Cutshort logo
Digital forensics jobs

11+ Digital forensics Jobs in India

Apply to 11+ Digital forensics Jobs on CutShort.io. Find your next job, effortlessly. Browse Digital forensics Jobs and apply today!

icon
Leading Healthcare Technology MNC

Leading Healthcare Technology MNC

Agency job
via Michael Page by Ruchita Jagetiya
Mumbai, Navi Mumbai, NCR (Delhi | Gurgaon | Noida)
6 - 11 yrs
₹30L - ₹35L / yr
Digital forensics
Cyber Security
Forensics
Role Description :

Provides technical expertise and guidance in the identification, preservation, collection and analysis of digital evidence in various digital formats from computers, servers, mobile devices, and other electronic or online storage media.

Presents recommendations and findings to internal and external customers including Legal, Compliance, HR, Outside Counsel, and Law Enforcement.

Develops and maintains processes, procedures, and methodologies for collecting and analyzing digital evidence.

Maintains strong working relationships with other corporate investigation team members, subject matter experts, 3rd party vendors, and outside law firms.



Skills required:

Hands on experience on Digital Forensics for at least 4 years using digital tools such as X-Ways, AXIOM, FTK, Cellebrite, Oxygen, NUIX, etc

Experience of Computer, Mobile and Cloud Forensics cases

Expertise with Microsoft, Macintosh, and Unix Operating Systems

Strong understanding of network and cloud computing environments

Good to have certifications such as GCFA, Encase, CISSP, CFCE etc
Read more
OSBIndia Private Limited
Ashwini Mamidi
Posted by Ashwini Mamidi
Hyderabad
3 - 5 yrs
₹5L - ₹9L / yr
Identity management
Access control
SailPoint
Information security
Cyber Security
+1 more

 

·        Maximum 5 years of Information Technology/Technology Operations/Information Security experience required.

·        Minimum 3 years of experience in Cybersecurity, Identity & Access Management, Role Based Access Control, and Identity Governance is mandatory.

·        Knowledge on User Life Cycle Management, Access provisioning, Access administration is must.

·        Experience with technologies such as Role-Based Active Control (RBAC) and Attribute Based Access Control (ABAC) is required.

·        Experience in User Access Re-certification activities is mandatory.

·        Working knowledge on Active Directory is must.

·        Working experience on any IAM tool (SailPoint/Okta/OneIdentity/Varonis/MIM) would be added advantage.

·        Knowledge on Identity and Access Management role/processes/tools is must.

·        Prior experience in processing IAM requests (Add/Modify/Delete) is must.

·        Experienced in Incident management & Change Management processes.

·        Knowledge of and the ability to adhere to SAS and SOX audit requirements pertaining to Identity & Access Management job requirements.

·        Experience with work-flow management tools such as ServiceNow.

·        Leveraging creative thinking and problem solving skills, individual initiative, and utilizing MS Office (Word, Excel, Access, and PowerPoint).

·        Understanding personal and team roles; contributing to a positive working environment by building solid relationships with team members; proactively seeking guidance, clarification and feedback.

·        Identifying and addressing business needs: building relationships with Stake Holders; developing an awareness of Firm services; communicating with the business/stake holders in an organized and knowledgeable manner; delivering clear requests for information; demonstrating flexibility in prioritizing and completing tasks; and communicating potential conflicts to a supervisor

·        Experience performing user administration tasks for various in-house and third-party applications.

·        Analyzing, prioritizing, and resolving faults to resolution. Resolve tickets according to SLAs and escalation procedures.

·        Strong analytical, problem solving and organizational skills. Be proactive, dynamic, and flexible.

·        Good Communication skills, able to articulate well with business and stakeholders.

 

·        Education Qualification : Any graduate/post graduate with Computer Science background.

