detection rules as needed (reduce false positives).
- Work with Data Science peers to apply novel machine-learning or statistical detection strategies, taking proof-of-concept solutions to production via the Detection Platform or our Big Data cloud system.
- Work with Detection Platform feature team to improve capabilities where needed.
Location: Hyderabad
Contact: https://careers.microsoft.com/us/en/job/560759/Software-Engineer-2

1. Job Title: Full Stack Developer
Job Description:
The individual should process 4+ years of JAVA, JUNIT, Spring, MVC, JavaScript, Angular JS, Java Web Services, UI Skills, Json. Should have Experience using and creating RESTful APIs. Experience with Mongo and Redis is recommended Experience/knowledge with CI/CD Work with best of breed Cloud technologies (NoSQL, high throughput event processing, cloud-scale data analytics, etc.). Design small software components (Functionality, defect fixes or automation) that form part of a larger solution, in line with team objectives. Define Test scenarios and Test cases to ensure quality of the team’s deliverables.
Location: Bangalore
Contact: [email protected]

2. Job Title: Software Development in Test
Job Description:
As a member of the Sophos Central Platform development team, the SDETs works closely with software engineers, architects, product management and others to develop test strategies and do test planning, contribute to the design and implementation testing frameworks and test automation, develop tests and drive continuous improvement of quality KPIs for the Sophos Central platform. Thorough knowledge of Java, ability to implement test automation using Java and Java based product SDK. Linux or Unix systems experience. Security testing knowledge a must. Ability to analyze and implement complex test automation modules utilizing test automation frameworks in CD/CI environment. Experience developing, deploying and managing test workloads in AWS or Azure. Proficiency in a preferred scripting language.
Location: Bangalore
Contact: [email protected]

3. Job Title: Threat Researcher 1
Job Description:
Sophos Labs is a global network of highly skilled and trained analysts and IT security professionals that is the front line in protecting businesses from known and emerging threats. As a Threat Researcher you will be part of the front line responsible for helping to protect millions of users worldwide from computer security threats like malware, spam and phishing. The successful candidate will provide analysis and detection of the latest threats and help create the next generation of Sophos Labs research tools. The ideal candidate is passionate about computer security and has high aptitude for solving challenging puzzles with an attention to detail.
Location: Bangalore
Contact: [email protected]

4. Job Title: Software Engineer
Job Description:
• Design and write code and unit tests in line with requirements
• Fluent with functional and imperative languages
• Strong in C, Linux OS, Routing & Networking
• TCP/IP stack understanding
• Can write high quality code (in line with guidelines)
• Understands how software components interface with each other and fit with the asset technical strategy and business needs
Location: Ahmedabad and Bangalore
Contact: [email protected]

5. Job Title: Technical Support Engineer – Endpoint Security
Job Description:
As a Technical Support Engineer, you will have the opportunity to support our customers and learn cutting edge technologies in the dynamic software security space.
Location: Ahmedabad (Gujarat).
Contact: [email protected]

6. Job Title: Technical Support Engineer - NSG
Job Description:
As a Technical Support Engineer, you will have the opportunity to support our customers and learn cutting edge technologies in the dynamic software security space.
Location: Ahmedabad (Gujarat).
Contact: [email protected]

1. Job Title: App-sec and pen test specialist
Job Description:
• Experience in the areas of Infrastructure Security Audit, IT Security, Vulnerability Assessment, Risk Assessment, Web Application Security, Network Security Review, Network Architecture Review, Mobile Application Security Testing, Thick Client application security, Configuration Review, Wireless Pentest, etc.
• Knowledge on security standards and industry best practices including OWASP & NIST.
• Experience with web application vulnerability scanning tools (e.g., Tenable Nessus, IBM AppScan, HP Web inspect, Acunetix, NTO Spider, BurpSuite Pro, SQLMap, Kali Linux, Metasploit)
• Understands automation pipelines in DevSecOps and their associated toolsets used for Source Code creation, security testing. (e.g Docker, Jenkins, HP- Fortify)
Location: Mumbai
Contact: [email protected]

2. Job Title: Specialist – Cyber Forensics
Job Description:
1. Conduct examination of digital media (hard drives, laptops, network traffic, mobile phones, etc.).
2. Conduct forensics analysis leveraging forensics technologies, such as memory capturing, network forensic capturing, and capturing of data at rest, to collect evidence and presents results for determination of violation based on the details of the request.
3. Review log-based data, both in raw form and utilizing SIEM or aggregation tools.
4. Employ best practices and forensically sound principals such as evidence handling and chain of custody.
5. Perform live network assessments using leading packet capture and analysis software tools.
6. Establish timelines and patterns of activity based on multiple data sources.
7. Identify, document and prepare reports on relevant findings.
Location: Mumbai
Contact: [email protected]

1. Job Title: Infosec Consultant
Job Description:
• Vulnerability Assessment
• Penetration Testing (Internal & External)
• Servers Configuration Hardening
• Network Configuration Hardening
• Network Performance Analysis
• Log Analysis of Servers & Network Devices
• Network Security Architecture Review (optional)
• Gap Analysis as per ISO 27001 (optional)
• Risk Assessment (optional)
Location: Noida
Contact: Chetna Kapoor, [email protected]

2. Job Title: Manager-Application Security
Job Description:
• VAPT
• To meet the On time delivery (OTD) and First time right (FTR).
• Responsible for overseeing, track and monitoring, for smooth execution of application security projects during its entire life cycle. o Act as an interface between Project Delivery Team and application security team for the smooth execution and delivery of application security projects.
• Co-ordinate with Project Delivery Team and prepare audit plans as per scope of work along with deployment of resources (in case of onsite project).
• Work on RFPs / tender requirements / proposals along with Project Delivery Team for audit effort calculations (man-days) / project planning / resource deployments related work as and when required.
• Responsible for assigning projects to security auditors based on status of their availability in coordination with Assistant Manager (AM).
Location: Noida
Contact: Chetna Kapoor, [email protected]

