12

Certified Ethical Hacker Jobs

filter
  • Location
  • Role
  • Functional Area
  • Qualification
  • Experience
  • Employer Type

B.C.A Freshers For Instructor

Edxploit Technologies

  • 0 - 6 yrs
  • Solapur
CEH. Ethical Hacker Cyber Security Networking
We are hiring a talented and enthusiastic Cybersecurity Content Creator / Trainer who can help us create high-quality educational content for students. The candidate will be responsible for preparing study material, designing course modules, creating social media content, and explaining cybersecurity concepts in simple language. Key ResponsibilitiesCreate easy-to-understand cybersecurity content (notes, slides, scripts).Design course modules, lessons, and structured learning roadmaps.Make content for Instagram, YouTube, and short-form platforms.Research latest cybersecurity trends, tools, and techniques.Explain complex topics in a beginner-friendly way.Work with our team to improve course quality and student learning experience. What Were Looking ForBasic knowledge of Cybersecurity, Networking, Linux, or Ethical Hacking.Good communication and writing skills (Hindi/English).Ability to research and simplify technical topics.Creative mindset for content ideas. Bonus Skills (Not compulsory)Video script writingPresentation makingFamiliarity with tools like Burp Suite, Nmap, Wireshark (basic level)
View all details
  • 0 - 6 yrs
  • 100.0 Lac/Yr
  • Mumbai
Ethical Hacking
I need hacker with crypto knowledge
View all details
  • 0 - 4 yrs
  • 2.3 Lac/Yr
  • British Indian Ocean Territory
R&D Engineer Computer Hardware Engineer
IMPORTANT: NATIONALITY MUST BE FROM INDIAWe are looking for a ethical hacker Objectives: perform penetration tests to find and correct vulnerabilities in the systems of and enterprise before before a malicious attacker can exploit them.They can provide information of how prevent these attacks and make aware the employes how to identify them and prevent cybernetic attacks.What requirements do we need:Knowledge of netsoperating systemsprogramming and computing security Ability on penetration tests knowledge of cryptography and understanding of common attack techniques.Have tools such as vulnerability scanners, network enumeration tools, penetration testing frameworks, traffic analysis tools and other specialized tools for vulnerability exploitation and security testing.Necessary languages:PythonPHPJavaScriptSQLJavacand more.Network PentestCloudInternalExternalEnglis C1
View all details

Certified Ethical Hacker

Seraphim CSR and IT solutions

  • 5 - 8 yrs
  • Bangalore
Firewalls Cross-site Scripting Ethical Hacker Cyber Security Work From Home
Certified Ethical Hacker Responsibilities:* Meeting with clients to discuss the security system currently in place.* Researching the company's system, network structure, and possible penetration sites.* Conducting multiple penetration tests on the system.* Identifying and recording security flaws and breaches.* Identifying areas of high-level security.* Reviewing and rating the security network.* Creating suggestions for security upgrades.* Compiling penetration test reports for the client.* Conducting penetration tests once new security features have been implemented.* Suggesting alternate upgrades.Certified Ethical Hacker Requirements:* Bachelors degree in information technology or computer science.* CEH Certification.* Proven work experience as a certified ethical hacker.* Advanced knowledge of networking systems and security software.* In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.* Technical knowledge of routers, firewalls, and server systems.* Good written and verbal communication skills.* Good troubleshooting skills.* Ability to see big-picture system flaws.
View all details

Get Personalized Job Matches

Based on your experience, skills, interests, and career goals to help you find the most relevant opportunities faster. Register Now!

Certified Ethical Hacker

RayIot Solutions Pvt Ltd

  • 5 - 8 yrs
  • Bangalore
Information Security Ethical Hacking Cyber Security Work From Home
Certified Ethical Hacker Responsibilities:* Meeting with clients to discuss the security system currently in place.* Researching the company's system, network structure, and possible penetration sites.* Conducting multiple penetration tests on the system.* Identifying and recording security flaws and breaches.* Identifying areas of high-level security.* Reviewing and rating the security network.* Creating suggestions for security upgrades.* Compiling penetration test reports for the client.* Conducting penetration tests once new security features have been implemented.* Suggesting alternate upgrades.Certified Ethical Hacker Requirements:* Bachelors degree in information technology or computer science.* CEH Certification.* Proven work experience as a certified ethical hacker.* Advanced knowledge of networking systems and security software.* In-depth knowledge of parameter manipulation, session hijacking, and cross-site scripting.* Technical knowledge of routers, firewalls, and server systems.* Good written and verbal communication skills.* Good troubleshooting skills.* Ability to see big-picture system flaws.
View all details

