Information Security Analyst

  • icon job experience 0 - 2 Years
  • icon job opening 2 Openings
  • icon salary Not Disclosed
  • icon job location Mumbai

Job Description

We are looking for someone who can give training in the field of Ethical Hacking & IT security , Cyber Forensics & also work on IT Security projects / VAPT Vulnerability Assessment & Penetration Testing Projects ,

Required Skills:

1. Metasploit, OWASP top ten attacks, Burpsuite, Kali Linux , Acunetix, Nessus, Nmap tools, etc

2. Vulnerability Assessment.

3. Network Penetration Testing

4. Having hands on experience of Internal & External , Web App scanning & Penetration testing (Manual as well as tools Automated)

5. Good Understanding of Threat Intelligence , having knowledge of domain tools.

6. Good effective communication (English)

Experience : 0 - 2 Years

No. of Openings : 2

Education : Professional Degree, Any Bachelor Degree

Role : Information Security Analyst

Industry Type : Security Forces / Defence Forces / Investigation

Gender : [ Male / Female ]

Job Country : India

About Skynet Secure

Service providers of placement services.
Read More...

Register to Get Relevant Jobs

Get Noticed By Top Recruiters

Become a Premium Job Seeker

  • Higher Boosting
  • Resume Highlighter
  • Verified Stamp
  • Resume Exposure

499/- for 3 months

Pay Now

Similar Jobs

Urgent Hiring Network Engineer For Ghansoli

Change Networks

  • Experience 5 - 10 yrs
  • Salary 40.0 Lac/Yr
  • Location Ghansoli Navi Mumbai
CCIECcie SecurityIT Business AnalystComputer Network EngineerNetworking SkillsRouting SwitchingInformation Technology AnalystNetwork Security EngineerCCIE certification

Incident Management Analyst

Anzen Technology Pvt. Ltd

  • Experience 1 - 2 yrs
  • Salary 5.0 Lac/Yr
  • Location Vashi Navi Mumbai
NetworkingIT Service DeskService DeliveryCyber SecurityInformation Security

Information Security Analyst

Anzen Technology Pvt. Ltd

  • Experience 1 - 2 yrs
  • Location Vashi Navi Mumbai
Information SecurityVulnerability AssessmentPenetration TestingCyber SecurityVulnerability ManagementEthical Hacking
top