 

 

Read more
Ongrid

at Ongrid

3 recruiters
Pushpendra Singh
Posted by Pushpendra Singh
Gurugram
4 - 8 yrs
₹10L - ₹18L / yr
Information security
Cyber Security
Compliance
Policies and procedures
Vulnerability assessment
+2 more
Role and Responsibilities:-

- Develop efficient strategies to protect the system, the networking infrastructure, data, and information systems against potential threats/cyber risks

- Routinely performing threat analysis, system checks, and security tests

- Defining and updating information security criteria and validation procedures

- Effectively discuss to understand safety and security and fix the problems along with different stakeholders

- To be a security representative or point of contact for all technical deliveries, initiatives, and project implementations.

- To develop technical processes and procedures and promote compliance in line with regulations, corporate policies, or standards as per ISO27001

- Assess technical security risks in terms of impact on systems and service confidentiality, integrity, and availability, and report and escalate results of risk assessments.

- Report any real or potential security breaches/vulnerabilities to various stakeholders and provide technical support during incident response

- Monitor security tools to detect security events & incidents Report and escalate any security breaches to the Information Technology Security Officer

- Operate vulnerability scanning and compliance tools to identify system weaknesses

- Represent IT Security matters at technical and business forums.

Desired candidate profile :

- Relevant experience in the information security field

- Relevant experience working with ISO Policies, and GDPR guidelines.

- Strong knowledge of network architecture and security concepts related to routing

- Exceptional attention to detail

- Excellent analytical and problem-solving skills

- Great team player and able to work efficiently with minimal supervision

- Excellent communication skills, both written and verbal, work with the different stakeholders on strengthening the security risks.

- Able to handle and cope with stressful situations and understands the pressures of a start-up environment
Read more
Bengaluru (Bangalore)
7 - 12 yrs
₹5L - ₹25L / yr
Cyber Security
Automotive
skill iconC
Linux/Unix
Debugging
+2 more
We are looking for a LinuxMiddleware Cybersecurity Development engineer having experience in Linux kernel/Device drivers/Device tree configuration, Bootloaders/Uboot/Secure Boot customization in the embedded domain. The ideal candidate should have expertise in Linux BSP development with Yocto build system for the Automotive SoC platform
Read more
TIKAJ

at TIKAJ

2 recruiters
Anamika Srivastava
Posted by Anamika Srivastava
Remote, Gurugram
0 - 2 yrs
₹1.4L - ₹2.4L / yr
Security awareness
Cyber Security
Incident management

TIKAJ is seeking a passionate person who is ready to kickstart his/her cybersecurity career. Security Analyst is your first step to a brighter future as a cybersecurity expert.

Responsibilities


  • Respond and take enforcement actions on cyber security incidents
  • Monitor user activity, network events, and signals from security tools to identify events.
  • Categorize alerts and other anomalous activities that represent real threats.
  • Remediate attacks and Triage on general information security tickets.
  • Collect data for more analysis, evaluate the attack, identify the root of the attack, and implement required security actions to counter the attack.
  • Responsible for investigating and generating reports on information security issues.

We are looking for Candidates

  • Who are motivated, self-learning, and team-oriented individuals?
  • Have a degree in computer science or a related field.
  • Who have beginner to intermediate level experience in Python
  • Who has an interest in Cyber security, phishing, cyber laws and enforcement
  • Good is written and verbal communication.
Read more
US based company

US based company

Agency job
via MNR Solutions by Geetanjali Kumari
Hyderabad
7 - 13 yrs
₹20L - ₹30L / yr
skill iconAmazon Web Services (AWS)
Cyber Security
Penetration testing
Threat modeling
Computer Security
+1 more

Job Responsibilities:

 

Experience: 8 Yrs to 12 Yrs

 

  1. Hands-on expertise on performing Application pen testing (Mobile(Android, IOS),networking, web application pen testing),
  2. Should worked on IOT,AWS,Application Penetration Testing, Reverse Engineering, source code review, CI/CD Pipeline
  3. have done any submission on Bug crowd or Bug Bounty.
  4. have developed tools or scripts for web pen test on GitHub.
  5. Certified on OSCP
  6. Threat Modeling
  7. Network scan in stealth mode or simple scan using Nmap and Burp suite

 

Implement security measures which monitor and protect sensitive data and systems from infiltration and cyber-attacks.