Associate - Ethical Hacker

Philomath Research

  • 1 - 2 yrs
  • 3.3 Lac/Yr
  • Delhi
Ethical Hacking Cyber Security Administrator
Planning, implementing, managing, monitoring, and upgrading security measures for the protection of the organization's data, systems, and networks.Troubleshooting security and network problems. Responding to all system and/or network security breaches. Ensuring that the organization's data and infrastructure are protected by enabling the appropriate security controls. Participating in the change management process. Testing and identifying network and system vulnerabilities.
View all details

Ethical Hacker

CLAVIGEROUS SYSTEMS LLP

  • 0 - 2 yrs
  • 1.0 Lac/Yr
  • Nashik
Certified Ethical Hacker Oscp Ccna Ethical Hacker
Ability to demonstrate manual web application testing experience Experience with web application vulnerability scanning tools (e.g., IBM AppScan, HP Web Inspect, Acunetix, NTO Spider, Burpsuite Pro, etc.)Experience with Network vulnerability scanning tools (e.g., Nessusqualys,Nexpose, etc.) Experience with vulnerability assessment tools and penetration testing techniques (e.g., web application proxies, packet capture analysis software, browser extensions, advanced penetration testing Linux distributions, static source code analyzers, SoapUI, etc.) Experience of penetration testing on mobile platforms such as iOS, Android, Windows, and RIM. Solid programming / debugging skills with proficiency in one or more of the following : Java, JavaScript, HTML, XML, PHP, ASP.NET, AJAX, JSON, Objective-C. Expert-level experience and very details technical Knowledge in at least 3 of the following areas : general information security security engineering application architecture authentication and security protocols application session management applied cryptography standard communication protocols mobile frameworks, single sign-on technologies exploit automation platforms RESTful web services Demonstrated ability to learn and apply critical thinking to a variety of situations Mobile programming abilities such as Xcode, Objective-C One or more of the following certifications : CISSO, GWAPT, CEH, OSCP (or qualified work experience) Strong scripting skills (e.g., Python, Perl, Shell script, JavaScript Experience as a developer Knowledge of a Structured Query Language
View all details

IOS Ethical Hacker

MSL-Infotech

  • 0 - 5 yrs
  • 10.0 Lac/Yr
  • Mumbai
Ethical Hacking Exploit Development Software Testing IT Security Work From Home
Job descriptionWe are looking for cyber security developers & ethical hackers. who can exploit and identify software bugs for our international clients. willing to work on new project development platforms (system, mobiles...)Exploit Project Development:Mobile PlatformsAndroidIOS (high preference)2 System PlatformsWindowsMacLinuxJob Description:Developers have experience to create zero day exploits in any platforms.Knowledge in web, mobiles, system and network protocols.industrial certifications CEH, OSCP, CISCO or equivalent experience and Knowledge project development filed.Research security enhancements and make recommendations to management.Qualifications:Bachelor Degree or equivalent experience in security field.0-4 years relevant ExperienceNo. of Positions:10Salary Packages:6,00,000 - 10,00,000 (INR) yearsApplication Dead Line:12/5/2023
View all details
  • 2 - 6 yrs
  • 7.0 Lac/Yr
  • Mumbai
Bash Vulnerability Assessment Cyber Security Ethical Hacker Work From Home
In this role, as part of the global Data Protection & Response Team, you will: Responsible for all operational aspects of the GE Healthcare Insider Threat platform. Lead design and deployment of solution, manage data ingestion, implementing new functionality to meet business requirements. Work collaboratively with stakeholders (and the Insider Threat Leader) to support data ingestion, data modelling, playbook/policy design and production deployment for operational teams. Responsible for enabling and maintenance of all data sources and feeds to support the operational requirements of platform and downstream needs. Perform Hybrid work assisting Insider Analytics and associated functions around Data Loss Prevention. Provide technology support, maintenance of application functionality and integrations. Triage production issues, identify root cause and corrective actions. Dive into crisis situations and Production issues, trouble-shoot, engage stakeholders and own problem resolution. Manage service parameters around operational incidents and SLAs in partnership with platform service provider/vendors. Responsible for policy and content development on the platform to support Insider Threat team needs. Implement innovative ways of identifying threats to data using the platform and ensure aligned to industry best practices. Collect, monitor and analyze data produced by the tools to discover and discern trends, threats, and security risks associated with improper use of GE data. Ensure compliance with all regional legal requirements globally. Support tenant, tools, end-point and data migration efforts aligned with business spin-off. Manage stakeholder communication, balance of program/business priorities and communicate progress towards business objectives. Track outcomes and stakeholders satisfaction levels through established metrics against service level. Ensure lessons learned are collected and implemented.
View all details