1. Job Title: Security Analyst (4A/4B), Cyber Defense Analyst
Job Description:
• Perform initial triage of security event detected from data protection and other security monitoring controls.
• Based on the analysis of the security events identify detection rule improvements to reduce false positives and more accurately detect sensitive data/security incidents.
• Respond to and follow up to security incidents identified by DLP/SIEM system
• Ability to navigate and work effectively across a complex global organization
• Good communication and documentation skills
• Self-motivated individual with ability to leverage technical skills to corelate data to streamline analysis quickly and effectively
• Experience of working on Incident response tools and technologies.
Location: Noida/Hyderabad
Contact: Sahil Bansal, [email protected]

2. Job Title: Cyber Defense Center (CDC) – Threat Intelligence Analyst (IA)
Job Description:
• Identify, collect, and perform analysis of raw, primary and secondary data derived from various sources
• Investigate, document, and report on information cybersecurity issues and emerging trends
• Synthesizes and places intelligence information into context; draws insights about the possible implications
• Provide actionable strategic, technical, and tactical cyber information and intelligence through weekly, monthly, and ad hoc reports, briefings, and presentations
• Assist in providing threat and vulnerability analysis as well as security advisory services
• Reviews threats and provides analysis on how they relate to Genpact environment
• Produces internal intelligence reports to characterize threats based on observed Genpact cyber activity through incident analysis and campaign tracking
• Collaborate with partners to translate cyber intelligence into an instrumentation and detection strategy
Contact: Sahil Bansal, [email protected]

3. Job Title: IT Infrastructure Security
Job Description:
The candidate will be responsible for security assessments and configuration reviews of technology deployments including Active Directory Infrastructure, O365 services, ADFS, servers and endpoint security. Responsibilities will also include information security guidance, architecture, deployment, configuration reviews of other security technologies also such as secure web gateways, antivirus, email security, EDR etc. The candidate should have a good knowledge and experience on Active Directory (AD design, Trusts, GPOs, Account policies, Audit policies etc.), Securing DNS, remote access, NPS, OS hardening for servers and client machines, Security for O365 services, Intune Conditional Access, Bit locker and PKI/certificate services. Strong understanding of Information security concepts including authentication, authorization, SAML, VPNs, SSL, malwares (ransomwares, ad-wares, rootkits, backdoors, zero day attacks etc.) is required. Additionally, experience or knowledge on other security technologies including web proxy, client protection (Anti-virus, drive encryption, EDR etc.), Email protection (Antispam, SPF, DKIM, DMARC), cloud technologies and platforms such MS Azure, AAD etc. would be helpful.
Location: Gurgaon
Contact: Sahil Bansal, [email protected]

4. Job Title: IT Risk Management - Manager
Job Description:
• Identify IT Risk within the enterprise by conducting interviews, workshops, focus group sessions with various stakeholders.
• Conduct periodic Enterprise IT Risk Assessment.
• Maintain and update the Enterprise IT Risk Register and measure qualitative and quantitative risk.
• Aggregate risk information across all risk types.
• Periodically update all key stakeholders on the current status of all identified Enterprise IT risk.
• Act in consultative capacity, providing advice to teams on identified Enterprise IT Risks.
• Support all initiatives to strengthen IT Risk Management function with the enterprise.
• Socialize IT Risk Management initiatives with various internal teams.
• Escalate all complex or compliance issues to management.
Location: Hyderabad
Contact: Sahil Bansal, [email protected]

1. Job Title: Vulnerability Analyst
Job Description:
We're seeking for a highly skilled, brilliant, curious, trustable professional, with a proven track record in coding and exploit writing / analysis. Fluent English is a must, previous publications are an advantage.
Location: Dubai, UAE
Contact: [email protected]

1. Job Title: Channel Manager
Job Description:
Checkmarx is looking for a talented and experienced Channel Manager to join our successful sales team in India. The candidate will report directly to the Country Head (India) and will be based out of Mumbai (travel as necessary).
Location: Mumbai
Contact: https://www.comeet.co/jobs/checkmarx/C0.008/channel-manager---mumbai-india/CB.A04

2. Job Title: Sales Engineer
Job Description:
The Sales Engineer is critical to our success as we expand. This position will be primarily responsible for actively driving and managing the technology evaluation stage of the sales process, working in tandem with the sales team as a technical adviser and product advocate for our products. The ideal candidate must be able to articulate technology and product positioning to both business and technical users, as well as ensure customer satisfaction through the sales cycle. We are looking for a self-motivated individual who is comfortable working in a fast-paced environment.
Location: Delhi
Contact: https://www.comeet.co/jobs/checkmarx/C0.008/field-sales-engineer---delhi-india/5B.A07

3. Job Title: SDR/ISR Team Leader
Job Description:
Checkmarx is positioned as a Leader in Gartner Magic Quadrant for Application Security Testing (Leaders, Challengers, Visionaries, and Niche Players) and has over 1,500 customers in 80 countries in the world. We are seeking a talented and highly driven Inside Sales Representative Team leader to join the Checkmarx sales team.
Location: Mumbai
Contact: https://www.comeet.co/jobs/checkmarx/C0.008/sdrisr-team-leader--mumbai-india/19.B0D

4. Job Title: Professional Services Engineer
Job Description:
We are looking for talented Professional Services Engineers to support our Sales and Business Development activities. The Professional Services team is responsible for integrating Checkmarx system to client Dev environment, plan and create OOB and custom integration. Guide and train developers and strength internal tech knowledge in Checkmarx. The ideal candidate will be able to set up a new security process in the customer’s organization and ensure customer satisfaction.
Location: Mumbai
Contact: https://www.comeet.co/jobs/checkmarx/C0.008/professional-services-engineer---india/3A.C08