 

Developing different ways to solve the existing threats and security issues.

 

Configuring and implementing intrusion detection systems and firewalls.

 

Security product development, testing, and implementation.

 

Responsible for security technology research, penetration testing, and vulnerability scanning.

 

Please follow the below inputs.

 

The shift will starts from 03:00 PM to 12 AM (fixed for few months),

 

 

OSCP certification(Not mandatory, preferable)

 

Below are the primary key skills:

 

Total Application Security Experience:

Total Security Architecture Experience:

IOT(optional)

MOBILE

WEB

AWS(Mandatory)

NETWORKING

THREAT MODELS

 

 

Read more
technoforte software pvt. ltd.
Hema Chandwani
Posted by Hema Chandwani
Bengaluru (Bangalore)
5 - 8 yrs
₹9L - ₹15L / yr
Shell Scripting
Cyber Security
Endpoint protection
Web application security
Information security
+1 more

Desired Skills

To have skills:

·       Proven technical expertise in cyber security domains, i.e. endpoint security, application security testing.

·       Knowledge and experience in public cloud solutions.

·       Knowledge on network security, networking concepts and architectural implementations.

·       Knowledge on vulnerability testing and define proper remediation’s.
Experience with application, database, and infrastructure security.

·       Shell scripting experience - Shell/Bash/Python.

·       Working experience of Linux operation.

 

Desire to have skills:

·       One or more of the following cyber security certifications: CEH, CISSP, OSCP, SSCP  CCSP.

·       Excellent problem solving, and follow-up skills.

·       Ability to convey technical security concepts to non-technical audiences.

Read more
netmedscom

at netmedscom

3 recruiters
Vijay Hemnath
Posted by Vijay Hemnath
Chennai
5 - 10 yrs
₹10L - ₹30L / yr
Information security
IT security
WAF
skill iconDocker
Ethical Hacking
+16 more

We are seeking a Security Program Manager to effectively drive Privacy & Security Programs in collaboration with cross functional teams. You will partner with engineering leadership, product management and development teams to deliver more secure products.

 

Roles & Responsibilities:

  • Work with multiple stakeholders across various departments such as IT, Engineering, Business, Legal, Finance etc to implement controls defined in policies and processes.
  • Manage projects with security and audit requirements with internal and external teams and serve as a liaison among all stakeholders.
  • Managing penetration tests and security reviews for core applications and APIs.
  • Identify, create and guide on privacy and security requirements considering applicable Data Protection Laws and implement them across software modules developed at Netmeds.
  • Brainstorm with engineering teams to figure out how privacy and security controls can be applied to Netmeds tech stack.
  • Coordination with Infra Teams and Dev Teams on DB and application hardening, standardization of server images / containerization.
  • Assess vendors' security posture before onboarding them and after they qualify, review their security posture at a set frequency.
  • Manage auditors and ensure compliance for ISO 27001 and other data privacy audits.
  • Answer questions or resolve issues reported by the external security researchers & bug bounty hunters.
  • Investigate privacy breaches.
  • Educate employees on data privacy & security.
  • Prioritize security requirements based on their severity of impact and product roadmap.
  • Maintain a balance of security and business values across the organisation.

 Required Skills:

  • Web Application Security, Mobile Application Security, Web Application Firewall, DAST, SAST, Cloud Security (AWS), Docker Security, Manual Penetration Testing.
  • Good hands-on experience in handling tools such as vulnerability scanners, Burp suite, patch management, web filtering & WAF.
  • Familiar with cloud hosting technologies (ex. AWS, Azure). Understanding of IAM, RBAC, NACLs, and KMS.
  • Experience in Log Management, Security Event Correlation, SIEM.
  • Must have strong interpersonal skills and should be able to communicate complex ideas seamlessly in written and verbal communication.

