Array ( [0] => certified-ethical-hacker [1] => maharashtra ) Certified Ethical Hacker Jobs in Maharashtra,Certified Ethical Hacker Job Vacancies in Maharashtra
5

Certified Ethical Hacker Job Vacancies in Maharashtra

filter
  • Location
  • Role
  • Functional Area
  • Qualification
  • Experience
  • Employer Type

B.C.A Freshers For Instructor

Edxploit Technologies

  • 0 - 6 yrs
  • Solapur
CEH. Ethical Hacker Cyber Security Networking
We are hiring a talented and enthusiastic Cybersecurity Content Creator / Trainer who can help us create high-quality educational content for students. The candidate will be responsible for preparing study material, designing course modules, creating social media content, and explaining cybersecurity concepts in simple language. Key ResponsibilitiesCreate easy-to-understand cybersecurity content (notes, slides, scripts).Design course modules, lessons, and structured learning roadmaps.Make content for Instagram, YouTube, and short-form platforms.Research latest cybersecurity trends, tools, and techniques.Explain complex topics in a beginner-friendly way.Work with our team to improve course quality and student learning experience. What Were Looking ForBasic knowledge of Cybersecurity, Networking, Linux, or Ethical Hacking.Good communication and writing skills (Hindi/English).Ability to research and simplify technical topics.Creative mindset for content ideas. Bonus Skills (Not compulsory)Video script writingPresentation makingFamiliarity with tools like Burp Suite, Nmap, Wireshark (basic level)
View all details
  • 0 - 6 yrs
  • 100.0 Lac/Yr
  • Mumbai
Ethical Hacking
I need hacker with crypto knowledge
View all details

Ethical Hacker

CLAVIGEROUS SYSTEMS LLP

  • 0 - 2 yrs
  • 1.0 Lac/Yr
  • Nashik
Certified Ethical Hacker Oscp Ccna Ethical Hacker
Ability to demonstrate manual web application testing experience Experience with web application vulnerability scanning tools (e.g., IBM AppScan, HP Web Inspect, Acunetix, NTO Spider, Burpsuite Pro, etc.)Experience with Network vulnerability scanning tools (e.g., Nessusqualys,Nexpose, etc.) Experience with vulnerability assessment tools and penetration testing techniques (e.g., web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI, etc.) Experience of penetration testing on mobile platforms such as iOS, Android, Windows, and RIM. Solid programming / debugging skills with proficiency in one or more of the following : Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C. Expert-level experience and very details technical Knowledge in at least 3 of the following areas : general information security security engineering application architecture authentication and security protocols application session management applied cryptography standard communication protocols mobile frameworks, single sign-on technologies exploit automation platforms RESTful web services Demonstrated ability to learn and apply critical thinking to a variety of situations Mobile programming abilities such as Xcode, Objective-C One or more of the following certifications : CISSO, GWAPT, CEH, OSCP (or qualified work experience) Strong scripting skills (e.g., Python, Perl, Shell script, JavaScript Experience as a developer Knowledge of a Structured Query Language
View all details

IOS Ethical Hacker

MSL-Infotech

  • 0 - 5 yrs
  • 10.0 Lac/Yr
  • Mumbai
Ethical Hacking Exploit Development Software Testing IT Security Work From Home
Job descriptionWe are looking for cyber security developers & ethical hackers. who can exploit and identify software bugs for our international clients. willing to work on new project development platforms (system, mobiles...)Exploit Project Development:Mobile PlatformsAndroidIOS (high preference)2 System PlatformsWindowsMacLinuxJob Description:Developers have experience to create zero day exploits in any platforms.Knowledge in web, mobiles, system and network protocols.industrial certifications CEH, OSCP, CISCO or equivalent experience and Knowledge project development filed.Research security enhancements and make recommendations to management.Qualifications:Bachelor Degree or equivalent experience in security field.0-4 years relevant ExperienceNo. of Positions:10Salary Packages:6,00,000 - 10,00,000 (INR) yearsApplication Dead Line:12/5/2023
View all details

Get Personalized Job Matches

Based on your experience, skills, interests, and career goals to help you find the most relevant opportunities faster. Register Now!
  • 2 - 6 yrs
  • 7.0 Lac/Yr
  • Mumbai
Bash Vulnerability Assessment Cyber Security Ethical Hacker Work From Home
In this role, as part of the global Data Protection & Response Team, you will: Responsible for all operational aspects of the GE Healthcare Insider Threat platform. Lead design and deployment of solution, manage data ingestion, implementing new functionality to meet business requirements. Work collaboratively with stakeholders (and the Insider Threat Leader) to support data ingestion, data modelling, playbook/policy design and production deployment for operational teams. Responsible for enabling and maintenance of all data sources and feeds to support the operational requirements of platform and downstream needs. Perform Hybrid work assisting Insider Analytics and associated functions around Data Loss Prevention. Provide technology support, maintenance of application functionality and integrations. Triage production issues, identify root cause and corrective actions. Dive into crisis situations and Production issues, trouble-shoot, engage stakeholders and own problem resolution. Manage service parameters around operational incidents and SLAs in partnership with platform service provider/vendors. Responsible for policy and content development on the platform to support Insider Threat team needs. Implement innovative ways of identifying threats to data using the platform and ensure aligned to industry best practices. Collect, monitor and analyze data produced by the tools to discover and discern trends, threats, and security risks associated with improper use of GE data. Ensure compliance with all regional legal requirements globally. Support tenant, tools, end-point and data migration efforts aligned with business spin-off. Manage stakeholder communication, balance of program/business priorities and communicate progress towards business objectives. Track outcomes and stakeholders satisfaction levels through established metrics against service level. Ensure lessons learned are collected and implemented.
View all details