1. Job Title: Security Strategy Lead
Job Description:
The IRM Security Strategy Lead develops and maintains the strategy for the Shell Group for a specific set of domains in IRM, covering Business, technology, process and people skills aspects. The Lead identifies gaps and opportunities in relevant IRM capabilities, and drives improvements such that Shell moves towards a leading position among industry peers (across different sectors). The Lead is seen an industry authority and provides pro-active and authoritative advice to the IRM LT and the IT Executive on relevant topics. Develop the vision and strategy for a specific set of IRM domains, aligned with the overall IRM strategy and Business and IT strategies, as an effective response to relevant potential business impacts and relevant threats and vulnerabilities.
Location: Bangalore
Contact: [email protected]

2. Job Title: Risk & Control Advisor - PCI DSS
Job Description:
Risk and Control Advisor is the functional specialist for IT Information Risk Management (IRM) within the Retail Class of Business. Ability to balance IRM/PCI needs and standards considering risk and affordability to the Business as well as business impact. Proactively review Shell’s information security and related risks, threats and vulnerabilities, legal and regulatory and Payment Card Industry (PCI) compliance. Support the ‘Prevent’ and ‘Validate’ staff and IRM COB in education and awareness of IT security and PCI related issues and risks, and influence of behaviors of IT and Business staff as part of mitigating these risks. Maintain/update/improve Retail scope in Archer/Collective (including PCI relevant markets and controls)
Location: Bangalore
Contact: [email protected]

3. Job Title: Risk & Controls Manager
Job Description:
Candidate with Extensive (>10 years) experience with Information security and risk management. Review all new high-risk projects; new technical designs; for Information risks and advise on suitable controls and mitigations at early stages of the program. Lead the project security advisors for specific business and advice on the Information security for their projects. Offer advice to Shell and suppliers to assist in resolving questions and issues around how to manage risk. Provide Subject Matter Expertise for projects and business stakeholders, in combination with the Improvement Program. Work with the architecture community to review new technology and architecture innovations. Translate Technical, legal and Regulatory Compliance obligations into a cohesive collection of Security Controls and provides the respective stakeholders with the IRM requirements and its implementation methodologies.
Location: Bangalore
Contact: [email protected]

4. Job Title: Threat & Vulnerability Manager - Penetration Test
Job Description:
The lead penetration tester will play a key role in leading technically on penetration testing on applications, infrastructure and various technologies like Cloud, IoT, mobile, red teaming exercise and upcoming technologies. This role will also be responsible conduct simulated attacks on networks, firewalls, operating systems and web applications. Lead stake holder management, reporting of vulnerabilities in a timely fashion and mentoring other penetration testers. Being able to identify and prioritize vulnerabilities, report on the findings as well as reviewing them in an effective way to mitigate the identified vulnerabilities is also part of the role. Dealing with a range of internal and external stakeholders, it is important that anyone in this role is as comfortable with the technical aspects as the communication of it.
Location: Bangalore
Contact: [email protected]

5. Job Title: Senior Cyberdefence Engineer
Job Description:
The CyberDefence Engineering team is a pivotal function supporting Shell’s CyberDefence team and involved in every aspect of the development and deployment of Cyber Security tools and the development of use-cases in our SIEM tool, based on SPLUNK. Engineering develops the necessary correlation and reporting capabilities, automate incident detection to reduce false positives, while supporting all security technologies used by the CyberDefence Team, ranging from but not limited to: Forensics tools, SPLUNK, IPS solutions, Vulnerability Management and pen-testing tools, etc. The Experienced CyberDefence Engineer will ensure that the output and performance of the CyberDefence security products meet requirements, and able to fully integrate with and optimized in our data analytics capabilities and ensures new services developed outside of the CyberDefence team are seamlessly onboarded into the CyberDefence capabilities.
Location: Bangalore
Contact: [email protected]

1. Job Title: Security Services Associate Consultant
Job Description:
- Roles Include: Conduct Source Code Analysis, Software Penetration Testing, Architecture Security Analysis etc
- Bachelor’s Degree in Computer Science, Engineering or equivalent. Master’s Degree preferred
- 2 to 4 yrs. of work experience in relevant role
Location: Bangalore
Contact: [email protected]

2. Job Title: Security Services Consultant
Job Description:
- Bachelor’s Degree in Computer Science, Engineering or equivalent. Master’s Degree preferred
- Any relevant certifications such as CISSP, CEH etc. is a plus
- The ideal candidate should have worked 5-7 years in a relevant role
- Experience in Software penetration testing, Source Code Analysis, Working knowledge of one scripting language, Experience in reverse engineering is a plus, Familiarity with at least one software programming language and framework is a plus
Location: Bangalore
Contact: [email protected]

3. Job Title: Security Services Senior Consultant
Job Description:
- Bachelor’s Degree in Computer Science, Engineering or equivalent. Master’s Degree preferred
- Experience with C/C++, ASP.NET, Java, Java EE, multiple RDBMS
- Experience conducting secure code review,security architecture reviews, web application, mobile and thick client penetration testing, Familiarity with at least one software programming language
- Ability to interface with clients, utilizing consulting and negotiating skills
- Facilitation with the sales team and MC’s of new client opportunities, scoping, and writing proposals when asked; serving as technical experts in the field they are brought in to represent
Location: Bangalore
Contact: [email protected]