 

Good to Have Skills:

  • Online Fraud Prevention.
  • Bug Bounty experience.
  • Security Operations Center (SOC) management.
  • Experience with Amazon AWS services (EC2, S3, VPC, RDS, Cloud watch).
  • Experience / Knowledge on tools like Fortify and Nessus.
  • Experience in handling logging tools on docker container images (ex. Fluentd).
Read more
Technomech Consultancy

at Technomech Consultancy

1 recruiter
Laxmi Ghoble
Posted by Laxmi Ghoble
Pune, Mumbai, Bengaluru (Bangalore)
5 - 12 yrs
₹15L - ₹25L / yr
CISA
CISSP
Cyber Security
Information security
CEH
+4 more

Position: IT Auditor

Experience: 4-12 Years

Location: Pune

Key Skills Required:

CISA, CISSP, CISM, IT Audit, Technology Audit, IT Infrastructure Audit, Application Security Audit, Information Security Audit, Cyber Security Audit, Cloud Security, Ethical Hacker

Additional key words: Vulnerability assessment, Penetration Testing, ITGC testing, Cloud Computing,

 

 

IT AUDITOR is responsible to plan and perform the audit assignment starting from audit announcement, audit planning, field work, audit quality reviews, pre-closing / closing meetings with the respective Directors / Head of the Departments including writing of the audit report and its finalization as well as follow up of the audit actions. Additionally IT AUDITOR will also be responsible to:
•    Evaluate IT systems, processes and projects in place;
•    Determine risks to the Group’s information assets, and help identify methods to minimize those risks;
•    Ensure information management processes are in compliance with IT-specific laws, policies and standards;
•    Determine inefficiencies in IT systems, IT projects and associated management processes and
•    Consult in IT projects, new initiatives and organizational frameworks.

Description

 

Audit Planning

1)    Perform audits at Volkswagen Group entities. and other concerned Volkswagen Group Companies with focus on IT processes keeping the associated business risks in mind.
2)    Participate in the preparation of audit objective & scope document along with audit schedule based on the audit objective and timeline specified by Head of IT Audit India Hub.
3)    Participate in the preparation of work program

Audit Process

1)     Prepare and conduct preparatory interviews with the Directors and Heads of the audited departments to identify the processes to be assessed during the audit.
2)     Request and collect relevant audit data for analysis from respective business areas.
3)     Prepare audit matrix on periodic basis to record the audit field work and update the progress of the audit to IT Audit Manager and the Head of IT Audit Hub India.
4)    Define actions including relevant controls to mitigate the business risks identified based on the evidences provided during the audit.
5)    Organize and conduct pre-closing meetings with business areas to agree upon audit observations and relevant actions.
6)    Prepare and conduct closing meetings with the Directors / Heads of the Department for audited division to agree upon the audit observations, risks and proposed actions.
7)    Prepare the draft audit report and submit the same to the  IT Audit Manager and the Head of IT Audit India Hub for review.
8)    Ensure that adequate documentation is prepared for the audit assignment. Peer review changes are done before release of the final audit report to the business area.
9)    Contact business area to review the progress of the implementation of audit actions defined in the final audit report. Based on the review, write the status of the follow up and submit the same for upload in RIAS.
10)    Obtain necessary certifications / qualifications to support the job requirements by attending relevant trainings
11)    Support the conduction of unscheduled audits/special investigations and audits from the anti-corruption system.
12)    Relevant knowledge is shared among the team members.
13)    Consult in IT projects, new initiatives and organizational frameworks.
14)    Ensure information management processes are in compliance with IT-specific laws, policies and standards.
15)    Determine risks to the Group’s information assets, and help identify methods to minimize those risks.
16)    Evaluate IT systems, processes and projects in place.
17)    Determine inefficiencies in IT systems, IT projects and associated management processes.