Ethical Hacker

UK ETHICAL HACKERS LIMITED

  • 1 - 7 yrs
  • Delhi
Kali Linux Phishing Committed Ethical Hack Integrity Ethical Hacker Work From Home
Hello. we are looking for 4 experienced individuals to help aid us in running our company within the uk you will be at the forefront of helping companies protect against cyber threats in this evolving market. we are looking for individuals who have knowledge on BEC (business email compromise) and other penetration testing abilities the salary will also depend on the jobs we get and complete some of the jobs are high paying some of them are low paying. payment is made once the job is complete and a report has been made. you will be tested on your abilities to ensure that you have the potential to work in this rapid paced environment.*requirements mobile deviceLaptopwhats app/discord/Microsoft team.
View all details

Internship For Council Of Cyber Vigilance Ethical Hacking

Council of Cyber Vigilance and Security Enforcement

  • 0 - 1 yrs
  • 0.8 Lac/Yr
  • Ludhiana
Self Learning Cyber Security Communication Listening Ethical Hacker
Its an opportunity to get trained while participating on real-life live projects in an excellent working environment. The participants work with experienced mentors and guides. An emphasis and focus is given on the preparation of participants for their promising future. An internship participant can choose one or more training aspects from following list:Technical Aspects:(a) Computer Networks and Cloud(b) Cyber Security, Ethical Hacking(c) Full Stack Development(d) Web Portal Development.(e) Training of Cyber Security Trainers(f) Data ScienceManagement Aspects:(a) Digital Marketing (b) Technical Content Writing(c) HR and Technical Consultancy(d) Organization and Leadership Development.(e) Project ManagementThe applications are invited round the year. The internship programs start every quarter like January, April, July and October. The participants get short-listed one month prior to the beginning of the internship program. The candidates interested in getting further details and knowing application procedure, please call and send your bio-data on the email given above. After applying for the opportunity, there would be a brief interview for the final selection. It is advised to apply at least two months prior to the beginning of your internship.Please directly call:Er. Sarabjit Singh Chaudhry.Regional Director,Training and Development,Regional Training Centre3rdFloor, CCIT Building, Model Town,Ludhiana- 141002
View all details

Hacker

all india

  • 0 - 2 yrs
  • 13.0 Lac/Yr
  • Bihar
Ethical Hacking Hacking Data Collect Computer Hacker
All Type Of Hacking , data collect ethical hacking,Master in hacking
View all details
  • 1 - 4 yrs
  • 10.0 Lac/Yr
  • Canada
Ethical Hacking Cyber Security Work From Home
Ethical Hacking & Cyber Security AnalystMobile Hacking(Android & IOS), System Hacking(Windows & MacOS) Preferred.At Bigtechnosystem Infotech Pvt Ltd we are looking for Experienced Ethical Hacking & Cyber Security Analyst for their project development.Attractive Salary Packages. High Skills and experienced. Looking for Developers in Mobile & System Hacking.Remote Access, Live Monitoring by Accessing Via URL Link, Image, Phone call. Responsibilities:Monitor computer networks for security issues.Investigate security breaches and other cyber security incidents.Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.Document security breaches and assess the damage they cause.Work with security team to perform tests and uncover network vulnerabilities.Fix detected vulnerabilities to maintain a high-security standard.Stay current on IT security trends and news.Develop company-wide best practices for IT security.Help colleagues install security software and understand information security management.Research security enhancements and make recommendations to management.Stay up-to-date on information technology trends and security standards.Report creation with appropriate recommendations Must have skills Familiarity with Security Standards and groups (OWASP, SANS)Hands-on experience of Security Testing tools such as Burp Suite, Metasploit, Kali, Nessus, etc.Basic Knowledge of Programming and scripting languages Good verbal and written communication Passion to learn and explore Desired skills Code Review experience highly desirable.,
View all details