1. Job Title: Risk Advisory Consultant
Job Description:
As an Analyst in our Risk Advisory team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. You’ll:
- End to end understanding of regulatory guidelines for validation of IT systems, Lab systems and Manufacturing systems
- Knowledge of 21 CFR Part 11, EU Annexure 11, GAMP-5 and with good understanding of cGxP regulation
- Understanding of CSV & IT Compliance approach in regulated compliance environment.
- In depth understanding of the Software Development Life Cycle (SDLC), Software Testing Life Cycle (STLC) methodology for GxP system in accordance to CSV compliant model (Waterfall , Agile)
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

2. Job Title: Cyber Risk: Manager
Job Description:
As a Manager in our Risk Advisory team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. You’ll have:
- Opportunity to work on key digital technologies like IoT, RPA, Blockchain, Analytics, Cloud etc.
- To be aware of what are the key trends globally in the world of digital and what are organizations doing
- To understand the digital strategy of the client and basis that evaluate the various digital transformation initiatives which might be underway in the organization. In case, there is no digital strategy which exists, then assist the client in formulating a digital strategy.
- Ability to leverage an in-depth understanding of the client’s digital strategy to plan and drive the development of impactful and sustainable risk management solutions.
- Ability to advise client on establishing or improving end-to-end risk management systems, processes, and frameworks to enhance strategic alignment with business goals, enable effective decision making and response, and monitor regulatory compliance
- Ability to plan and execute a project to deliver a superior client experience
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

3. Job Title: Cyber Risk: Assistant Manager
Job Description:
As an Assistant Manager in our Risk Advisory team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. You’ll:
- Should be able to configure basic & Complex MM settings
- Able to assess configurations of MM independently
- The primary focus of this position is to manage end to end projects with hands on capabilities to drive in SAP MM Module.
- Map / defined MM org elements , Key data structure, Master data to meet user requirement
- Understanding & worked on the integration with various modules FI,CO, PP, SD, PS in relation to MM
- Must have 1-3 E2E implementation experience
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

4. Job Title: Cyber Risk: Deputy Manager
Job Description:
As a Deputy Manager in our Risk Advisory team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. You’ll have:
- Ability to communicate complex, enterprise class, technical solutions to both a technical and business audience in both group and individual settings
- Able to articulate the business and technical value of IBM’s ISIM and ISAM solutions to clients
- Ability to provide high level solution architecture and design capabilities during project initiation and delivery
- Provide hands on assistance with the detailed design and implementation of IBM ISIM and ISAM.
- Skilled with leading technical projects and required technical documentation
- Working technical experience in new implementation / upgrade / migration projects on small to large scale of the projects
- Willingness to work on perform on other areas of information security domains such as ISO 27001, Security and Privacy
- Hands on technical implementation experience in IBM Security Identity Management products IBM Security Directory Integrator (SDI), IBM Security Identity Manager (ISIM), IBM Security Directory Server (SDS), IBM Security Access Manager, WebSphere Application Server, Privilege Identity Management
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

5. Job Title: Cloud Security
Job Description:
• Have experience in cloud security strategy, readiness and discovery assessments.
• Having experience in cloud security frameworks, compliance requirements, network security threats and security operations.
• Should be able to adopt on new cloud security technologies in any cloud platforms – AWS, GCP and Azure.
• Ability to contribute on proposals efforts, SoW’s, pricing and contribute to business growth.
• Have understanding of the cloud principles and standards.
• Must be able to lead the design and build cloud security architecture for clients.
• Good understanding on risk assessments, data protection, identity management, application risks, infrastructure security, cloud governance and compliance.
• Ability to provide recommendations on the cloud security measures and processes to advice the best practices based on the leading industry insights
• Ability to provide security controls considerations during the cloud migration projects.
• Familiarity with security themes such as SSL, AD, IAM and security at all levels such as physical, data at rest, data in transit, networks, firewalls, public key infrastructure.
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

6. Job Title: Cyber Risk Services – IoT and Industrial IoT Security
Job Description:
The Cyber Risk Services – IoT Security services assist clients with performing security reviews of their IoT and Industrial IoT ecosystem from a design, development, implementation, and sustainment perspective. It is an enterprise-wide, long-term, end-to-end security management solution to protect their information and confidential data as well as help them build their businesses and supporting technologies more secure, vigilant and resilient. The Cyber Risk Services – IoT Security team delivers services to clients through following key areas:
• Perform analysis to identify vulnerabilities within an organization’s security framework for their IoT and Industrial IoT business assets;
• Evaluate an organization’s security posture and risk appetite – assess the impact and likelihood that inside/outside threats can exploit vulnerabilities on critical business assets User provisioning;
• Create and/or optimize processes to integrate vulnerability requirements with IT or security operations; and
• Align the optimized security management program back into the security framework – increase efficiency and reduce costs.
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

7. Job Opening: ICS/SCADA (OT) Security
Open Positions: Across Levels (Assistant Manager, Deputy Manager and Manager Levels).
Job Description:
Strong understanding and hands on experience of Computer security and application to industrial environment.
Ability to conduct Risk Assessment on large and medium programs in ICS Environment (and physically on-site) and ICS Pen Testing. Ability to report ICS Vulnerabilities and explain mitigation strategies.
Experience with ICS Strategy, Governance. Experience with ICS security standards, Guidelines such as ISA/IEC 62443, API, NERC CIP, NIST, NISTIR 7628 etc.
Experience with unidirectional gateway and configuration.
Well-rounded understanding of SCADA related software and Technologies and Knowledge of industrial protocols standards (e.g., Any one of:- DNP3, MODBUS, EtherNet/IP, OPC, BACnet, PROFINET). Same for Industrial devices e.g. PLC, DCS, HMI, RTU and network devices.
Comprehensive understanding of organization’s ICS systems, designs, and processes. Ability to provide input and expertise to secure systems, designs, and processes.
Ability to implement, support, and evaluate ICS/SCADA security-focused Products, tools and services
Knowledge and Experience of working with VA Tools, Exploits, Fuzzers, sniffers.
Ability to prepare, review policies, procedures governing the security operations and security considerations for ICS equipment and networks.
Ability to analyse information from security technologies such as firewall logs, IDS, endpoint security solutions, access control systems, and other related security technologies within ICS environment.
Ability to review abnormal network traffic and other ICS Specific events.
Ability to create technical design documentation, whitepapers and write technical reports for both technical and management consumption.
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

