Jobs

Top 10 Certified Ethical Hacker (CEH) Jobs to Apply for in 2022

S Akash

Certified Ethical Hacker (CEH) acts as the core certification for those looking to start a career in ethical hacking

According to a report, the cyberattacks has cost over US$4.24 million in 2022. Ransomware attacks, compromised networks, and information security vulnerabilities cost the business a hefty amount every year. As a result, organizations are looking for skilled ethical hackers to combat the threats of cyberattacks that have paved the way for heavy loss. Owing to the increasing demand, ethical hacking jobs are emerging as a viable career path for IT and security professionals. Generally, ethical hackers help organizations find vulnerabilities and find ways to mitigate that. They protect data stored within electronic devices like computers, mobiles, and tabs. In a nutshell, an ethical hacker is involved in protecting the crucial information of the company by using certain hacking techniques. Certified Ethical Hacker (CEH) acts as the core certification for those looking to start a career in ethical hacking. Here is the list of the top 10 Certified Ethical Hacker (CEH) jobs to apply for in July 2022.

USI-EH-Global-GTS-Gdas-Cyber Defense- SOC Tier 3
Deloitte

Responsibilities:

  • Serve as the regional lead and point of escalation for analysts.
  • Oversee completion of day-to-day checklist(s), including log review, management report scheduling & running, alert analysis, and escalation follow-up activity status
  • Remain current on cyber security trends and intelligence (open source and commercial) to guide the security analysis & identification capabilities of the SOC team
  • Provide oversight and guidance to junior analysts and fulfill SOC manager responsibilities in the absence of the SOC Manager

Click here to apply

Info Security Analyst
Ameriprise Financial Services, LLC

Responsibilities:

The resource will act as a real-time alert monitoring analyst in the cybersecurity team, supporting its three main functions: 24×7 tracking, threat analysis and counter-threat, and incident response and recovery activities. Additional responsibilities include maintaining enterprise security capabilities and operationalization of the same.

Requirements:

  • 2-4 years of experience in the Security Operation Center
  • 2-4 Years' experience in Network/Server admin
  • Familiarity with Network/Servers/Malware domain
  • Familiarity with Windows/Linux OS

Click here to apply

Consultant, Cyber Security
General Mills India

Responsibilities:

  • Direct incident response team while responding to more complex incidents
  • Handle escalations from other members of the incident response team
  • Monitor SIEM and other tools for potential threats, intrusions, or compromises
  • Analyze emails reported as phishing
  • Investigate the functionality, origin, and potential impact, and contain threats including malware, phishing, and other intrusions

Click here to apply

Ethical Hacker
EnigmaSoft Technologies

Responsibilities:

  • Responsible for Securing the cloud management console, virtual infrastructure, APISSH keys, DevOps admin consoles, Protecting Privileged Credentials, etc. in Cloud Environments Demonstrate knowledge of cloud architecture and implementation features (OS, multi-tenancy, virtualization, orchestration, elastic scalability)
  • Develop and recommend cyber-security technology strategies, publish security standards, and develop security solutions for projects and Infrastructure and methods to monitor compliance. Reduce cloud and infrastructure vulnerabilities across all cloud assets.
  • Implement and manage IAM best practices for cloud directories and identity providers.

Click here to apply

Application Security – Senior Consultant
Deloitte

Responsibilities:

  • Configure and execute vulnerability scans enumerating vulnerabilities within the internal and external network
  • Analyze, enrich and prioritize specific activities designed to remediate discovered vulnerabilities such as patch deployment or configuration hardening
  • Assist in producing a comprehensive operating picture and cyber security situational awareness
  • Work with various vulnerability threat feeds (such as vendor bulletins), assessment tools, asset inventory tools as well as reporting tools and frameworks to match assets to identified vulnerabilities and produce reports

Click here to apply

Lead Security Architect
Hewlett Packard Enterprise

Responsibilities:

  • Interact with senior stakeholders across departments
  • Reach and influence a wide range of people across larger teams and communities
  • Research and apply innovative security architecture solutions to new or existing problems and be able to justify and communicate design decisions
  • Develop vision, principles, and strategy for security architects for one project or technology
  • Work out subtle security needs

Click here to apply

Security Analyst, Technology
Kroll

Responsibilities:

  • Use SIEM technologies and other native tools to perform the monitoring of security events on a 24×7 basis.
  • Perform analysis on logs produced by network devices utilized within the infrastructure such as firewalls, content filtering, syslog from various sources/devices, assorted Intrusion Detection capabilities, substantiating vulnerability scanner results, directory services, DHCP logs, Secure Email Gateway logs, and approved applications.
  • Use the SIEM to monitor the network and perform analysis, while integrating the results and information needed to proactively protect the enterprise. This includes developing customized signatures, enterprise content filtering, or firewall ACL change recommendations.

Click here to apply

Security Track Specialist
Hexaware Technologies

Responsibilities:

  • Ensure engagements are adequately scoped
  • Define per engagement pre-requisites
  • Execute a penetration test
  • Provide technical oversight during the execution phase
  • Interface with vendors who deliver Security Testing engagements
  • Ensure reporting of Security Testing activities are appropriate for the intended audience

Click here to apply

Senior Information Security Analyst
Wells Fargo

Responsibilities:

  • Driving the end-to-end implementation of any application/solution, highlighting/identifying risks, and providing a mitigation approach for the module
  • Strong analytical and problem-solving abilities to identify an issue and propose solutions
  • Understanding of data analysis techniques, standards, and error handling concepts
  • Collaborate effectively with different teams initiate action, manage change, contribute to high-impact decisions, and accept challenging assignments
  • Provides support for testing, emergencies, and audit compliance projects. Participates in the evaluation and implementation of emerging data access control technologies, information systems security issues, safeguards, and techniques

Click here to apply

Cyber Defense Security Analyst
Genpact

Responsibilities:

  • Perform initial triage of security events detected from data protection and other security monitoring controls.
  • Based on the analysis of the security events identify detection rule improvements to reduce false positives and more accurately detect sensitive data/security incidents.
  • Respond to and follow up to security incidents identified by DLP/SIEM system
  • Ability to navigate and work effectively across a complex global organization
  • Good communication and documentation skills

Click here to apply 

More Trending Stories 

Join our WhatsApp Channel to get the latest news, exclusives and videos on WhatsApp

                                                                                                       _____________                                             

Disclaimer: Analytics Insight does not provide financial advice or guidance. Also note that the cryptocurrencies mentioned/listed on the website could potentially be scams, i.e. designed to induce you to invest financial resources that may be lost forever and not be recoverable once investments are made. You are responsible for conducting your own research (DYOR) before making any investments. Read more here.

Top Cryptocurrencies for Privacy and Anonymity

7 Altcoins That Will Outperform Ethereum (ETH) and Solana (SOL) in the Next Bull Run

Invest in Shiba Inu or Dogecoin? This is What $1000 in SHIB vs DOGE Could Be Worth After 3 Months

Ripple (XRP) Price Skyrocketed 35162.28% in 2017 During Trump’s First Term, Will History Repeat Itself in 2025?

These 4 Altcoins Are Set for a Meteoric Rise as Bitcoin (BTC) Enters Price Discovery Mode