Read more
HR Global Services India

at HR Global Services India

2 recruiters
Kavitha K
Posted by Kavitha K
Remote, Kochi (Cochin)
2 - 8 yrs
₹3L - ₹12L / yr
skill iconC#
skill iconPython
skill iconJava
Cyber Security
Microsoft Windows Azure
+6 more
Job Description - Cyber Security Analyst

The Cyber Security Analyst will help to assess, plan, and enact security measures to protect the Hubbell organization from security breaches and attacks on its computer networks and systems. This job involves simulating attacks to identify vulnerabilities, testing new software to help protect the
company & data, and assisting users in adhering to new regulations and processes to ensure safety and compliance. The Cyber Security Analyst will work as part of the Security Operations team to execute, monitor and report-out on the scheduled tasks associated with maintaining the overall cyber hygiene for the company
Responsibilities
 Monitor computer networks for cybersecurity issues.
 Respond and investigate security breaches and other cybersecurity incidents.
 Install security measures and operate software to protect systems and information infrastructure, including firewalls and data encryption programs.
 Work in conjunction with the cybersecurity team to develop automation for scheduled tasks and reporting
 Respond to specific threats, evaluating company exposure, and risk.
 Assist in the execution of penetration testing.
 Research security enhancements and make recommendations to management.
 Stay up to date on cybersecurity trends, threats, and remediation
 Attend daily security operations meetings
 
Qualifications
 A degree in Computer Science, IT, Systems Engineering or a related qualification
 2-3 years of experience with software development in C-Sharp, Python or Java
 2 years of experience with scripting tools such as PowerShell, Unix Bash and Bourne
 Familiarity with patch management
 Familiar with common cyber frameworks and tools such as NIST and MITRE Attack
 Awareness of common cybersecurity threats and hacking methodologies
 
Preferred
 CompTIA certification (A+ and Sec+)
 Previous experience with Incident response and forensics
 Knowledge Network security and segmentation


Read more
Virtual Engineering Services Pvt Ltd
Abha Sachdeva
Posted by Abha Sachdeva
NCR (Delhi | Gurgaon | Noida)
3 - 5 yrs
₹4L - ₹8L / yr
OWASP
Vulnerability assessment
Web application security
Penetration testing
IT security
+11 more

IT Security Specialist

 

 

Roles and Responsibilities

  • Extensive experience of 2-5 years in Vulnerability Assessment and Penetration testing, Web Application security.
  • An Experience in performing web application security assessments using hands on techniques for identifying SQL injections, XSS, CSRF, authentication/authorization, OWASP top 10 issues.
  • Must have working experience in OWASP Top 10 Vulnerabilities Testing in Web applications.
  • Create policy and standards for developers and testers to secure programming in the organization. (secure code review, static application security testing.
  • Experience on both commercial and open source tools Cenzic Hailstorm, Burpsuite, AppScan, WebInspect, Appspider, sqlmap, OWASP ZAP. Assessing cloud security risk (AWS and Azure) and recommending appropriate security controls.
  • Ability to interact with project teams to understand the security requirements and come up with solutions
  • Extensive knowledge of managing Web Application Firewall (Product) including rules management and product administration
  • Strong understanding of networking concept.

 

Desired Candidate Profile

 

  • Excellent knowledge of Microsoft Windows operating environments and with special attention to security and hardening issues.
  • Able to work independently with minimal supervision.
  • Good knowledge of secure software development standard, process, techniques, cloud security policies and tools.
  • Keep stakeholders updated with communications and weekly reporting.
  • Collaborate with Security Platform and Services teams to build and integrate existing security solutions.
  • Excellent communication skills - written, verbal, presentation and interpersonal.
  • Willing to learn new skills and implement new technologies.
  • Should come with bachelor’s degree in engineering, mathematics or master’s in computer application / programing.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Read more
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort
Why apply via Cutshort?
Connect with actual hiring teams and get their fast response. No spam.
Find more jobs
Get to hear about interesting companies hiring right now
Company logo
Company logo
Company logo
Company logo
Company logo
Linkedin iconFollow Cutshort