8. Job Title: Information Security Architect
Job Description:
• Design, build and implement enterprise-class security solutions for Client environments
• Align standards, frameworks and security with overall business and technology strategy
• Identify , develop POCs and communicate current and emerging security threats
• Design security architecture elements to mitigate threats as they emerge
• Create solutions that balance business requirements with information and cyber security requirements
• Identify security design gaps in existing and proposed architectures and recommend changes or enhancements
• Use current programming language and technologies to develop code, complete programming and perform testing and debugging of applications
• Security architecture, demonstrating solutions delivery, principles and emerging technologies. Designing and implementing security solutions. This includes continuous monitoring and making improvements to those solutions, working with an information security team.
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

9. Job Title: Risk Advisory - Cyber Risk: Deputy Manager
Job Description:
As a DM in our Risk Advisory team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. You’ll have:
• Keen to work in an SAP Advisory role (Not Implementation & Roll-Out)
• Executing various SAP Finance Advisory engagements including SAP Post Implementation Reviews, SAP Controls & Optimization Review, SAP Roadmap Assistance etc.
• Worked on FICO sub modules including GL, AP, AR, Cash & Bank, Asset Accounting, New GL, Cost Center Accounting, Cost Element Accounting, Profit Center Accounting, Internal Order Accounting
• Working Knowledge of Product Costing & Profitability is preferable
• Working Knowledge of S4HANA is preferable
• SAP FI-Treasury profile is Preferable
• General business awareness
• Good Excel, presentation and report writing skills
• Prepared documentation including Business Blueprints, Test Scripts, User Manuals, Standard Operating Procedures, Functional Requirement specification etc.
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

10. Job Title: Cyber Strategy and Governance—Lead Solution Advisor / Sr Solution Advisor—Cloud Architect
Job Description:
As a professional working for Cyber Strategy and Governance, you will build and nurture positive working relationships. The cloud security architect plays an integral role in defining and assessing the client organization's cloud security strategy, architecture and practices. This individual's primary function is to provide cloud security planning, deployment and review expertise to project teams and client organizations in the Cyber Risk space. Responsibilities include:
• Conducting cloud security analysis of prospective cloud platforms and environments based on Deloitte’s Cloud Cyber Risk Framework. This can include Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) cloud platforms such as AWS, Azure, Office 365 and Google Cloud Platform.
• Performing technical health checks for cloud platforms/environments prior to broader deployments.
• Assisting in the selection and tailoring of approaches, methods and tools to support cloud adoption, including for migration of existing workloads to a cloud vendor.
• Designing and developing cloud-specific security policies, standards and procedures. e.g., user account management (SSO, SAML), password/key management, tenant management, firewall management, virtual network access controls, VPN/SSL/IPSec, security incident and event management (SIEM), data protection (DLP, encryption).
• Executing on cloud security engagements across the lifecycle – assessment, strategy, design, implementation, and operations.
• Documenting all technical issues, analysis, client communication, and resolution.
• Supporting proof of concept and production deployments of cloud access security broker (CASB) and cloud workload protection platform (CWPP) technologies.
• Assisting clients with transitions to CASB and CWPP solutions via tenant setup, log processing setup, policy configuration, agent deployment, and reporting.
• Operating across both technical and management leadership capacities.
• Provide internal technical training to Advisory personnel as needed.
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

11. Job Title: Deputy Manager
Job Description:
• About 5-8 years of experience in Archer 5.0 and Above
• Hands-on-Experience on GRC Solution.
• Hands on Experience on Integration Multiple Data Feeds into Archer Platform.
• Ability to understand and comprehend the idea of Dashboards/Reports/iView/Workspaces and be able to differentiate between them
• Experience in Archer Audit, Risk Management, Governance, IT security and / or Compliance Functions, Notifications, Questionnaire Findings, Access Control Center
• Experience in Upgrading Archer Platform to Higher Version
• Understanding of information security concepts such as ISMS, Risk Assessments, Vendor Assessments, BCP, etc.
• Excellent Communication Skills, Ability to independently talk to clients and understand requirements
• Provide internal technical training to Advisory personnel as needed.
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

12. Job Title: Risk Advisory- Cyber Risk: Deputy Manager
Job Description:
As a Deputy Manager in our Risk Advisory team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. You’ll have:
• Ability to communicate complex, enterprise class, technical solutions to both a technical and business audience in both group and individual settings
• Able to articulate the business and technical value of IBM’s ISIM and ISAM solutions to clients
• Ability to provide high level solution architecture and design capabilities during project initiation and delivery
• Provide hands on assistance with the detailed design and implementation of IBM ISIM and ISAM.
• Skilled with leading technical projects and required technical documentation
• Working technical experience in new implementation / upgrade / migration projects on small to large scale of the projects
• Willingness to work on perform on other areas of information security domains such as ISO 27001, Security and Privacy
• Hands on technical implementation experience in IBM Security Identity Management products IBM Security Directory Integrator (SDI), IBM Security Identity Manager (ISIM), IBM Security Directory Server (SDS), IBM Security Access Manager, WebSphere Application Server, Privilege Identity Management
• Experience in Identity Management/Authorization and Authentication e.g. Secure Socket Layer (SSL), IP Security (IPSEC), Public Key Infrastructure (PKI) Kerberos, Lightweight Directory Access Protocol (LDAP)
• Basic LDAP knowledge - concepts, commands, Add/Modify/Delete entries from LDAP Apply fix packs, perform housekeeping activities on LDAP, Monitor and troubleshoot replication issues
• Deep knowledge of ISIM product - Perform configuration for LCRs, reconciliation, role management, ACI, services, provisioning policies
• Good working knowledge of IBM Security Identity Integrator
• Experience in Performance Management, software engineering, system administration, systems engineering, network engineering Experience in networking, security, DNS, Unix/Linux operations and troubleshooting
• Experience in Technologies: ISIM Application Program Interface (API)
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

13. Job Title: Risk Advisory - Cyber Risk: Manager
Job Description:
As a Consultant in our Risk Advisory team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. You’ll:
• Must have hands on experience in implementing or leading projects involved in implementing
• WAN / Communication systems / Windows, Unix & Mainframe Technology / Software Development life cycle.
• Must have hands on experience or led projects to comply with regulatory requirements /
• International standards like (SOX, PCI, ISO 27001, ISO 22301, DPA) and good practices (COSO, COBIT) relating to information security.
• Must have Excellent English skills, excellent presentation skills, excellent soft-skills (influencing & negotiation).
• Team management skillset is mandatory.
• Experience in Identity and Access Management, Governance, Risk and Compliance (GRC) tool implementation, Data Leakage Prevention and other Information Security tools would be an added advantage.
• In-depth experience in vulnerability management, penetration testing and secure code review.
• Assist client in identifying and evaluating business and technology risks, internal controls
• which mitigate risks, and related opportunities for internal control improvement
• Assist in the selection and tailoring of approaches, methods and tools to support service
• offering or industry projects
• Facilitate use of technology-based tools or methodologies to review, design and/or implement products and services
• Understand clients' business environment and basic risk management approaches Project Management :
• Decision making with engagement management and seek to understand the broader
• impact of current decisions.
• Lead engagement planning, economics, and billing.
• Generate innovative ideas and challenge the status quo.
• Participate in proposal development efforts.
• Lead pre-sales activities.
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

15. Job Title: Risk Advisory - Cyber Risk: Consultant
Job Description:
As a Consultant in our Risk Advisory team, you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. You’ll have:
• Implement Blue Prism process solutions in accordance with standard Blue Prism design principles and conventions
• Work with Business Analyst, SME for process identification and feasibility
• Perform Proof of Concepts to help the business recognize the feasibility of an automated solution
• Identifying and communicating the technical implementation requirements
• Configuring new Blue Prism processes and objects and also maintaining the old repository of codes developed by other developers
• Supporting the Project Manager in creating the transparency of the ongoing activities
• Creating and maintaining solution and other relevant documentations e.g. PDD, ODI, SDD and etc
• Supporting existing processes and implement change requirements as part of a structured change control process
• Solving issues that arise in day to day running of Blue Prism processes and providing timely responses and solutions as required
• Creating and documenting test procedures and scenarios for the pre-UAT phases
• Supporting the Operational Teams during the UAT and rollout
• Participate in structured peer reviews and walkthroughs
• Administration of the Blue Prism live environment (running processes, maintaining resource PCs, viewing logs etc.)
• Case Management, managing and allocating process workloads
• Managing and investigating exceptions (Business and System Exceptions)
• Communicating with Blue Prism on software related issues, suggesting improvements and participating with other users in the Blue Prism community.
• Required to attend meetings relating to process development and problems identified with solution
• Have knowledge of ongoing technologies and where applicable advise the company to take advantage of it
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]

16. Job Title: Risk Advisory - Cyber Risk: Assistant Manager
Job Description:
As an Assistant Manager in our Risk Advisory team you’ll build and nurture positive working relationships with teams and clients with the intention to exceed client expectations. You’ll:
• Should be able to configure basic & Complex MM settings
• Able to assess configurations of MM independently
• The primary focus of this position is to manage end to end projects with hands on capabilities to drive in SAP MM Module.
• Map / defined MM org elements, Key data structure, Master data to meet user requirement
• Understanding & worked on the integration with various modules FI,CO, PP, SD, PS in relation to MM
• Must have 1-3 E2E implementation experience
• Great to have working experience on warehouse management (not mandatory) Write logic (Functional Specifications) for ABAP programming / High Level Solution Design/Detail Design Solution documents
• Preferably worked on ECC 6.0 or higher version preferably with EHP 7-8 or S4HANA Tools(LSMW, BDC etc) for data migration
• Should be aware of all statutory requirements for taxes (GST, Service tax, TDS, etc)
• General business awareness
• Good Excel, presentation and report writing skills
• Prepared documentation including Business Blueprints, Test Scripts, User Manuals, Standard Operating Procedures, Functional Requirement specification etc.
Location: Across Locations
Contact: Utkarsh Tanwar - [email protected]deloitte.com

1. Job Title: Security assessment engineer
Job Description:
Reverse engineering, hardware hacking, and black-box style testing against embedded systems.
Investigate possible logical attack scenarios by interpreting code review findings, and analyzing test results.
Create innovative attacks tools/automations for project specific needs.
Communicate complex vulnerability results to technical and non-technical audience.
Perform research and contribute on new attack methodology, vulnerability findings.
Proficiency in programming languages (e.g. C, C++, Java, Python) or any other high level language.
Location: Bangalore
Contact: Debojyoti Bhattacharya, [email protected]

2. Job Title: Project Manager - Security testing
Job Overview:
As a project manager, this position will be responsible to drive security testing (penetration testing and fuzz testing) services. Most of these projects are short term and highly complex in nature. As a project manager, the person should be able to engage with the customer and the team to deliver results ensuring timely completion and quality.
Job Description:
In depth knowledge about penetration testing in any domain (web/mobile/embedded)
Creation of project proposals from customer requirements with cost and schedule estimate.
Manage stakeholder, risks, planning, schedule, monitoring of the tasks.
Quantitative project management (by monitoring KPIs)
Handling of multiple projects (typically 3-4) at the same time.
Effective status reporting to all stakeholders.
Good analytical, communication and presentation skills.
Location: Bangalore
Contact: Debojyoti Bhattacharya, [email protected]

1. Job Title: Sr. Cybersecurity Incident Response Analyst
Job Description:
Cargill is seeking an exceptional Sr Cybersecurity Incident Response Analyst to join a world-class Incident Response team as part of Cargill Command Center. In this hands-on senior role, you lead the response to security threats facing the company and help further develop the incident response program to protect Cargill globally.
You will also partner with our Cyber Intelligence team to proactively identify threat actors, gauge our security posture and help strengthen our defenses. We are looking for someone who is curious, resilient, and enthusiastic. Someone who is passionate about ‘defensive’ and ‘offensive’ security and can ‘think like an attacker’, while acting at the highest level of integrity and professionalism.
Location: Bangalore
Contact: [email protected]

2. Job Title: Security Operations Center (SOC) Analyst
Job Description:
Cargill is seeking an exceptional Security Operations Center (SOC) Analyst to join a world-class Security Operations team as part of Cargill Command Center.
This position will be solving and handling challenging / interesting Information Security Incidents.
This role provides an opportunity to work around multiple Information Security tools and also have a sneak peek at some basic malware analysis. Part of the global Security operations center providing 24*7 support. Investigate security event activity that has been flagged, if suspicious activity is confirmed or if unable to determine the activity. Discuss with level 2 Analyst for confirmation of the findings.
Monitor SIEM and other SOC tools by following operational process and procedures to appropriately analyze, escalate, and assist in remediation of security incidents.
Location: Bangalore
Contact: [email protected]

3. Job Title: DevOps Engineer
Job Description:
Cargill is seeking an exceptional DevOps Engineer for our growing security organization. This is a key position to strengthen the security automation capabilities which have been identified as a critical area for growth and specialization within Global IT’s scope. As part of the Cyber Intelligence Operation’s DevOps Team, you will be helping shape our automation efforts by building, maintaining and supporting our security infrastructure. This position requires a passion for building security solutions and capabilities that enable customers to protect their organization's people and assets. This position will collaborate with our security leadership, security engineers, Security Operations Center, Cyber Security Incident Response Team, and Cyber Intelligence Operations teams to help them use the capabilities of our Security Automation and Orchestration platform consisting of Phantom, Jira and integration to several tools.
Location: Bangalore
Contact: [email protected]

4. Job Title: Security Architect
Job Description:
The Security Architect is a key member of the Technology Governance Risk and Controls (TGRC) Security Architecture team which is responsible globally for both security architecture and Cargill’s Cloud Security Program.
This position will leverage their security, architecture, and dev/ops experience to manage risk for both cloud and on premises environments using innovative solutions that you create. The ability to develop reusable security architectures, create working prototypes, and partner with application teams to reduce risk will demonstrate success. Create risk mitigation through the development of detective, responsive, and preventative security controls that implement security architecture. Use big data technologies such as machine learning and visualization technologies to communicate compliance and alert risk. Use threat modeling and pen testing techniques to inform security architecture and security controls. This position will operate in an agile team environment so close collaboration with the team is valued.
Location: Bangalore
Contact: [email protected]

5. Job Title: Dev/Sec/Ops Engineer
Job Description:
The Dev / Sec / Ops Engineer is a key member of the Technology Governance Risk and Controls (TGRC) Security Architecture team which is responsible globally for both security architecture and Cargill’s Cloud Security Program.
This position will leverage their security and dev/sec/ops experience to manage risk for both cloud and on premises environments using innovative solutions that you create. The ability to develop working prototypes through to production software implementing detective, responsive, and preventative security controls that implement security reference architecture insures a large impact the security of Cargill. Use big data technologies such as machine learning and visualization technologies to communicate compliance and alert risk. Use threat modeling and pen testing techniques to inform security architecture and security controls. This position will operate in an agile team environment so close collaboration with the team is valued.
Location: Bangalore
Contact: [email protected]

6. Job Title: Identity and Access Management
Job Description:
This position will be part of a growing Identity and Access Management (IAM) team that manages a number of enterprise wide tools, covering the areas of Directory Support (on premises and cloud), Identity Governance, Single Sign On, Automated Provision. As part of the IAM team, you will work on providing operational support to ensure high availability and customer support, and assisting in expanding the applications integrated into the IAG platform, as well as develop and improve process efficiency. Utilizing the IAG platform and related technologies, this position will help the IAM team build strategies, work with the business to improve IAM support, processes and expand the presence of the IAM program within the enterprise.
Location: Bangalore
Contact: [email protected]

6. Job Title: Senior Technical Analyst – IT Resiliency
Job Description:
As part of the Global IT Business Resiliency team, the Sr Technical Analyst – IT Resiliency is responsible for aiding the architecture, implementation and testing of the disaster recovery (DR) solutions across the enterprise. This global role partners with cross functional teams to lead them in ensuring their DR solutions meet business requirements and remain in a ready state of preparedness. A fundamental success factor for this position is to have a solid technical background/understanding of the technology stack (network, backup, infrastructure, applications, databases, middleware, etc) to ensure an end to end perspective is upheld in our DR plans and testing. Another success factor is the ability to coordinate a team consisting of indirect IT teammates, outsourced staff, and outsourced services, to ensure business goals and business requirements are met for Disaster Recovery.
Location: Bangalore
Contact: [email protected]

7. Job Title: Cyber Command Center Hub lead
Job Description:
Cargill is seeking an exceptional Cyber Command Center Hub lead - Bangalore for our growing Command Center team. This is a key position to strengthen the Cybersecurity capability which has been identified as a critical area for growth and specialization within Global IT’s scope.
This position requires a passionate cybersecurity manager with demonstrated experience and success leading a team of incident responders (CSIRT, level 3 analysts) as well as a 365x24x7 Security Operations Center (SOC, level 1 and 2 analysts) in our Bangalore state-of-the-art hub facility under the strategic direction of our global Cyber Threat Detection and Response Manager in the US. This role will also be the Command Center hub lead for the Bangalore location.
You must have expert insights into cyber trends, threat actors, and incident response techniques. You have hands on experience in IR, security operations, and in managing large teams / developing people.
You will drive the IR process for critical incidents, collaborate with a wide variety of stakeholders to put in place mitigations and remediations. You will also collaborate with our security engineering team to ensure the continuous tuning of our defense apparatus. You will drive process excellence and maturity and push the envelope on incident response automation and orchestration. Join us in this journey!
Location: Bangalore
Contact: [email protected]

1. Job Title: Security Automation Engineer
Job Description:
Sprinklr is looking for a passionate and hands-on engineer to join the team for automation and tooling work. This is an exciting opportunity for an individual who is passionate about security work and is interested in applied cryptography, security protocols, application security, network security and building security solutions at scale. The candidate will leverage and contribute to open source projects when appropriate.
Roles and Responsibilities:
• 2+ years of experience in software design, development, and algorithm related solutions.
• 2+ years programming experience in an object-oriented programming language such as Python, Java, etc.
• Experience in system and application security, authentication and security protocols, cryptography, or network security.
• Driving efficiency in security investigations through creative tooling.
• Identify and leverage opportunities to improve engineering productivity.
• Strong sense of accountability.
• Eager to learn, adopt and apply rapidly changing new technologies and methodologies.
Skills:
• Full-stack experience from web development all the way through backend systems and relevance.
• Knowledge of large-scale distributed systems and client-server architectures.
• Demonstrated experience collaborating with Open Source projects and/or publishing security research.
• Experience with service-oriented architectures, private and public clouds and web services security.
• Knowledge of LDAP, DNS, SSH, Telnet, HTTP, HTTPS, SSL is highly desirable.
• Exposure to Unix, Linux, FreeBSD systems is a must.
Location: Bangalore
Contact: Jayesh Chauhan ([email protected])

2. Job Title: Security Engineer
Job Description:
Sprinklr is looking for dedicated individuals to handle various aspects of security practice and related automation. As we’ve grown so has the security requirements and responsibilities. The team is looking for candidates who can own the work and drive it to completion. If you find a security weakness, you report it, you provide the mitigation technique and drive the fix until it’s resolved. If there is a new feature being implemented, you take up the threat modeling and proactively help in secure development. If a security flaw is reported, you are dissecting it and taking a call on whether it impacts the environment or not.
Roles and Responsibilities:
• Work with Developers to improve security and implement fix at scale.
• You will be the ambassador of security for the internal teams and will be responsible for awareness and trainings across organization.
• Automate and monitor all steps required to provide scalable Security Testing Service.
• Consolidate data from different security testing tools and, provide analysis and reporting capabilities to security team and development teams
• Stay updated with emerging security threats and proactively implement mitigations in Sprinklr’s environment.
• Work with developers to resolve security issues.
• Regular penetration testing of all the end points including APIs, web application and mobile apps.
• Source code review using commercial tools.
• Work with software development teams to proactively assess risk, fix security issues and provide policy guidance.
• Safeguarding cloud infrastructure (AWS/Azure).
Skills:
• 3-5 years of working experience in penetration testing of web application and APIs, or mobile apps.
• Advanced understanding of L2 LAN/WAN networking (CIDR, subnetting, routing).
• Versed with concepts of Security in Cloud(AWS or Azure).
• Mobile security exposure to both iOS and Android.
• Strong information security risk-based prioritization abilities.
• Experience in development (e.g. Java, JavaScript, Node.js, Python), scripting and container technology (e.g. Docker).
• Familiarity with common attack patterns, exploitation techniques and remediation techniques.
• Technical knowledge in at least one security domain such as application security, systems and network security, authentication or security protocols.
• Provide high quality consulting support for SAST/DAST and vulnerabilities found
• Quick Learner, passionate, motivated and self-managed.
• Experience with various security tools and products (Fortify, Checkmarx, WebInspect, Burp Suite, ZAP, Arachni, etc.).
• Versed with backup and disaster recovery methodologies.
Location: Bangalore
Contact: Jayesh Chauhan ([email protected])

Do you like analyzing complex security issues?

Riscure is a young, ambitious organization specializing in embedded security testing for leading international clients from the semiconductor, Automotive, payment, Pay TV, mobile and smart metering industry. In addition, Riscure is the leading vendor of specialist security testing products. We have 90 employees with mixed technical and academic backgrounds working from offices in Delft, The Netherlands, Shanghai, China and San Francisco, USA. Riscure is organized in three units: Security Lab, Tools and Training Academy.

We are looking for experienced Security Analysts who like to use a variety of techniques (for instance penetration testing and software reverse engineering) to discover a product’s fraud risk profile in order to improve its security. Current career opportunities can be found here: https://www.riscure.com/careers/

Do you think you have got what it takes to work at Riscure as a security analyst? Please send your motivation letter and CV to [email protected].
[Acquisition by agencies is not appreciated.]

Copyright © 2018-19 | Nullcon India | International Security Conference | All Rights Reserved